Journal: Cybersecurity

Volume 2, Issue 1

1 -- 0Xiayang Wang, Fuqian Huang, Haibo Chen. DTrace: fine-grained and efficient data integrity checking with hardware instruction tracing
2 -- 0Manar Alohaly, Hassan Takabi, Eduardo Blanco 0002. Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies
3 -- 0Pietro Colombo, Elena Ferrari. Access control technologies for Big Data management systems: literature review and future trends
4 -- 0Kanchana Devi V., Ganesan R.. Semi Markov process inspired selfish aware co-operative scheme for wireless sensor networks (SMPISCS)
5 -- 0Chaoqun Ma, Xiaolin Kong, Qiujun Lan, Zhongding Zhou. The privacy protection mechanism of Hyperledger Fabric and its application in supply chain finance
6 -- 0Charles Morisset, Tim A. C. Willemse, Nicola Zannone. A framework for the extended evaluation of ABAC policies
7 -- 0Qingfeng Chen, Xu Zhang, Ruchang Zhang. Privacy-preserving decision tree for epistasis detection
8 -- 0Naveen Kumar 0011, Anish Mathuria. Comprehensive evaluation of key management hierarchies for outsourced data
9 -- 0Shengye Wan, Yue Li 0002, Kun Sun 0001. PathMarker: protecting web contents against inside crawlers
10 -- 0Noora Alallaq, Muhmmad Al-Khiza'ay, Xin Han. Group topic-author model for efficient discovery of latent social astroturfing groups in tourism domain
11 -- 0Tong Chen, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Zhen Han. Adversarial attack and defense in reinforcement learning-from AI security view
12 -- 0Yan Wang, Wei Wu, Chao Zhang 0008, Xinyu Xing, Xiaorui Gong, Wei Zou. From proof-of-concept to exploitable
13 -- 0ZhiHao Wang, Hong Li, Qiang Li 0007, Wei Li, Hongsong Zhu, Limin Sun. Towards IP geolocation with intermediate routers based on topology discovery
14 -- 0Simon Parkinson, Saad Khan, James Bray, Daiyaan Shreef. Creeper: a tool for detecting permission creep in file system access controls
15 -- 0Ahmet Okutan, Shanchieh Jay Yang. ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense
16 -- 0Li Yang, Hua Dong, Zhao Li. One-way information reconciliation schemes of quantum key distribution
17 -- 0Wenjie Li, Dongpeng Xu, Wei Wu, Xiaorui Gong, Xiaobo Xiang, Yan Wang, Fangming Gu, Qianxiang Zeng. Memory access integrity: detecting fine-grained memory access errors in binary code
18 -- 0Yanyan Liu, Daode Zhang, Yi Deng, Bao Li. (Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy
19 -- 0Marco Benedetti, Marco Mori. On the use of Max-SAT and PDDL in RBAC maintenance
20 -- 0Ansam Khraisat, Iqbal Gondal, Peter Vamplew 0001, Joarder Kamruzzaman. Survey of intrusion detection systems: techniques, datasets and challenges
21 -- 0Yiru Sun, Yanyan Liu, Bo Wu. An efficient full dynamic group signature scheme over ring
22 -- 0Yuejun Liu, Rui Zhang 0002, Yongbin Zhou. Predicate encryption against master-key tampering attacks
23 -- 0Manfred Vielberth. Human-as-a-security-sensor for harvesting threat intelligence