1 | -- | 0 | Xiayang Wang, Fuqian Huang, Haibo Chen. DTrace: fine-grained and efficient data integrity checking with hardware instruction tracing |
2 | -- | 0 | Manar Alohaly, Hassan Takabi, Eduardo Blanco 0002. Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies |
3 | -- | 0 | Pietro Colombo, Elena Ferrari. Access control technologies for Big Data management systems: literature review and future trends |
4 | -- | 0 | Kanchana Devi V., Ganesan R.. Semi Markov process inspired selfish aware co-operative scheme for wireless sensor networks (SMPISCS) |
5 | -- | 0 | Chaoqun Ma, Xiaolin Kong, Qiujun Lan, Zhongding Zhou. The privacy protection mechanism of Hyperledger Fabric and its application in supply chain finance |
6 | -- | 0 | Charles Morisset, Tim A. C. Willemse, Nicola Zannone. A framework for the extended evaluation of ABAC policies |
7 | -- | 0 | Qingfeng Chen, Xu Zhang, Ruchang Zhang. Privacy-preserving decision tree for epistasis detection |
8 | -- | 0 | Naveen Kumar 0011, Anish Mathuria. Comprehensive evaluation of key management hierarchies for outsourced data |
9 | -- | 0 | Shengye Wan, Yue Li 0002, Kun Sun 0001. PathMarker: protecting web contents against inside crawlers |
10 | -- | 0 | Noora Alallaq, Muhmmad Al-Khiza'ay, Xin Han. Group topic-author model for efficient discovery of latent social astroturfing groups in tourism domain |
11 | -- | 0 | Tong Chen, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Zhen Han. Adversarial attack and defense in reinforcement learning-from AI security view |
12 | -- | 0 | Yan Wang, Wei Wu, Chao Zhang 0008, Xinyu Xing, Xiaorui Gong, Wei Zou. From proof-of-concept to exploitable |
13 | -- | 0 | ZhiHao Wang, Hong Li, Qiang Li 0007, Wei Li, Hongsong Zhu, Limin Sun. Towards IP geolocation with intermediate routers based on topology discovery |
14 | -- | 0 | Simon Parkinson, Saad Khan, James Bray, Daiyaan Shreef. Creeper: a tool for detecting permission creep in file system access controls |
15 | -- | 0 | Ahmet Okutan, Shanchieh Jay Yang. ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense |
16 | -- | 0 | Li Yang, Hua Dong, Zhao Li. One-way information reconciliation schemes of quantum key distribution |
17 | -- | 0 | Wenjie Li, Dongpeng Xu, Wei Wu, Xiaorui Gong, Xiaobo Xiang, Yan Wang, Fangming Gu, Qianxiang Zeng. Memory access integrity: detecting fine-grained memory access errors in binary code |
18 | -- | 0 | Yanyan Liu, Daode Zhang, Yi Deng, Bao Li. (Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy |
19 | -- | 0 | Marco Benedetti, Marco Mori. On the use of Max-SAT and PDDL in RBAC maintenance |
20 | -- | 0 | Ansam Khraisat, Iqbal Gondal, Peter Vamplew 0001, Joarder Kamruzzaman. Survey of intrusion detection systems: techniques, datasets and challenges |
21 | -- | 0 | Yiru Sun, Yanyan Liu, Bo Wu. An efficient full dynamic group signature scheme over ring |
22 | -- | 0 | Yuejun Liu, Rui Zhang 0002, Yongbin Zhou. Predicate encryption against master-key tampering attacks |
23 | -- | 0 | Manfred Vielberth. Human-as-a-security-sensor for harvesting threat intelligence |