Journal: Cybersecurity

Volume 3, Issue 1

1 -- 19Lili Xu, Mingjie Xu, Feng Li, Wei Huo. ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
1 -- 0Sudhakar, Sushil Kumar. An emerging threat Fileless malware: a survey and research challenges
1 -- 11Shisen Fang, Shaojun Yang, Yuexin Zhang. Inner product encryption from ring learning with errors
2 -- 0Michael Schwarz 0001, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard. Malware Guard Extension: abusing Intel SGX to conceal cache attacks
3 -- 0Yiwen Gao, Yongbin Zhou, Wei Cheng. Efficient electro-magnetic analysis of a GPU bitsliced AES implementation
4 -- 0Fangli Ren, Zhengwei Jiang, Xuren Wang, Jian Liu. A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network
5 -- 0Samar Muslah Albladi, George R. S. Weir. Predicting individuals' vulnerability to social engineering in social networks
7 -- 0Samar Muslah Albladi, George R. S. Weir. Predicting individuals' vulnerability to social engineering in social networks
8 -- 0Florian Skopik, Timea Pahi. Under false flag: using technical artifacts for cyber attack attribution
9 -- 0Hui Xu, Yangfan Zhou, Jiang Ming, Michael R. Lyu. Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
10 -- 0Rachid Ait Maalem Lahcen, Bruce D. Caulkins, Ram Mohapatra, Manish Kumar 0003. Review and insight on the behavioral aspects of cybersecurity
11 -- 0Guanyu Li, Dong Du, Yubin Xia. Iso-UniK: lightweight multi-process unikernel through memory protection keys
12 -- 0Shuzhou Sun, Hui Ma 0002, Rui Zhang 0002, Wenhan Xu. Server-aided immediate and robust user revocation mechanism for SM9
13 -- 0Petar Radanliev, David De Roure, Kevin R. Page, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos, La Treall Maddox, Pete Burnap. Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains
14 -- 0Ayei E. Ibor, Florence A. Oladeji, Olusoji B. Okunoye, Obeten O. Ekabua. Conceptualisation of Cyberattack prediction with deep learning
15 -- 0Yoon Ho Choi, Peng Liu 0005, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou. Using deep learning to solve computer security challenges: a survey
16 -- 0Serafeim P. Moustakidis, Patrik Karlsson. A novel feature extraction methodology using Siamese convolutional neural networks for intrusion detection
17 -- 0Ximeng Liu, Robert H. Deng, Pengfei Wu, Yang Yang 0026. Lightning-fast and privacy-preserving outsourced computation in the cloud
19 -- 0Margus Välja, Fredrik Heiding, Ulrik Franke, Robert Lagerström. Automating threat modeling using an ontology framework
20 -- 0Mohith Gowda HR, Adithya MV, Gunesh Prasad S, Vinay S. Development of anti-phishing browser based on random forest and rule of extraction framework
21 -- 0Yuanzhao Song, Haowen Tan. Practical pairing-Free sensor cooperation scheme for cloud-Assisted wireless body area networks
23 -- 0Yixiang Wang, ShaoHua Lv, Jiqiang Liu, Xiaolin Chang, Jinqiang Wang. On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection
24 -- 0Tiago Espinha Gasiba, Ulrike Lechner, Maria Pinto-Albuquerque. Sifu - a cybersecurity awareness platform with challenge assessment and intelligent coach