1 | -- | 19 | Lili Xu, Mingjie Xu, Feng Li, Wei Huo. ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis |
1 | -- | 0 | Sudhakar, Sushil Kumar. An emerging threat Fileless malware: a survey and research challenges |
1 | -- | 11 | Shisen Fang, Shaojun Yang, Yuexin Zhang. Inner product encryption from ring learning with errors |
2 | -- | 0 | Michael Schwarz 0001, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard. Malware Guard Extension: abusing Intel SGX to conceal cache attacks |
3 | -- | 0 | Yiwen Gao, Yongbin Zhou, Wei Cheng. Efficient electro-magnetic analysis of a GPU bitsliced AES implementation |
4 | -- | 0 | Fangli Ren, Zhengwei Jiang, Xuren Wang, Jian Liu. A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network |
5 | -- | 0 | Samar Muslah Albladi, George R. S. Weir. Predicting individuals' vulnerability to social engineering in social networks |
7 | -- | 0 | Samar Muslah Albladi, George R. S. Weir. Predicting individuals' vulnerability to social engineering in social networks |
8 | -- | 0 | Florian Skopik, Timea Pahi. Under false flag: using technical artifacts for cyber attack attribution |
9 | -- | 0 | Hui Xu, Yangfan Zhou, Jiang Ming, Michael R. Lyu. Layered obfuscation: a taxonomy of software obfuscation techniques for layered security |
10 | -- | 0 | Rachid Ait Maalem Lahcen, Bruce D. Caulkins, Ram Mohapatra, Manish Kumar 0003. Review and insight on the behavioral aspects of cybersecurity |
11 | -- | 0 | Guanyu Li, Dong Du, Yubin Xia. Iso-UniK: lightweight multi-process unikernel through memory protection keys |
12 | -- | 0 | Shuzhou Sun, Hui Ma 0002, Rui Zhang 0002, Wenhan Xu. Server-aided immediate and robust user revocation mechanism for SM9 |
13 | -- | 0 | Petar Radanliev, David De Roure, Kevin R. Page, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos, La Treall Maddox, Pete Burnap. Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains |
14 | -- | 0 | Ayei E. Ibor, Florence A. Oladeji, Olusoji B. Okunoye, Obeten O. Ekabua. Conceptualisation of Cyberattack prediction with deep learning |
15 | -- | 0 | Yoon Ho Choi, Peng Liu 0005, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou. Using deep learning to solve computer security challenges: a survey |
16 | -- | 0 | Serafeim P. Moustakidis, Patrik Karlsson. A novel feature extraction methodology using Siamese convolutional neural networks for intrusion detection |
17 | -- | 0 | Ximeng Liu, Robert H. Deng, Pengfei Wu, Yang Yang 0026. Lightning-fast and privacy-preserving outsourced computation in the cloud |
19 | -- | 0 | Margus Välja, Fredrik Heiding, Ulrik Franke, Robert Lagerström. Automating threat modeling using an ontology framework |
20 | -- | 0 | Mohith Gowda HR, Adithya MV, Gunesh Prasad S, Vinay S. Development of anti-phishing browser based on random forest and rule of extraction framework |
21 | -- | 0 | Yuanzhao Song, Haowen Tan. Practical pairing-Free sensor cooperation scheme for cloud-Assisted wireless body area networks |
23 | -- | 0 | Yixiang Wang, ShaoHua Lv, Jiqiang Liu, Xiaolin Chang, Jinqiang Wang. On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection |
24 | -- | 0 | Tiago Espinha Gasiba, Ulrike Lechner, Maria Pinto-Albuquerque. Sifu - a cybersecurity awareness platform with challenge assessment and intelligent coach |