Journal: Cybersecurity

Volume 4, Issue 1

0 -- 0Shushan Arakelyan, Sima Arasteh, Christophe Hauser, Erik Kline, Aram Galstyan. Bin2vec: learning representations of binary executable programs for security tasks
0 -- 0Xiang Yin, Yanni Han, Zhen Xu, Jie Liu. VAECGAN: a generating framework for long-term prediction in multivariate time series
0 -- 0Yiru Sun, Yanyan Liu. An efficient fully dynamic group signature with message dependent opening from lattice
0 -- 0Lulu Yang, Chen Li, Ruibang You, Bibo Tu, Linghui Li. TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
0 -- 0Chen Gao, Xuan Zhang, Hui Liu. Data and knowledge-driven named entity recognition for cyber security
1 -- 13Wenbo Liu, Qiong Huang, Xinjian Chen, Hongbo Li. Efficient functional encryption for inner product with simulation-based security
1 -- 0Raphael Anaadumba, Qi Liu, Bockarie Daniel Marah, Francis Mawuli Nakoty, Xiaodong Liu, Yonghong Zhang. A renewable energy forecasting and control approach to secured edge-level efficiency in a distributed micro-grid
3 -- 0Runchen Gao, Shen Li, Yuqi Gao, Rui Guo. A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving
4 -- 0Alex Shafarenko. A PLS blockchain for IoT applications: protocols and architecture
5 -- 0Ruigang Liang, Ying Cao, Peiwei Hu, Kai Chen 0012. Neutron: an attention-based neural decompiler
6 -- 0Cheah Huei Yoong, Venkata Reddy Palleti, Rajib Ranjan Maiti, Arlindo Silva, Christopher M. Poskitt. Deriving invariant checkers for critical infrastructure using axiomatic design principles
7 -- 0Jianguo Jiang, Baole Wei, Min Yu, Gang Li 0009, Boquan Li, Chao Liu 0020, Min Li, Weiqing Huang. An end-to-end text spotter with text relation networks
8 -- 0Venkata Reddy Palleti, Sridhar Adepu, Vishrut Kumar Mishra, Aditya Mathur. Cascading effects of cyber-attacks on interconnected critical infrastructure
10 -- 0Md. Shafiur Rahman, Sajal Halder, Md. Ashraf Uddin, Uzzal Kumar Acharjee. An efficient hybrid system for anomaly detection in social networks
11 -- 0Shafi Ullah, Raja Zahilah Raja Mohd Radzi. Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices
12 -- 0Waleed Alghamdi, Michael Schukat. Precision time protocol attack strategies and their resistance to existing security extensions
14 -- 0Jingdian Ming, Yongbin Zhou, Huizhong Li, Qian Zhang 0042. A secure and highly efficient first-order masking scheme for AES linear operations
16 -- 0Chun Yang, Jinghui Xu, Shuangshuang Liang, Yanna Wu, Yu Wen, Boyang Zhang, Dan Meng. DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection
17 -- 0Xuzi Wang, Baofeng Wu, Lin Hou, Dongdai Lin. Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers
18 -- 0Ansam Khraisat, Ammar Alazab. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
19 -- 0Roee Leon, Michael Kiperberg, Anat Anatey Leon Zabag, Nezer Jacob Zaidenberg. Hypervisor-assisted dynamic malware analysis
20 -- 0Yuhang Zhao, Ruigang Liang, Xiang Chen, Jing Zou. Evaluation indicators for open-source software: a review
21 -- 0Gu Ban, Lili Xu, Yang Xiao, Xinhua Li, Zimu Yuan, Wei Huo. B2SMatcher: fine-Grained version identification of open-Source software in binary files
23 -- 0Hui Liu, Li Yang. Quantum key recovery attack on SIMON32/64
24 -- 0Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Longquan Liu, Yanyan Zou, Chao Zhang, Baoxu Liu. ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities
25 -- 0Jonah Burgess, Philip O'Kane, Sakir Sezer, Domhnall Carlin. LSTM RNN: detecting exploit kits using redirection chain sequences
27 -- 0M. R. Gauthama Raman, Chuadhry Mujeeb Ahmed, Aditya Mathur. Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation
28 -- 0Pei-Yi Lin, Chia-Wei Tien, Ting-Chun Huang, Chin-Wei Tien. ICPFuzzer: proprietary communication protocol fuzzing by using machine learning and feedback strategies
29 -- 0Sabarathinam Chockalingam, Wolter Pieters, André Teixeira 0001, Pieter H. A. J. M. Van Gelder. Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates
30 -- 0Sagar Sharma, Keke Chen. Confidential machine learning on untrusted platforms: a survey
31 -- 0Zuoguang Wang, Hongsong Zhu, Peipei Liu, Limin Sun. Social engineering in cybersecurity: a domain ontology and knowledge graph application examples
32 -- 0Wenqin Cao, Wentao Zhang. Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers
33 -- 0Zhilong Wang, Peng Liu. Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity
34 -- 0Junpeng Xu, Haixia Chen, Xu Yang, Wei Wu, Yongcheng Song. Verifiable image revision from chameleon hashes
35 -- 0Huizhong Li, Guang Yang, Jingdian Ming, Yongbin Zhou, Chengbin Jin. Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes
36 -- 0Alex Shafarenko. Indexing structures for the PLS blockchain
37 -- 0Bingyu Liu, Shangyu Xie, Yuanzhou Yang, Rujia Wang, Yuan Hong. Privacy preserving divisible double auction with a hybridized TEE-blockchain system
38 -- 0Jianhua Wang, Xiaolin Chang, Yixiang Wang, Ricardo J. Rodríguez, Jianan Zhang. LSGAN-AT: enhancing malware detector robustness against adversarial examples