1 | -- | 19 | Lakshmi H. R., Surekha Borra. Digital video watermarking tools: an overview |
20 | -- | 32 | Akram Boukhamla, Javier Coronel Gaviro. CICIDS2017 dataset: performance improvements and validation as a robust intrusion detection system testbed |
33 | -- | 50 | Urvashi Garg, Geeta Sikka, Lalit Kumar Awasthi. Empirical risk assessment of attack graphs using time to compromise framework |
51 | -- | 62 | Izzat Alsmadi, Ahmed AlEroud, Ahmad A. Saifan. Fault-based testing for discovering SQL injection vulnerabilities in web applications |
63 | -- | 83 | Xueping Liang, Sachin Shetty, Deepak K. Tosh, Peter Foytik, Lingchen Zhang. Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers |
84 | -- | 102 | Yuchen Cao, Yongbin Zhou, Hailong Zhang 0001. Multi-channel time-frequency fusion attacks |
103 | -- | 119 | Geng Wang. Time-based key management in attribute-based encryption using piecewise key generation |
120 | -- | 136 | Chetna Singhal, A. Rajesh. Heuristic trust-based neighbour centric routing for CPS-enabled wireless sensor and ad hoc network |
137 | -- | 149 | Emmanuel C. Ogu, Olusegun A. Ojesanmi, Oludele Awodele, Shade O. Kuyoro. Supporting features for flow-level packet analysis towards cyber threat detection: a pilot study |
150 | -- | 169 | Zhanwei Cui, Jianping Zeng, Chengrong Wu. A layer-crossing multi-factor and dynamic security model over a moving target defence |
170 | -- | 191 | Xiao Luo, Chengchao Yao, A. Nur Zincir-Heywood. Modelling and visualising SSH brute force attack behaviours through a hybrid learning framework |
192 | -- | 206 | Adarsh Anand, Navneet Bhatt, Omar Hussain Alhazmi. Vulnerability discovery modelling: a general framework |