764 | -- | 777 | Maha Alghawazi, Daniyal M. Alghazzawi, Suaad Alarifi. Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review |
778 | -- | 799 | Panayiotis Kalogeropoulos, Dimitrios Papanikas, Panayiotis Kotzanikolaou. A Distributed Model for Privacy Preserving V2I Communication with Strong Unframeability and Efficient Revocation |
800 | -- | 829 | Umm-e-Hani Tayyab, Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan, Yeon Soo Lee. A Survey of the Recent Trends in Deep Learning Based Malware Detection |
830 | -- | 852 | Ayse Ünsal, Melek Önen. Calibrating the Attack to Sensitivity in Differentially Private Mechanisms |
853 | -- | 861 | Mohammed A. Ahmed, Hatem F. Sindi, Majid Kamal A. Nour. Cybersecurity in Hospitals: An Evaluation Model |
862 | -- | 881 | Jins de Jong, Bart Kamphorst, Shannon Kroes. Differentially Private Block Coordinate Descent for Linear Regression on Vertically Partitioned Data |
882 | -- | 906 | Hunter D. Moore, Andrew Stephens, William Scherer. An Understanding of the Vulnerability of Datasets to Disparate Membership Inference Attacks |
907 | -- | 923 | Maria José Angélico Gonçalves, Rui Humberto R. Pereira, Marta Alexandra Guerra Magalhães Coelho. User Reputation on E-Commerce: Blockchain-Based Approaches |