Journal: ICST Trans. Security Safety

Volume 3, Issue 9

0 -- 0William Casey, Parisa Memarmoshrefi, Ansgar Kellner, Jose Andre Morales, Bud Mishra. Identity Deception and Game Deterrence via Signaling Games
0 -- 0Paul Curzon, Ann Blandford, Harold Thimbleby, Anna Louise Cox. Safer Interactive Medical Device Design: Insights from the CHI+MED Project
0 -- 0Hang Zhang, Parisa Memarmoshrefi, Fatemeh Ashrafi, Dieter Hogrefe. Investigating the Learning Phase of an Autonomous Authentication in Mobile Ad-hoc Networks
0 -- 0Alexia Chatzikonstantinou, Christoforos Ntantogian, Georgios Karopoulos, Christos Xenakis. Evaluation of Cryptography Usage in Android Applications
0 -- 0Ahmad Y. Javaid, Quamar Niyaz, Weiqing Sun, Mansoor Alam. A Deep Learning Approach for Network Intrusion Detection System

Volume 3, Issue 7

0 -- 0Neil C. Rowe. Identifying forensically uninteresting files in a large corpus
0 -- 0Apala Ray, Johan Åkerberg, Mats Björkman, Mikael Gidlund. Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase
0 -- 0Helge Janicke, Kevin I. Jones, Leandros A. Maglaras. Security, Privacy and Trust in Cyber Physical Systems
0 -- 0Najlaa Almajed, Leandros A. Maglaras, François Siewe, Helge Janicke, Pooneh Bagheri Zadeh. Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities
0 -- 0Kalikinkar Mandal, Guang Gong. Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications

Volume 3, Issue 10

0 -- 0Umut Dur, Robert Hammond, Thayer Morrill. The Secure Boston Mechanism
0 -- 0Ken Keefe, William H. Sanders. Reliability Analysis with Dynamic Reliability Block Diagrams in the Möbius Modeling Tool
0 -- 0Gian-Luca Dei Rossi, Mauro Iacono, Andrea Marin. Evaluating the impact of eDoS attacks to cloud facilities
0 -- 0Wataru Noguchi, Hiroyuki Iizuka, Masahito Yamamoto. Proposing Multimodal Integration Model Using LSTM and Autoencoder
0 -- 0Jianing Zhao, Peter Kemper. Protecting Encryption Keys in Mobile Systems Against Memory Errors