Journal: ICST Trans. Security Safety

Volume 6, Issue 22

0 -- 0Yuxuan Chen, Xuejing Yuan, Aohui Wang, Kai Chen 0012, Shengzhi Zhang, Heqing Huang. Manipulating Users' Trust on Amazon Echo: Compromising Smart Home from Outside
0 -- 0Agbotiname Lucky Imoize, Boluwatife Samuel Ben-Adeola, John Adetunji Adebisi. Development of a Multifactor-Security-Protocol System Using Ambient Noise Synthesis
0 -- 0Yifan Tian, Jiawei Yuan, Yantian Hou. CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized k-d Forest
0 -- 0David Mohaisen, Sencun Zhu. Editorial
0 -- 0Qais Tasali, Christine Sublett, Eugene Y. Vasserman. Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems

Volume 6, Issue 21

0 -- 0Saeed Ibrahim Alqahtani, Shujun Li, Haiyue Yuan, Patrice Rusconi. Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More?
0 -- 0Andrew Meyer, Sankardas Roy. Do Metadata-based Deleted-File-Recovery (DFR) Tools Meet NIST Guidelines?
0 -- 0Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamouha. Attacker Capability based Dynamic Deception Model for Large-Scale Networks
0 -- 0Yi Li 0023, Kaiqi Xiong, Xiangyang Li. Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur
0 -- 0Zhengping Luo, Zhe Qu, Tung Thanh Nguyen, Hui Zeng, Zhuo Lu. Security of HPC Systems: From a Log-analyzing Perspective

Volume 6, Issue 20

0 -- 0Anyi Liu, Selena Haidar, Yuan Cheng, Yingjiu Li. Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log
0 -- 0Vinay Sachidananda, Suhas Bhairav, Yuval Elovici. Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service
0 -- 0Qiumao Ma, Wensheng Zhang 0001. Octopus ORAM: An Oblivious RAM with Communication and Server Storage Efficiency
0 -- 0Weiqi Cui, Jiangmin Yu, Yanmin Gong, Eric Chan-Tin. Efficient, Effective, and Realistic Website Fingerprinting Mitigation
0 -- 0Hongfa Xue, Yurong Chen, Guru Venkataramani, Tian Lan. AMASS: Automated Software Mass Customization via Feature Identification and Tailoring

Volume 6, Issue 19

0 -- 0Yuzhe Tang, Kai Li, Katchaguy Areekijseree, Shuigeng Zhou, Liting Hu. Privacy-Preserving Multi-Party Directory Services
0 -- 0Vasileios Anastopoulos, Sokratis K. Katsikas. A Methodology for the Dynamic Design of Adaptive Log Management Infrastructures
0 -- 0Naiwei Liu, Wanyu Zang, Songqing Chen, Meng Yu, Ravi Sandhu. Adaptive Noise Injection against Side-Channel Attacks on ARM Platform
0 -- 0Wei Zhang, Jingwen Zhao, Fengqiong Wei, Yunfang Chen. Differentially Private High-Dimensional Data Publication via Markov Network
0 -- 0Rocio Lopez Perez, Florian Adamsky, Ridha Soua, Thomas Engel 0001. Forget the Myth of the Air Gap: Machine Learning for Reliable Intrusion Detection in SCADA Systems