Journal: ICST Trans. Security Safety

Volume 8, Issue 30

1 -- 0Adeel A. Malik, Deepak K. Tosh. Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems
2 -- 0Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin. Comparing Online Surveys for Cybersecurity: SONA and MTurk
3 -- 0Yang Lu, Shujun Li, Alex Freitas, Athina Ioannou. How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis
4 -- 0Zhen Huang 0002, Gang Tan, Xiaowei Yu. Mitigating Vulnerabilities in Closed Source Software
5 -- 0Muhammad Shoaib Akhtar, Tao Feng 0007. A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers

Volume 8, Issue 29

0 -- 0Zhengping Luo, Tao Hou, Xiangrong Zhou, Hui Zeng, Zhuo Lu. Binary Code Similarity Detection through LSTM and Siamese Neural Network
0 -- 0Prabesh Pathak, Prabesh Poudel, Sankardas Roy, Doina Caragea. Leveraging attention-based deep neural networks for security vetting of Android applications
0 -- 0Joshua Bassey, Xiangfang Li, Lijun Qian. Device Authentication Codes based on RF Fingerprinting using Deep Learning
0 -- 0Hela Mliki, Abir Hadj Kaceam, Lamia Chaari. A Comprehensive Survey on Intrusion Detection based Machine Learning for IoT Networks
0 -- 0Zezhang Yang, Jian Li 0008, Ping Yang 0002. FedADMP: A Joint Anomaly Detection and Mobility Prediction Framework via Federated Learning

Volume 8, Issue 28

0 -- 0Hong Liu, Eugene Y. Vasserman. Side-channel Programming for Software Integrity Checking
0 -- 0Mohammad Ashiqur Rahman, Amarjit Datta, Ehab Al-Shaer. Automated Configuration Synthesis for Resilient Smart Metering Infrastructure
0 -- 0Kamrul Hasan, Sachin Shetty, Sharif Ullah, Amin Hassanzadeh, Tariqul Islam. Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems
0 -- 0Zheyuan Liu, Rui Zhang. Privacy Preserving Collaborative Machine Learning
0 -- 0Anna Bakas, Anne Wagner, Spencer Johnston, Shelia Kennison, Eric Chan-Tin. Impact of Personality Types and Matching Messaging on Password Strength

Volume 8, Issue 27

0 -- 0Tomasz Kosinski, Riccardo Scandariato, Morten Fjeld. SyntIoT: Privacy and security experimentation in consumer-oriented IoT ecosystems
0 -- 0Shiying Pan, Can Yang, Runmin Li. GIP3: Make Privacy Preserving be Easier on Cloud
0 -- 0Philip Dale Huff, Qinghua Li. Towards Automating the Assessment of Software Vulnerability Risk
0 -- 0Guanxiong Ha, Hang Chen, Ruiqi Li, Wei Shao, Chunfu Jia. A Rekeying Scheme for Encrypted Deduplication Storage based on NTRU
0 -- 0Qiuqing Jin, Liming Wang. Zero-Trust Based Distributed Collaborative Dynamic Access Control Scheme with Deep Multi-Agent Reinforcement Learning