default search action
Cybersecurity, Volume 1
Volume 1, Number 1, December 2018
- Qionglu Zhang, Shijie Jia, Bing Chang, Bo Chen:
Ensuring data confidentiality via plausibly deniable encryption and secure deletion - a survey. 1 - Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Peng Liu:
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing. 2 - Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Peng Liu:
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks. 3 - Guozhu Meng, Ruitao Feng, Guangdong Bai, Kai Chen, Yang Liu:
DroidEcho: an in-depth dissection of malicious behaviors in Android applications. 4 - Chen Tian, Yazhe Wang, Peng Liu, Qihui Zhou, Chengyi Zhang:
Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes. 5 - Jun Li, Bodong Zhao, Chao Zhang:
Fuzzing: a survey. 6 - Bing Chang, Yingjiu Li, Qiongxiao Wang, Wen Tao Zhu, Robert H. Deng:
Making a good thing better: enhancing password/PIN-based user authentication with smartwatch. 7 - Qianqian Zhao, Kai Chen, Tongxin Li, Yi Yang, XiaoFeng Wang:
Detecting telecommunication fraud by understanding the contents of a call. 8 - Lu Sun, Mingtian Tan, Zhe Zhou:
A survey of practical adversarial example attacks. 9 - Jixin Zhang, Kehuan Zhang, Zheng Qin, Hui Yin, Qixin Wu:
Sensitive system calls based packed malware variants detection using principal component initialized MultiLayers neural networks. 10 - Biao Wang, Xueqing Wang, Rui Xue:
CCA1 secure FHE from PIO, revisited. 11 - Zhenbin Yan, Yi Deng, Yiru Sun:
Concurrent non-malleable zero-knowledge and simultaneous resettable non-malleable zero-knowledge in constant rounds. 12 - Ziqi Yang, Zhenkai Liang:
Automated identification of sensitive data from implicit user specification. 13 - Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao, Raheem Beyah:
Cloud repository as a malicious service: challenge, identification and implication. 14 - Ahmet Okutan, Gordon Werner, Shanchieh Jay Yang, Katie McConky:
Forecasting cyberattacks with incomplete, imbalanced, and insignificant data. 15 - Fabian Böhm, Florian Menges, Günther Pernul:
Graph-based visual analytics for cyber threat intelligence. 16
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.