default search action
EAI Endorsed Transactions on Security and Safety, Volume 3
Volume 3, Number 7, December 2016
- Helge Janicke, Kevin I. Jones, Leandros A. Maglaras:
Security, Privacy and Trust in Cyber Physical Systems. e1 - Neil C. Rowe:
Identifying forensically uninteresting files in a large corpus. e2 - Kalikinkar Mandal, Guang Gong:
Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications. e3 - Najlaa Almajed, Leandros A. Maglaras, François Siewe, Helge Janicke, Pooneh Bagheri Zadeh:
Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities. e4 - Apala Ray, Johan Åkerberg, Mats Björkman, Mikael Gidlund:
Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase. e5
Volume 3, Number 8, December 2016
- Harald Bucher, Marius-Florian Buciuman, Alexander Klimm, Oliver Sander, Jürgen Becker:
A V2X message evaluation methodology and cross-domain modelling of safety applications in V2X-enabled E/E-architectures. 71-78 - Mohammad Qasem, Lukas Pustina:
ITFComp: a compression algorithm for ARM architecture instruction trace files. 200-207 - Tristan Caulfield, David J. Pym:
Modelling and simulating systems security policy. 9-18 - Chitra Javali, Girish Revadigar, Ming Ding, Sanjay Jha:
Secret Key Generation by Virtual Link Estimation. - Girish Revadigar, Chitra Javali, Hassan Jameel Asghar, Kasper Bonne Rasmussen, Sanjay Jha:
Mobility Independent Secret Key Generation for Wearable Health-care Devices.
Volume 3, Number 9, December 2016
- Paul Curzon, Ann Blandford, Harold Thimbleby, Anna Louise Cox:
Safer Interactive Medical Device Design: Insights from the CHI+MED Project. e1 - Ahmad Y. Javaid, Quamar Niyaz, Weiqing Sun, Mansoor Alam:
A Deep Learning Approach for Network Intrusion Detection System. e2 - William Casey, Parisa Memarmoshrefi, Ansgar Kellner, Jose Andre Morales, Bud Mishra:
Identity Deception and Game Deterrence via Signaling Games. e3 - Alexia Chatzikonstantinou, Christoforos Ntantogian, Georgios Karopoulos, Christos Xenakis:
Evaluation of Cryptography Usage in Android Applications. e4 - Hang Zhang, Parisa Memarmoshrefi, Fatemeh Ashrafi, Dieter Hogrefe:
Investigating the Learning Phase of an Autonomous Authentication in Mobile Ad-hoc Networks. e5
Volume 3, Number 10, December 2016
- Wataru Noguchi, Hiroyuki Iizuka, Masahito Yamamoto:
Proposing Multimodal Integration Model Using LSTM and Autoencoder. e1 - Gian-Luca Dei Rossi, Mauro Iacono, Andrea Marin:
Evaluating the impact of eDoS attacks to cloud facilities. e2 - Ken Keefe, William H. Sanders:
Reliability Analysis with Dynamic Reliability Block Diagrams in the Möbius Modeling Tool. e3 - Jianing Zhao, Peter Kemper:
Protecting Encryption Keys in Mobile Systems Against Memory Errors. e4 - Umut Mert Dur, Robert Hammond, Thayer Morrill:
The Secure Boston Mechanism. e5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.