default search action
EAI Endorsed Transactions on Security and Safety, Volume 8
Volume 8, Number 27, 2021
- Tomasz Kosinski, Riccardo Scandariato, Morten Fjeld:
SyntIoT: Privacy and security experimentation in consumer-oriented IoT ecosystems. e1 - Qiuqing Jin, Liming Wang:
Zero-Trust Based Distributed Collaborative Dynamic Access Control Scheme with Deep Multi-Agent Reinforcement Learning. e2 - Philip Dale Huff, Qinghua Li:
Towards Automating the Assessment of Software Vulnerability Risk. e3 - Guanxiong Ha, Hang Chen, Ruiqi Li, Wei Shao, Chunfu Jia:
A Rekeying Scheme for Encrypted Deduplication Storage based on NTRU. e4 - Shiying Pan, Can Yang, Runmin Li:
GIP3: Make Privacy Preserving be Easier on Cloud. e5
Volume 8, Number 28, 2021
- Anna Bakas, Anne Wagner, Spencer Johnston, Shelia Kennison, Eric Chan-Tin:
Impact of Personality Types and Matching Messaging on Password Strength. e1 - Hong Liu, Eugene Y. Vasserman:
Side-channel Programming for Software Integrity Checking. e2 - Zheyuan Liu, Rui Zhang:
Privacy Preserving Collaborative Machine Learning. e3 - Mohammad Ashiqur Rahman, Amarjit Datta, Ehab Al-Shaer:
Automated Configuration Synthesis for Resilient Smart Metering Infrastructure. e4 - Kamrul Hasan, Sachin Shetty, Sharif Ullah, Amin Hassanzadeh, Tariqul Islam:
Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems. e5
Volume 8, Number 29, 2021
- Zhengping Luo, Tao Hou, Xiangrong Zhou, Hui Zeng, Zhuo Lu:
Binary Code Similarity Detection through LSTM and Siamese Neural Network. e1 - Prabesh Pathak, Prabesh Poudel, Sankardas Roy, Doina Caragea:
Leveraging attention-based deep neural networks for security vetting of Android applications. e2 - Hela Mliki, Abir Hadj Kaceam, Lamia Chaari:
A Comprehensive Survey on Intrusion Detection based Machine Learning for IoT Networks. e3 - Zezhang Yang, Jian Li, Ping Yang:
FedADMP: A Joint Anomaly Detection and Mobility Prediction Framework via Federated Learning. e4 - Joshua Bassey, Xiangfang Li, Lijun Qian:
Device Authentication Codes based on RF Fingerprinting using Deep Learning. e5
Volume 8, Number 30, 2022
- Adeel A. Malik, Deepak K. Tosh:
Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems. 1 - Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin:
Comparing Online Surveys for Cybersecurity: SONA and MTurk. 2 - Yang Lu, Shujun Li, Alex Alves Freitas, Athina Ioannou:
How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis. 3 - Zhen Huang, Gang Tan, Xiaowei Yu:
Mitigating Vulnerabilities in Closed Source Software. 4 - Muhammad Shoaib Akhtar, Tao Feng:
A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers. 5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.