Search dblp for Publications

export results for "stream:journals/sesa:"

 download as .bib file

@article{DBLP:journals/sesa/AkhtarF22,
  author       = {Muhammad Shoaib Akhtar and
                  Tao Feng},
  title        = {A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms
                  over {IOT} Layers},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {30},
  pages        = {5},
  year         = {2022},
  url          = {https://doi.org/10.4108/eetss.v8i30.590},
  doi          = {10.4108/EETSS.V8I30.590},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/AkhtarF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HuangTY22,
  author       = {Zhen Huang and
                  Gang Tan and
                  Xiaowei Yu},
  title        = {Mitigating Vulnerabilities in Closed Source Software},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {30},
  pages        = {4},
  year         = {2022},
  url          = {https://doi.org/10.4108/eetss.v8i30.253},
  doi          = {10.4108/EETSS.V8I30.253},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/HuangTY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LuLFI22,
  author       = {Yang Lu and
                  Shujun Li and
                  Alex Alves Freitas and
                  Athina Ioannou},
  title        = {How data-sharing nudges influence people's privacy preferences: {A}
                  machine learning-based analysis},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {30},
  pages        = {3},
  year         = {2022},
  url          = {https://doi.org/10.4108/eai.21-12-2021.172440},
  doi          = {10.4108/EAI.21-12-2021.172440},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/LuLFI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MalikT22,
  author       = {Adeel A. Malik and
                  Deepak K. Tosh},
  title        = {Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical
                  Systems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {30},
  pages        = {1},
  year         = {2022},
  url          = {https://doi.org/10.4108/eai.25-1-2022.172997},
  doi          = {10.4108/EAI.25-1-2022.172997},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/MalikT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/WagnerBKC22,
  author       = {Anne Wagner and
                  Anna Bakas and
                  Shelia Kennison and
                  Eric Chan{-}Tin},
  title        = {Comparing Online Surveys for Cybersecurity: {SONA} and MTurk},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {30},
  pages        = {2},
  year         = {2022},
  url          = {https://doi.org/10.4108/eai.8-2-2022.173334},
  doi          = {10.4108/EAI.8-2-2022.173334},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/WagnerBKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/Al-WadiA21,
  author       = {Mazen Al{-}Wadi and
                  Amro Awad},
  title        = {Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached
                  Memories},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {24},
  pages        = {e1},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.13-7-2018.165516},
  doi          = {10.4108/EAI.13-7-2018.165516},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/Al-WadiA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/BakasWJKC21,
  author       = {Anna Bakas and
                  Anne Wagner and
                  Spencer Johnston and
                  Shelia Kennison and
                  Eric Chan{-}Tin},
  title        = {Impact of Personality Types and Matching Messaging on Password Strength},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {28},
  pages        = {e1},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.1-6-2021.170012},
  doi          = {10.4108/EAI.1-6-2021.170012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/BakasWJKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/BasseyLQ21,
  author       = {Joshua Bassey and
                  Xiangfang Li and
                  Lijun Qian},
  title        = {Device Authentication Codes based on {RF} Fingerprinting using Deep
                  Learning},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {29},
  pages        = {e5},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.30-11-2021.172305},
  doi          = {10.4108/EAI.30-11-2021.172305},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/BasseyLQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HaCLSJ21,
  author       = {Guanxiong Ha and
                  Hang Chen and
                  Ruiqi Li and
                  Wei Shao and
                  Chunfu Jia},
  title        = {A Rekeying Scheme for Encrypted Deduplication Storage based on {NTRU}},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {27},
  pages        = {e4},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.25-6-2021.170248},
  doi          = {10.4108/EAI.25-6-2021.170248},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/HaCLSJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HasanSUHI21,
  author       = {Kamrul Hasan and
                  Sachin Shetty and
                  Sharif Ullah and
                  Amin Hassanzadeh and
                  Tariqul Islam},
  title        = {Criticality based Optimal Cyber Defense Remediation in Energy Delivery
                  Systems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {28},
  pages        = {e5},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.10-9-2021.170949},
  doi          = {10.4108/EAI.10-9-2021.170949},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/HasanSUHI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HuffL21,
  author       = {Philip Dale Huff and
                  Qinghua Li},
  title        = {Towards Automating the Assessment of Software Vulnerability Risk},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {27},
  pages        = {e3},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.25-6-2021.170247},
  doi          = {10.4108/EAI.25-6-2021.170247},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/HuffL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/JinW21,
  author       = {Qiuqing Jin and
                  Liming Wang},
  title        = {Zero-Trust Based Distributed Collaborative Dynamic Access Control
                  Scheme with Deep Multi-Agent Reinforcement Learning},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {27},
  pages        = {e2},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.25-6-2021.170246},
  doi          = {10.4108/EAI.25-6-2021.170246},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/JinW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/KosinskiSF21,
  author       = {Tomasz Kosinski and
                  Riccardo Scandariato and
                  Morten Fjeld},
  title        = {SyntIoT: Privacy and security experimentation in consumer-oriented
                  IoT ecosystems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {27},
  pages        = {e1},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.25-6-2021.170245},
  doi          = {10.4108/EAI.25-6-2021.170245},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/KosinskiSF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LiuV21,
  author       = {Hong Liu and
                  Eugene Y. Vasserman},
  title        = {Side-channel Programming for Software Integrity Checking},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {28},
  pages        = {e2},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.2-6-2021.170013},
  doi          = {10.4108/EAI.2-6-2021.170013},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/LiuV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LiuZ21,
  author       = {Zheyuan Liu and
                  Rui Zhang},
  title        = {Privacy Preserving Collaborative Machine Learning},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {28},
  pages        = {e3},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.14-7-2021.170295},
  doi          = {10.4108/EAI.14-7-2021.170295},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/LiuZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LiuZHF21,
  author       = {Wanping Liu and
                  Zhoulan Zhang and
                  Cheng Huang and
                  Yong Fang},
  title        = {CLETer: {A} Character-level Evasion Technique Against Deep Learning
                  {DGA} Classifiers},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {24},
  pages        = {e5},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.18-2-2021.168723},
  doi          = {10.4108/EAI.18-2-2021.168723},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/LiuZHF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LuoHZZL21,
  author       = {Zhengping Luo and
                  Tao Hou and
                  Xiangrong Zhou and
                  Hui Zeng and
                  Zhuo Lu},
  title        = {Binary Code Similarity Detection through {LSTM} and Siamese Neural
                  Network},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {29},
  pages        = {e1},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.14-9-2021.170956},
  doi          = {10.4108/EAI.14-9-2021.170956},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/LuoHZZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MlikiKC21,
  author       = {Hela Mliki and
                  Abir Hadj Kaceam and
                  Lamia Chaari},
  title        = {A Comprehensive Survey on Intrusion Detection based Machine Learning
                  for IoT Networks},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {29},
  pages        = {e3},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.6-10-2021.171246},
  doi          = {10.4108/EAI.6-10-2021.171246},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/MlikiKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/NagothuCAB21,
  author       = {Deeraj Nagothu and
                  Yu Chen and
                  Alexander J. Aved and
                  Erik Blasch},
  title        = {Authenticating Video Feeds using Electric Network Frequency Estimation
                  at the Edge},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {24},
  pages        = {e4},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.4-2-2021.168648},
  doi          = {10.4108/EAI.4-2-2021.168648},
  timestamp    = {Fri, 12 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/NagothuCAB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/PanYL21,
  author       = {Shiying Pan and
                  Can Yang and
                  Runmin Li},
  title        = {{GIP3:} Make Privacy Preserving be Easier on Cloud},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {27},
  pages        = {e5},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.25-6-2021.170249},
  doi          = {10.4108/EAI.25-6-2021.170249},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/PanYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/PathakPRC21,
  author       = {Prabesh Pathak and
                  Prabesh Poudel and
                  Sankardas Roy and
                  Doina Caragea},
  title        = {Leveraging attention-based deep neural networks for security vetting
                  of Android applications},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {29},
  pages        = {e2},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.27-9-2021.171168},
  doi          = {10.4108/EAI.27-9-2021.171168},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/PathakPRC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/RahmanDA21,
  author       = {Mohammad Ashiqur Rahman and
                  Amarjit Datta and
                  Ehab Al{-}Shaer},
  title        = {Automated Configuration Synthesis for Resilient Smart Metering Infrastructure},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {28},
  pages        = {e4},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.10-9-2021.170948},
  doi          = {10.4108/EAI.10-9-2021.170948},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/RahmanDA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/SaqibGZM21,
  author       = {Najmudin Saqib and
                  Vasileios Germanos and
                  Wen Zeng and
                  Leandros Maglaras},
  title        = {Mapping of the Security Requirements of {GDPR} and {NISD}},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {24},
  pages        = {e2},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.30-6-2020.166283},
  doi          = {10.4108/EAI.30-6-2020.166283},
  timestamp    = {Fri, 12 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/SaqibGZM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/XiaSZRS21,
  author       = {Tianrou Xia and
                  Yuanyi Sun and
                  Sencun Zhu and
                  Zeeshan Rasheed and
                  Khurram Shafique},
  title        = {Toward {A} Network-Assisted Approach for Effective Ransomware Detection},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {24},
  pages        = {e3},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.28-1-2021.168506},
  doi          = {10.4108/EAI.28-1-2021.168506},
  timestamp    = {Fri, 12 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/XiaSZRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/YangLY21,
  author       = {Zezhang Yang and
                  Jian Li and
                  Ping Yang},
  title        = {FedADMP: {A} Joint Anomaly Detection and Mobility Prediction Framework
                  via Federated Learning},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {29},
  pages        = {e4},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.21-10-2021.171595},
  doi          = {10.4108/EAI.21-10-2021.171595},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/YangLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/AnwarKCACSNM20,
  author       = {Afsah Anwar and
                  Aminollah Khormali and
                  Jinchun Choi and
                  Hisham Alasmary and
                  Saeed Salem and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Measuring the Cost of Software Vulnerabilities},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {23},
  pages        = {e1},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.13-7-2018.164551},
  doi          = {10.4108/EAI.13-7-2018.164551},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/AnwarKCACSNM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/AzharW20,
  author       = {M. A. Hannan Bin Azhar and
                  Robert Vause Whitehead},
  title        = {A study of user experiences and network analysis on anonymity and
                  traceability of bitcoin transactions},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {25},
  pages        = {e3},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.30-4-2021.169577},
  doi          = {10.4108/EAI.30-4-2021.169577},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/AzharW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/BashirJZ20,
  author       = {Reem Bashir and
                  Helge Janicke and
                  Wen Zeng},
  title        = {Evaluating the Impact of Sandbox Applications on Live Digital Forensics
                  Investigation},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {25},
  pages        = {e2},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.8-4-2021.169179},
  doi          = {10.4108/EAI.8-4-2021.169179},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/BashirJZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ChenYWCZH20,
  author       = {Yuxuan Chen and
                  Xuejing Yuan and
                  Aohui Wang and
                  Kai Chen and
                  Shengzhi Zhang and
                  Heqing Huang},
  title        = {Manipulating Users' Trust on Amazon Echo: Compromising Smart Home
                  from Outside},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {22},
  pages        = {e3},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.13-7-2018.163924},
  doi          = {10.4108/EAI.13-7-2018.163924},
  timestamp    = {Tue, 28 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/ChenYWCZH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/FitwiYNC20,
  author       = {Alem Fitwi and
                  Meng Yuan and
                  Seyed Yahya Nikouei and
                  Yu Chen},
  title        = {Minor Privacy Protection by Real-time Children Identification and
                  Face Scrambling at the Edge},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {23},
  pages        = {e3},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.13-7-2018.164560},
  doi          = {10.4108/EAI.13-7-2018.164560},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/FitwiYNC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HanX20,
  author       = {Chunling Han and
                  Rui Xue},
  title        = {Aggregation for Privately Trained Different Types of Local Models},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {26},
  pages        = {e2},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.21-6-2021.170237},
  doi          = {10.4108/EAI.21-6-2021.170237},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/HanX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HeWSZ20,
  author       = {Yuan He and
                  Wengjie Wang and
                  Hongyu Sun and
                  Yuqing Zhang},
  title        = {Vul-Mirror: {A} Few-Shot Learning Method for Discovering Vulnerable
                  Code Clone},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {23},
  pages        = {e4},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.13-7-2018.165275},
  doi          = {10.4108/EAI.13-7-2018.165275},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/HeWSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/IkueroGBZ20,
  author       = {Friday Ehi Ikuero and
                  Vasileios Germanos and
                  Laurence Brooks and
                  Wen Zeng},
  title        = {Is E-voting Systems based on Blockchain Technology Efficient in Nigeria
                  General Elections?},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {25},
  pages        = {e1},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.10-3-2021.168964},
  doi          = {10.4108/EAI.10-3-2021.168964},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/IkueroGBZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ImoizeBA20,
  author       = {Agbotiname Lucky Imoize and
                  Boluwatife Samuel Ben{-}Adeola and
                  John Adetunji Adebisi},
  title        = {Development of a Multifactor-Security-Protocol System Using Ambient
                  Noise Synthesis},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {22},
  pages        = {e4},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.13-7-2018.163979},
  doi          = {10.4108/EAI.13-7-2018.163979},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/ImoizeBA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LiLTCO20,
  author       = {Lanhang Li and
                  Yuling Luo and
                  Shubin Tang and
                  Lvchen Cao and
                  Xue Ouyang},
  title        = {Image encryption algorithm using chaotic maps and cellular automata},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {26},
  pages        = {e3},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.21-6-2021.170238},
  doi          = {10.4108/EAI.21-6-2021.170238},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/LiLTCO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LiWYXL20,
  author       = {Yixin Li and
                  Liming Wang and
                  Jing Yang and
                  Zhen Xu and
                  Xi Luo},
  title        = {deMSF: a Method for Detecting Malicious Server Flocks for Same Campaign},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {26},
  pages        = {e1},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.21-6-2021.170236},
  doi          = {10.4108/EAI.21-6-2021.170236},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/LiWYXL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/Liu20,
  author       = {Yan Liu},
  title        = {User Identity Linkage Method Based on User Online Habit},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {26},
  pages        = {e5},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.22-6-2021.170240},
  doi          = {10.4108/EAI.22-6-2021.170240},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/Liu20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MohaisenZ20,
  author       = {David Mohaisen and
                  Sencun Zhu},
  title        = {Editorial},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {22},
  pages        = {e1},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.18-5-2020.164587},
  doi          = {10.4108/EAI.18-5-2020.164587},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/MohaisenZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ParkKPK20,
  author       = {SooHyun Park and
                  Yeongeun Kang and
                  Jeman Park and
                  Joongheon Kim},
  title        = {Self-Controllable Super-Resolution Deep Learning Framework for Surveillance
                  Drones in Security Applications},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {23},
  pages        = {e5},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.30-6-2020.165502},
  doi          = {10.4108/EAI.30-6-2020.165502},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/ParkKPK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/SunWFSZ20,
  author       = {Mingxin Sun and
                  Wenjie Wang and
                  Hantao Feng and
                  Hongu Sun and
                  Yuqing Zhang},
  title        = {Identify Vulnerability Fix Commits Automatically Using Hierarchical
                  Attention Network},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {23},
  pages        = {e2},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.13-7-2018.164552},
  doi          = {10.4108/EAI.13-7-2018.164552},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/SunWFSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/TasaliSV20,
  author       = {Qais Tasali and
                  Christine Sublett and
                  Eugene Y. Vasserman},
  title        = {Controlled {BTG:} Toward Flexible Emergency Override in Interoperable
                  Medical Systems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {22},
  pages        = {e2},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.13-7-2018.163213},
  doi          = {10.4108/EAI.13-7-2018.163213},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/TasaliSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/TianYH20,
  author       = {Yifan Tian and
                  Jiawei Yuan and
                  Yantian Hou},
  title        = {{CPAR:} Cloud-Assisted Privacy-preserving Image Annotation with Randomized
                  k-d Forest},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {22},
  pages        = {e5},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.13-7-2018.163999},
  doi          = {10.4108/EAI.13-7-2018.163999},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/TianYH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/Trieu-DoGXXF20,
  author       = {Van Trieu{-}Do and
                  Richard Garcia{-}Lebron and
                  Maochao Xu and
                  Shouhuai Xu and
                  Yusheng Feng},
  title        = {Characterizing and Leveraging Granger Causality in Cybersecurity:
                  Framework and Case Study},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {25},
  pages        = {e4},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.11-5-2021.169912},
  doi          = {10.4108/EAI.11-5-2021.169912},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/Trieu-DoGXXF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/Wang20,
  author       = {Li Wang},
  title        = {Shoal: {A} Network Level Moving Target Defense Engine with Software
                  Defined Networking},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {25},
  pages        = {e5},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.1-6-2021.170011},
  doi          = {10.4108/EAI.1-6-2021.170011},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/Wang20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ZhangW20,
  author       = {Jing Zhang and
                  Yu Wen},
  title        = {Malware Detection Based on Opcode Dynamic Analysis},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {26},
  pages        = {e4},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.22-6-2021.170239},
  doi          = {10.4108/EAI.22-6-2021.170239},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/ZhangW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/AlhebaishiWS19,
  author       = {Nawaf Alhebaishi and
                  Lingyu Wang and
                  Anoop Singhal},
  title        = {Threat Modeling for Cloud Infrastructures},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {17},
  pages        = {e5},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.10-1-2019.156246},
  doi          = {10.4108/EAI.10-1-2019.156246},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/AlhebaishiWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/AlqahtaniLYR19,
  author       = {Saeed Ibrahim Alqahtani and
                  Shujun Li and
                  Haiyue Yuan and
                  Patrice Rusconi},
  title        = {Human-Generated and Machine-Generated Ratings of Password Strength:
                  What Do Users Trust More?},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {21},
  pages        = {e1},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.13-7-2018.162797},
  doi          = {10.4108/EAI.13-7-2018.162797},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/AlqahtaniLYR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/AminSNTK19,
  author       = {Md Ali Reza Al Amin and
                  Sachin Shetty and
                  Laurent Njilla and
                  Deepak K. Tosh and
                  Charles Kamouha},
  title        = {Attacker Capability based Dynamic Deception Model for Large-Scale
                  Networks},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {21},
  pages        = {e2},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.13-7-2018.162808},
  doi          = {10.4108/EAI.13-7-2018.162808},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/AminSNTK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/AnastopoulosK19,
  author       = {Vasileios Anastopoulos and
                  Sokratis K. Katsikas},
  title        = {A Methodology for the Dynamic Design of Adaptive Log Management Infrastructures},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {19},
  pages        = {e2},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.25-1-2019.159347},
  doi          = {10.4108/EAI.25-1-2019.159347},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/AnastopoulosK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/CuiYGC19,
  author       = {Weiqi Cui and
                  Jiangmin Yu and
                  Yanmin Gong and
                  Eric Chan{-}Tin},
  title        = {Efficient, Effective, and Realistic Website Fingerprinting Mitigation},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {20},
  pages        = {e2},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.29-1-2019.161977},
  doi          = {10.4108/EAI.29-1-2019.161977},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/CuiYGC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/Gountia19,
  author       = {Debasis Gountia},
  title        = {Towards Scalability Trade-off and Security Issues in State-of-the-art
                  Blockchain},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {18},
  pages        = {e4},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.8-4-2019.157416},
  doi          = {10.4108/EAI.8-4-2019.157416},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/Gountia19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HeHC19,
  author       = {Xianmang He and
                  Yuan Hong and
                  Yindong Chen},
  title        = {Exploring the Privacy Bound for Differential Privacy: From Theory
                  to Practice},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {18},
  pages        = {e2},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.8-4-2019.157414},
  doi          = {10.4108/EAI.8-4-2019.157414},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/HeHC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HomoliakTOBHH19,
  author       = {Ivan Homoliak and
                  Martin Teknos and
                  Mart{\'{\i}}n Ochoa and
                  Dominik Breitenbacher and
                  Saeid Hosseini and
                  Petr Han{\'{a}}cek},
  title        = {Improving Network Intrusion Detection Classifiers by Non-payload-Based
                  Exploit-Independent Obfuscations: An Adversarial Approach},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {17},
  pages        = {e4},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.10-1-2019.156245},
  doi          = {10.4108/EAI.10-1-2019.156245},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/HomoliakTOBHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/JaferKRZ19,
  author       = {Muhammad Jafer and
                  M. Arif Khan and
                  Sabih ur Rehman and
                  Tanveer A. Zia},
  title        = {Secure Communication in {VANET} Broadcasting},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {17},
  pages        = {e2},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.10-1-2019.156243},
  doi          = {10.4108/EAI.10-1-2019.156243},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/JaferKRZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/KhaliliZBWSZ19,
  author       = {Mina Khalili and
                  Mengyuan Zhang and
                  Daniel Borbor and
                  Lingyu Wang and
                  Nicandro Scarabeo and
                  Michel{-}Ange Zamor},
  title        = {Monitoring and Improving Managed Security Services inside a Security
                  Operation Center},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {18},
  pages        = {e1},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.8-4-2019.157413},
  doi          = {10.4108/EAI.8-4-2019.157413},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/KhaliliZBWSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LiWS19,
  author       = {Yue Li and
                  Haining Wang and
                  Kun Sun},
  title        = {BluePass: {A} Mobile Device Assisted Password Manager},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {17},
  pages        = {e3},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.10-1-2019.156244},
  doi          = {10.4108/EAI.10-1-2019.156244},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/LiWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LiXL19,
  author       = {Yi Li and
                  Kaiqi Xiong and
                  Xiangyang Li},
  title        = {Applying Machine Learning Techniques to Understand User Behaviors
                  When Phishing Attacks Occur},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {21},
  pages        = {e3},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.13-7-2018.162809},
  doi          = {10.4108/EAI.13-7-2018.162809},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/LiXL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LiuHCL19,
  author       = {Anyi Liu and
                  Selena Haidar and
                  Yuan Cheng and
                  Yingjiu Li},
  title        = {Confidential State Verification for the Delegated Cloud Jobs with
                  Confidential Audit Log},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {20},
  pages        = {e3},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.13-7-2018.162290},
  doi          = {10.4108/EAI.13-7-2018.162290},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/LiuHCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LiuZCYS19,
  author       = {Naiwei Liu and
                  Wanyu Zang and
                  Songqing Chen and
                  Meng Yu and
                  Ravi S. Sandhu},
  title        = {Adaptive Noise Injection against Side-Channel Attacks on {ARM} Platform},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {19},
  pages        = {e1},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.25-1-2019.159346},
  doi          = {10.4108/EAI.25-1-2019.159346},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/LiuZCYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LuoQNZL19,
  author       = {Zhengping Luo and
                  Zhe Qu and
                  Tung Thanh Nguyen and
                  Hui Zeng and
                  Zhuo Lu},
  title        = {Security of {HPC} Systems: From a Log-analyzing Perspective},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {21},
  pages        = {e5},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.19-8-2019.163134},
  doi          = {10.4108/EAI.19-8-2019.163134},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/LuoQNZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MaZ19,
  author       = {Qiumao Ma and
                  Wensheng Zhang},
  title        = {Octopus {ORAM:} An Oblivious {RAM} with Communication and Server Storage
                  Efficiency},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {20},
  pages        = {e5},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.29-4-2019.162405},
  doi          = {10.4108/EAI.29-4-2019.162405},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/MaZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MeyerR19,
  author       = {Andrew Meyer and
                  Sankardas Roy},
  title        = {Do Metadata-based Deleted-File-Recovery {(DFR)} Tools Meet {NIST}
                  Guidelines?},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {21},
  pages        = {e4},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.13-7-2018.163091},
  doi          = {10.4108/EAI.13-7-2018.163091},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/MeyerR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/PerezASE19,
  author       = {Rocio Lopez Perez and
                  Florian Adamsky and
                  Ridha Soua and
                  Thomas Engel},
  title        = {Forget the Myth of the Air Gap: Machine Learning for Reliable Intrusion
                  Detection in {SCADA} Systems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {19},
  pages        = {e3},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.25-1-2019.159348},
  doi          = {10.4108/EAI.25-1-2019.159348},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/PerezASE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/SachidanandaBE19,
  author       = {Vinay Sachidananda and
                  Suhas Bhairav and
                  Yuval Elovici},
  title        = {Spill the Beans: Extrospection of Internet of Things by Exploiting
                  Denial of Service},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {20},
  pages        = {e1},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.13-7-2018.159803},
  doi          = {10.4108/EAI.13-7-2018.159803},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/SachidanandaBE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/SongWZW19,
  author       = {Yang Song and
                  Chen Wu and
                  Sencun Zhu and
                  Haining Wang},
  title        = {A Machine Learning Based Approach for Mobile App Rating Manipulation
                  Detection},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {18},
  pages        = {e3},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.8-4-2019.157415},
  doi          = {10.4108/EAI.8-4-2019.157415},
  timestamp    = {Mon, 24 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/SongWZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/TangLAZH19,
  author       = {Yuzhe Richard Tang and
                  Kai Li and
                  Katchaguy Areekijseree and
                  Shuigeng Zhou and
                  Liting Hu},
  title        = {Privacy-Preserving Multi-Party Directory Services},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {19},
  pages        = {e5},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.29-7-2019.159627},
  doi          = {10.4108/EAI.29-7-2019.159627},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/TangLAZH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/WangW19,
  author       = {Li Wang and
                  Dinghao Wu},
  title        = {Bridging the Gap Between Security Tools and {SDN} Controllers},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {17},
  pages        = {e1},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.10-1-2019.156242},
  doi          = {10.4108/EAI.10-1-2019.156242},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/WangW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/WangYLCYYJH19,
  author       = {Chonghua Wang and
                  Libo Yin and
                  Jun Li and
                  Xuehong Chen and
                  Rongchao Yin and
                  Xiaochun Yun and
                  Yang Jiao and
                  Zhiyu Hao},
  title        = {HProve: {A} Hypervisor Level Provenance System to Reconstruct Attack
                  Story Caused by Kernel Malware},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {18},
  pages        = {e5},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.8-4-2019.157417},
  doi          = {10.4108/EAI.8-4-2019.157417},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/WangYLCYYJH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/XueCVL19,
  author       = {Hongfa Xue and
                  Yurong Chen and
                  Guru Venkataramani and
                  Tian Lan},
  title        = {{AMASS:} Automated Software Mass Customization via Feature Identification
                  and Tailoring},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {20},
  pages        = {e4},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.13-7-2018.162291},
  doi          = {10.4108/EAI.13-7-2018.162291},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/XueCVL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ZhangZWC19,
  author       = {Wei Zhang and
                  Jingwen Zhao and
                  Fengqiong Wei and
                  Yunfang Chen},
  title        = {Differentially Private High-Dimensional Data Publication via Markov
                  Network},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {19},
  pages        = {e4},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.29-7-2019.159626},
  doi          = {10.4108/EAI.29-7-2019.159626},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/ZhangZWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/CeesayMW18,
  author       = {Ebrima N. Ceesay and
                  K. Myers and
                  Paul A. Watters},
  title        = {Human-centered strategies for cyber-physical systems security},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {14},
  pages        = {e5},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.15-5-2018.154773},
  doi          = {10.4108/EAI.15-5-2018.154773},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/CeesayMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ChinXR18,
  author       = {Tommy Chin and
                  Kaiqi Xiong and
                  Mohamed Rahouti},
  title        = {Kernel-Space Intrusion Detection Using Software-Defined Networking},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {15},
  pages        = {e2},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.13-7-2018.155168},
  doi          = {10.4108/EAI.13-7-2018.155168},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/ChinXR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/GuanFPGGL18,
  author       = {Le Guan and
                  Sadegh Farhang and
                  Yu Pu and
                  Pinyao Guo and
                  Jens Grossklags and
                  Peng Liu},
  title        = {VaultIME: Regaining User Control for Password Managers through Auto-correction},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {14},
  pages        = {e4},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.15-5-2018.154772},
  doi          = {10.4108/EAI.15-5-2018.154772},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/GuanFPGGL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HadjKBE18,
  author       = {Maryem Ait El Hadj and
                  Ahmed Khoumsi and
                  Yahya Benkaouz and
                  Mohammed Erradi},
  title        = {Formal Approach to Detect and Resolve Anomalies while Clustering {ABAC}
                  Policies},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {16},
  pages        = {e3},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.13-7-2018.156003},
  doi          = {10.4108/EAI.13-7-2018.156003},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/HadjKBE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HuangZY18,
  author       = {Chu Huang and
                  Sencun Zhu and
                  Yi Yang},
  title        = {An Evaluation Framework for Moving Target Defense Based on Analytic
                  Hierarchy Process},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {13},
  pages        = {e4},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.4-1-2018.153527},
  doi          = {10.4108/EAI.4-1-2018.153527},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/HuangZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/KamalakannanT18,
  author       = {V. Kamalakannan and
                  S. Tamilselvan},
  title        = {{FPGA} Implementation of Elliptic Curve Cryptoprocessor for Perceptual
                  Layer of the Internet of Things},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {15},
  pages        = {e4},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.15-10-2018.155739},
  doi          = {10.4108/EAI.15-10-2018.155739},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/KamalakannanT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/KaramiWC18,
  author       = {Mohammad Karami and
                  An Wang and
                  Songqing Chen},
  title        = {Attribution of Economic Denial of Sustainability Attacks in Public
                  Clouds},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {13},
  pages        = {e2},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.4-1-2018.153525},
  doi          = {10.4108/EAI.4-1-2018.153525},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/KaramiWC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MaglarasDNR18,
  author       = {Leandros Maglaras and
                  George Drivas and
                  Kleanthis Noou and
                  Stylianos Rallis},
  title        = {{NIS} directive: The case of Greece},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {14},
  pages        = {e1},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.15-5-2018.154769},
  doi          = {10.4108/EAI.15-5-2018.154769},
  timestamp    = {Fri, 12 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/MaglarasDNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MaglarasFDMJR18,
  author       = {Leandros Maglaras and
                  Mohamed Amine Ferrag and
                  Abdelouahid Derhab and
                  Mithun Mukherjee and
                  Helge Janicke and
                  Stylianos Rallis},
  title        = {Threats, Countermeasures and Attribution of Cyber Attacks on Critical
                  Infrastructures},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {16},
  pages        = {e1},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.15-10-2018.155856},
  doi          = {10.4108/EAI.15-10-2018.155856},
  timestamp    = {Fri, 12 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/MaglarasFDMJR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MengLWZZ18,
  author       = {Fanhao Meng and
                  Rongheng Lin and
                  Zhuoran Wang and
                  Hua Zou and
                  Shiqi Zhou},
  title        = {A Multi-connection Encryption Algorithm Applied in Secure Channel
                  Service System},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {15},
  pages        = {e1},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.15-5-2018.155167},
  doi          = {10.4108/EAI.15-5-2018.155167},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/MengLWZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MohaisenAPKNM18,
  author       = {Aziz Mohaisen and
                  Omar Alrawi and
                  Jeman Park and
                  Joongheon Kim and
                  DaeHun Nyang and
                  Manar Mohaisen},
  title        = {Network-based Analysis and Classification of Malware using Behavioral
                  Artifacts Ordering},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {16},
  pages        = {e2},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.13-7-2018.156002},
  doi          = {10.4108/EAI.13-7-2018.156002},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/MohaisenAPKNM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/QuHW18,
  author       = {Wenyu Qu and
                  Wei Huo and
                  Lingyu Wang},
  title        = {Opportunistic Diversity-Based Detection of Injection Attacks in Web
                  Applications},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {16},
  pages        = {e5},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.11-12-2018.156032},
  doi          = {10.4108/EAI.11-12-2018.156032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/QuHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/RizzettiSRMC18,
  author       = {Tiago Ant{\^{o}}nio Rizzetti and
                  Bol{\'{\i}}var Menezes da Silva and
                  Alexandre Silva Rodrigues and
                  Rafael Gressler Milbradt and
                  Luciane Neves Canha},
  title        = {A secure and lightweight multicast communication system for Smart
                  Grids},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {16},
  pages        = {e4},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.13-7-2018.156004},
  doi          = {10.4108/EAI.13-7-2018.156004},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/RizzettiSRMC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/RjaibiR18,
  author       = {Neila Rjaibi and
                  Latifa Ben Arfa Rabai},
  title        = {How Stakeholders Perceived Security Risks? {A} New Predictive Functional
                  Level Model and its Application to E-Learning},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {15},
  pages        = {e3},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.15-10-2018.155738},
  doi          = {10.4108/EAI.15-10-2018.155738},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/RjaibiR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/SunDSL18,
  author       = {Xiaoyan Sun and
                  Jun Dai and
                  Anoop Singhal and
                  Peng Liu},
  title        = {Probabilistic Inference of the Stealthy Bridges between Enterprise
                  Networks in Cloud},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {13},
  pages        = {e3},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.4-1-2018.153526},
  doi          = {10.4108/EAI.4-1-2018.153526},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/SunDSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/WangYR18,
  author       = {Zheng Wang and
                  Shui Yu and
                  Scott Rose},
  title        = {An On-Demand Defense Scheme Against {DNS} Cache Poisoning Attacks},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {14},
  pages        = {e3},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.15-5-2018.154771},
  doi          = {10.4108/EAI.15-5-2018.154771},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/WangYR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/Witte18,
  author       = {Tim Niklas Witte},
  title        = {Mouse Underlaying: Global Key and Mouse Listener Based on an Almost
                  Invisible Window with Local Listeners and Sophisticated Focus},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {15},
  pages        = {e5},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.15-10-2018.155740},
  doi          = {10.4108/EAI.15-10-2018.155740},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/Witte18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/Xiong18,
  author       = {Kaiqi Xiong},
  title        = {The performance analysis of public key cryptography-based authentication},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {14},
  pages        = {e2},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.15-5-2018.154770},
  doi          = {10.4108/EAI.15-5-2018.154770},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/Xiong18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/XuCGXS18,
  author       = {Lei Xu and
                  Lin Chen and
                  Zhimin Gao and
                  Shouhuai Xu and
                  Weidong Shi},
  title        = {Efficient Public Blockchain Client for Lightweight Users},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {13},
  pages        = {e5},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.4-1-2018.153528},
  doi          = {10.4108/EAI.4-1-2018.153528},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/XuCGXS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ZhuJM18,
  author       = {Sencun Zhu and
                  Kevin I. Jones and
                  Leandros A. Maglaras},
  title        = {Defence Mechanisms for Public Systems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {13},
  pages        = {e1},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.4-1-2018.153524},
  doi          = {10.4108/EAI.4-1-2018.153524},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/ZhuJM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/BalenBW17,
  author       = {Nicolas Van Balen and
                  Christopher T. Ball and
                  Haining Wang},
  title        = {Analysis of Targeted Mouse Movements for Gender Classification},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {11},
  pages        = {e3},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.7-12-2017.153395},
  doi          = {10.4108/EAI.7-12-2017.153395},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/BalenBW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ChengWZ17,
  author       = {Leixiao Cheng and
                  Quanshui Wu and
                  Yunlei Zhao},
  title        = {Compact lossy and all-but-one trapdoor functions from lattice},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {12},
  pages        = {e4},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.28-12-2017.153517},
  doi          = {10.4108/EAI.28-12-2017.153517},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/ChengWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/DongYCLZ17,
  author       = {Qi Dong and
                  Zekun Yang and
                  Yu Chen and
                  Xiaohua Li and
                  Kai Zeng},
  title        = {Exploration of Singular Spectrum Analysis for Online Anomaly Detection
                  in CRNs},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {12},
  pages        = {e3},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.28-12-2017.153516},
  doi          = {10.4108/EAI.28-12-2017.153516},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/DongYCLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/KannanWCBDB17,
  author       = {Subramaniyam Kannan and
                  Paul Wood and
                  Somali Chaterji and
                  Saurabh Bagchi and
                  Larry Deatrick and
                  Patricia Beane},
  title        = {{MAAT:} Multi-Stage Attack Attribution in Enterprise Systems using
                  Software Defined Networks},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {11},
  pages        = {e4},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.7-12-2017.153396},
  doi          = {10.4108/EAI.7-12-2017.153396},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/KannanWCBDB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/Leca17,
  author       = {Cristian Liviu Leca},
  title        = {Overview of Romania 802.11Wireless Security {\&} Statistics},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {12},
  pages        = {e5},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.28-12-2017.153518},
  doi          = {10.4108/EAI.28-12-2017.153518},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/Leca17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LiOMMG17,
  author       = {Yongfeng Li and
                  Jinbin Ouyang and
                  Bing Mao and
                  Kai Ma and
                  Shanqing Guo},
  title        = {Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling
                  and Callbacks},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {11},
  pages        = {e2},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.7-12-2017.153394},
  doi          = {10.4108/EAI.7-12-2017.153394},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/LiOMMG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/NiyazSJ17,
  author       = {Quamar Niyaz and
                  Weiqing Sun and
                  Ahmad Y. Javaid},
  title        = {A Deep Learning Based DDoS Detection System in Software-Defined Networking
                  {(SDN)}},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {12},
  pages        = {e2},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.28-12-2017.153515},
  doi          = {10.4108/EAI.28-12-2017.153515},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/NiyazSJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/PaladiG17,
  author       = {Nicolae Paladi and
                  Christian Gehrmann},
  title        = {Bootstrapping trust in software defined networks},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {11},
  pages        = {e5},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.7-12-2017.153397},
  doi          = {10.4108/EAI.7-12-2017.153397},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/PaladiG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/TanWFCJH17,
  author       = {Zheng Tan and
                  Cheng Wang and
                  Xiaoling Fu and
                  Jipeng Cui and
                  Changjun Jiang and
                  Weili Han},
  title        = {Re-identification of Vehicular Location-Based Metadata},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {11},
  pages        = {e1},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.7-12-2017.153393},
  doi          = {10.4108/EAI.7-12-2017.153393},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/TanWFCJH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ZhuJM17,
  author       = {Sencun Zhu and
                  Kevin I. Jones and
                  Leandros A. Maglaras},
  title        = {Vulnerability Analysis, Intrusion Detection and Privacy Preservation
                  of Modern Communication Systems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {12},
  pages        = {e1},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.28-12-2017.153514},
  doi          = {10.4108/EAI.28-12-2017.153514},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/ZhuJM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/AlmajedMSJZ16,
  author       = {Najlaa Almajed and
                  Leandros A. Maglaras and
                  Fran{\c{c}}ois Siewe and
                  Helge Janicke and
                  Pooneh Bagheri Zadeh},
  title        = {Prevention of crime in {B2C} E-Commerce: How E-Retailers/Banks protect
                  themselves from Criminal Sctivities},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {7},
  pages        = {e4},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.8-12-2016.151727},
  doi          = {10.4108/EAI.8-12-2016.151727},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/AlmajedMSJZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/CaseyMKMM16,
  author       = {William Casey and
                  Parisa Memarmoshrefi and
                  Ansgar Kellner and
                  Jose Andre Morales and
                  Bud Mishra},
  title        = {Identity Deception and Game Deterrence via Signaling Games},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {9},
  pages        = {e3},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.3-12-2015.2262519},
  doi          = {10.4108/EAI.3-12-2015.2262519},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/CaseyMKMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/Chatzikonstantinou16,
  author       = {Alexia Chatzikonstantinou and
                  Christoforos Ntantogian and
                  Georgios Karopoulos and
                  Christos Xenakis},
  title        = {Evaluation of Cryptography Usage in Android Applications},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {9},
  pages        = {e4},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.3-12-2015.2262471},
  doi          = {10.4108/EAI.3-12-2015.2262471},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/Chatzikonstantinou16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/CurzonBTC16,
  author       = {Paul Curzon and
                  Ann Blandford and
                  Harold Thimbleby and
                  Anna Louise Cox},
  title        = {Safer Interactive Medical Device Design: Insights from the {CHI+MED}
                  Project},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {9},
  pages        = {e1},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.14-10-2015.2261752},
  doi          = {10.4108/EAI.14-10-2015.2261752},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/CurzonBTC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/DurHM16,
  author       = {Umut Mert Dur and
                  Robert Hammond and
                  Thayer Morrill},
  title        = {The Secure Boston Mechanism},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {10},
  pages        = {e5},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.8-8-2015.2260861},
  doi          = {10.4108/EAI.8-8-2015.2260861},
  timestamp    = {Mon, 23 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/DurHM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/JanickeJM16,
  author       = {Helge Janicke and
                  Kevin I. Jones and
                  Leandros A. Maglaras},
  title        = {Security, Privacy and Trust in Cyber Physical Systems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {7},
  pages        = {e1},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.8-12-2016.151724},
  doi          = {10.4108/EAI.8-12-2016.151724},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/JanickeJM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/JavaidNSA16,
  author       = {Ahmad Y. Javaid and
                  Quamar Niyaz and
                  Weiqing Sun and
                  Mansoor Alam},
  title        = {A Deep Learning Approach for Network Intrusion Detection System},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {9},
  pages        = {e2},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.3-12-2015.2262516},
  doi          = {10.4108/EAI.3-12-2015.2262516},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/JavaidNSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/KeefeS16,
  author       = {Ken Keefe and
                  William H. Sanders},
  title        = {Reliability Analysis with Dynamic Reliability Block Diagrams in the
                  M{\"{o}}bius Modeling Tool},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {10},
  pages        = {e3},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.14-12-2015.2262723},
  doi          = {10.4108/EAI.14-12-2015.2262723},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/KeefeS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MandalG16,
  author       = {Kalikinkar Mandal and
                  Guang Gong},
  title        = {Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations
                  for Securing {RFID} Applications},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {7},
  pages        = {e3},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.8-12-2016.151726},
  doi          = {10.4108/EAI.8-12-2016.151726},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/MandalG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/NoguchiIY16,
  author       = {Wataru Noguchi and
                  Hiroyuki Iizuka and
                  Masahito Yamamoto},
  title        = {Proposing Multimodal Integration Model Using {LSTM} and Autoencoder},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {10},
  pages        = {e1},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.3-12-2015.2262505},
  doi          = {10.4108/EAI.3-12-2015.2262505},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/NoguchiIY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/RayABG16,
  author       = {Apala Ray and
                  Johan {\AA}kerberg and
                  Mats Bj{\"{o}}rkman and
                  Mikael Gidlund},
  title        = {Assessing Security, Capacity and Reachability of a Heterogeneous Industrial
                  Network during Planning Phase},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {7},
  pages        = {e5},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.8-12-2016.151728},
  doi          = {10.4108/EAI.8-12-2016.151728},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/RayABG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/RossiIM16,
  author       = {Gian{-}Luca Dei Rossi and
                  Mauro Iacono and
                  Andrea Marin},
  title        = {Evaluating the impact of eDoS attacks to cloud facilities},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {10},
  pages        = {e2},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.14-12-2015.2262650},
  doi          = {10.4108/EAI.14-12-2015.2262650},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/RossiIM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/Rowe16,
  author       = {Neil C. Rowe},
  title        = {Identifying forensically uninteresting files in a large corpus},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {7},
  pages        = {e2},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.8-12-2016.151725},
  doi          = {10.4108/EAI.8-12-2016.151725},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/Rowe16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ZhangMAH16,
  author       = {Hang Zhang and
                  Parisa Memarmoshrefi and
                  Fatemeh Ashrafi and
                  Dieter Hogrefe},
  title        = {Investigating the Learning Phase of an Autonomous Authentication in
                  Mobile Ad-hoc Networks},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {9},
  pages        = {e5},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.3-12-2015.2262465},
  doi          = {10.4108/EAI.3-12-2015.2262465},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/ZhangMAH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ZhaoK16,
  author       = {Jianing Zhao and
                  Peter Kemper},
  title        = {Protecting Encryption Keys in Mobile Systems Against Memory Errors},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {3},
  number       = {10},
  pages        = {e4},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.14-12-2015.2262698},
  doi          = {10.4108/EAI.14-12-2015.2262698},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/ZhaoK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/AhmatMB15,
  author       = {Daouda Ahmat and
                  Damien Magoni and
                  Tegawend{\'{e}} F. Bissyand{\'{e}}},
  title        = {End-to-End Key Exchange through Disjoint Paths in {P2P} Networks},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {3},
  pages        = {e3},
  year         = {2015},
  url          = {https://doi.org/10.4108/sesa.2.3.e3},
  doi          = {10.4108/SESA.2.3.E3},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/AhmatMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/AlarfiF15,
  author       = {Fahad Alarifi and
                  Maribel Fern{\'{a}}ndez},
  title        = {Towards Privacy-Preserving Web Metering Via User-Centric Hardware},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {4},
  pages        = {e4},
  year         = {2015},
  url          = {https://doi.org/10.4108/eai.5-10-2015.150478},
  doi          = {10.4108/EAI.5-10-2015.150478},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/AlarfiF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/BrinnBBBCR15,
  author       = {Marshall Brinn and
                  Nicholas Bastin and
                  Andy C. Bavier and
                  Mark Berman and
                  Jeffrey S. Chase and
                  Robert Ricci},
  title        = {Trust as the Foundation of Resource Exchange in {GENI}},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {5},
  pages        = {e1},
  year         = {2015},
  url          = {https://doi.org/10.4108/icst.tridentcom.2015.259683},
  doi          = {10.4108/ICST.TRIDENTCOM.2015.259683},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/BrinnBBBCR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/BurghouwtSS15,
  author       = {Pieter Burghouwt and
                  Marcel E. M. Spruit and
                  Henk J. Sips},
  title        = {Detection of Botnet Command and Control Traffic by the Multistage
                  Trust Evaluation of Destination Identifiers},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {4},
  pages        = {e2},
  year         = {2015},
  url          = {https://doi.org/10.4108/eai.5-10-2015.150476},
  doi          = {10.4108/EAI.5-10-2015.150476},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/BurghouwtSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ChenS15,
  author       = {Kai Chen and
                  Jun Shao},
  title        = {Preface to special issue on miscellaneous emerging security problems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {4},
  pages        = {e1},
  year         = {2015},
  url          = {https://doi.org/10.4108/eai.5-10-2015.150475},
  doi          = {10.4108/EAI.5-10-2015.150475},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/ChenS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ElashryMS15,
  author       = {Ibrahim F. Elashry and
                  Yi Mu and
                  Willy Susilo},
  title        = {Mediated Encryption: Analysis and Design},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {3},
  pages        = {e2},
  year         = {2015},
  url          = {https://doi.org/10.4108/sesa.2.3.e2},
  doi          = {10.4108/SESA.2.3.E2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/ElashryMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/FanMG15,
  author       = {Xinxin Fan and
                  Kalikinkar Mandal and
                  Guang Gong},
  title        = {{WG-8:} {A} Lightweight Stream Cipher for Resource-Constrained Smart
                  Devices},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {3},
  pages        = {e4},
  year         = {2015},
  url          = {https://doi.org/10.4108/sesa.2.3.e4},
  doi          = {10.4108/SESA.2.3.E4},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/FanMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/KuglerM15,
  author       = {Christopher Kugler and
                  Tilo M{\"{u}}ller},
  title        = {Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {4},
  pages        = {e3},
  year         = {2015},
  url          = {https://doi.org/10.4108/eai.5-10-2015.150477},
  doi          = {10.4108/EAI.5-10-2015.150477},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/KuglerM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LiHZP15,
  author       = {Fangwei Li and
                  Qing Huang and
                  Jiang Zhu and
                  Zhuxun Peng},
  title        = {Network Security Risk Assessment Based on Item Response Theory},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {5},
  pages        = {e5},
  year         = {2015},
  url          = {https://doi.org/10.4108/icst.mobimedia.2015.259024},
  doi          = {10.4108/ICST.MOBIMEDIA.2015.259024},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/LiHZP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LiYZX15,
  author       = {Fangwei Li and
                  Wang Yan and
                  Jiang Zhu and
                  Zhang Xinyue},
  title        = {A Hierarchical of Security Situation Element Acquisition Mechanism
                  in Wireless Sensor Network},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {6},
  pages        = {e2},
  year         = {2015},
  url          = {https://doi.org/10.4108/icst.mobimedia.2015.259030},
  doi          = {10.4108/ICST.MOBIMEDIA.2015.259030},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/LiYZX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LiZZY15,
  author       = {Fangwei Li and
                  Xinyu Zhang and
                  Jiang Zhu and
                  Wang Yan},
  title        = {A improved Network Security Situation Awareness Model},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {5},
  pages        = {e4},
  year         = {2015},
  url          = {https://doi.org/10.4108/icst.mobimedia.2015.259032},
  doi          = {10.4108/ICST.MOBIMEDIA.2015.259032},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/LiZZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LiuSCYCLZ15,
  author       = {Qingzhong Liu and
                  Andrew H. Sung and
                  Lei Chen and
                  Ming Yang and
                  Zhongxue Chen and
                  Yanxin Liu and
                  Jing Zhang},
  title        = {A Method to Detect {AAC} Audio Forgery},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {6},
  pages        = {e1},
  year         = {2015},
  url          = {https://doi.org/10.4108/icst.mobimedia.2015.259141},
  doi          = {10.4108/ICST.MOBIMEDIA.2015.259141},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/LiuSCYCLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MaglarasJ15,
  author       = {Leandros A. Maglaras and
                  Jianmin Jiang},
  title        = {A novel intrusion detection method based on {OCSVM} and K-means recursive
                  clustering},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {3},
  pages        = {e5},
  year         = {2015},
  url          = {https://doi.org/10.4108/sesa.2.3.e5},
  doi          = {10.4108/SESA.2.3.E5},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/MaglarasJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/StrackxAAP15,
  author       = {Raoul Strackx and
                  Pieter Agten and
                  Niels Avonds and
                  Frank Piessens},
  title        = {Salus: Kernel Support for Secure Process Compartments},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {3},
  pages        = {e1},
  year         = {2015},
  url          = {https://doi.org/10.4108/sesa.2.3.e1},
  doi          = {10.4108/SESA.2.3.E1},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/StrackxAAP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/SuHSC15,
  author       = {Chung{-}Yen Su and
                  Jeng{-}Ji Huang and
                  Che{-}Yang Shih and
                  Yu{-}Tang Chen},
  title        = {Reversible and Embedded Watermarking of Medical Images for Telemedicine},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {6},
  pages        = {e4},
  year         = {2015},
  url          = {https://doi.org/10.4108/icst.iniscom.2015.258307},
  doi          = {10.4108/ICST.INISCOM.2015.258307},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/SuHSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/WangHL15,
  author       = {Yazhe Wang and
                  Mingming Hu and
                  Chen Li},
  title        = {UAuth: {A} Strong Authentication Method from Personal Devices to Multi-accounts},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {4},
  pages        = {e5},
  year         = {2015},
  url          = {https://doi.org/10.4108/eai.5-10-2015.150479},
  doi          = {10.4108/EAI.5-10-2015.150479},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/WangHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/WangXLYQ15,
  author       = {Zhaoyuan Wang and
                  Huanlai Xing and
                  Tianrui Li and
                  Yan Yang and
                  Rong Qu},
  title        = {An Improved {MOEA/D} for QoS Oriented Multimedia Multicasting with
                  Network Coding},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {5},
  pages        = {e3},
  year         = {2015},
  url          = {https://doi.org/10.4108/icst.mobimedia.2015.259094},
  doi          = {10.4108/ICST.MOBIMEDIA.2015.259094},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/WangXLYQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ZengerZP15,
  author       = {Christian T. Zenger and
                  Jan Zimmer and
                  Christof Paar},
  title        = {Security Analysis of Quantization Schemes for Channel-based Key Extraction},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {6},
  pages        = {e5},
  year         = {2015},
  url          = {https://doi.org/10.4108/eai.22-7-2015.2260194},
  doi          = {10.4108/EAI.22-7-2015.2260194},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/ZengerZP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ZhangFHG15,
  author       = {Xiqing Zhang and
                  Yuan Feng and
                  Feng Hong and
                  Zhongwen Guo},
  title        = {Redundancy Elimination in {DTN} via {ACK} Mechanism},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {6},
  pages        = {e3},
  year         = {2015},
  url          = {https://doi.org/10.4108/icst.mobimedia.2015.259046},
  doi          = {10.4108/ICST.MOBIMEDIA.2015.259046},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/ZhangFHG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ZhangZSL15,
  author       = {Jing Zhang and
                  Meili Zhi and
                  Yuting Su and
                  Qingzhong Liu},
  title        = {Mobile Watermarking against Geometrical Distortions},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {5},
  pages        = {e2},
  year         = {2015},
  url          = {https://doi.org/10.4108/icst.mobimedia.2015.259142},
  doi          = {10.4108/ICST.MOBIMEDIA.2015.259142},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/ZhangZSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ZhuL15,
  author       = {Minghui Zhu and
                  Peng Liu},
  title        = {Reviewing the book "Principles of Cyber-physical Systems" from a security
                  perspective},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {4},
  pages        = {e6},
  year         = {2015},
  url          = {https://doi.org/10.4108/eai.5-10-2015.150480},
  doi          = {10.4108/EAI.5-10-2015.150480},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/ZhuL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/AndrewsFAFCFF13,
  author       = {Dee H. Andrews and
                  Jared Freeman and
                  Terence S. Andre and
                  John Feeney and
                  Alan Carlin and
                  Cali M. Fidopiastis and
                  Patricia Fitzgerald},
  title        = {Training organizational supervisors to detect and prevent cyber insider
                  threats: two approaches},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {1},
  number       = {2},
  pages        = {e4},
  year         = {2013},
  url          = {https://doi.org/10.4108/trans.sesa.01-06.2013.e4},
  doi          = {10.4108/TRANS.SESA.01-06.2013.E4},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/AndrewsFAFCFF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/CookeCRJ13,
  author       = {Nancy J. Cooke and
                  Michael Champion and
                  Prashanth Rajivan and
                  Shree Jariwala},
  title        = {Cyber situation awareness and teamwork},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {1},
  number       = {2},
  pages        = {e5},
  year         = {2013},
  url          = {https://doi.org/10.4108/trans.sesa.01-06.2013.e5},
  doi          = {10.4108/TRANS.SESA.01-06.2013.E5},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/CookeCRJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/CookeM13,
  author       = {Nancy J. Cooke and
                  Michael D. McNeese},
  title        = {Preface to special issue on the cognitive science of cyber defence
                  analysis},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {1},
  number       = {2},
  pages        = {e1},
  year         = {2013},
  url          = {https://doi.org/10.4108/trans.sesa.01-06.2013.e1},
  doi          = {10.4108/TRANS.SESA.01-06.2013.E1},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/CookeM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HaasHPKREAFN13,
  author       = {Michael W. Haas and
                  Leanne M. Hirshfield and
                  P. V. Ponangi and
                  Phani Kidambi and
                  D. Rao and
                  Narasimha Edala and
                  E. Armbrust and
                  Mary Fendley and
                  Sundaram Narayanan},
  title        = {Decision-making and emotions in the contested information environment},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {1},
  number       = {2},
  pages        = {e3},
  year         = {2013},
  url          = {https://doi.org/10.4108/trans.sesa.01-06.2013.e3},
  doi          = {10.4108/TRANS.SESA.01-06.2013.E3},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/HaasHPKREAFN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/NixonM13,
  author       = {Jim Nixon and
                  Barry McGuinness},
  title        = {Framing the Human Dimension in Cybersecurity},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {1},
  number       = {2},
  pages        = {e2},
  year         = {2013},
  url          = {https://doi.org/10.4108/trans.sesa.01-06.2013.e2},
  doi          = {10.4108/TRANS.SESA.01-06.2013.E2},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/NixonM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/TyworthGMMH13,
  author       = {Michael Tyworth and
                  Nicklaus A. Giacobe and
                  Vincent F. Mancuso and
                  Michael D. McNeese and
                  David L. Hall},
  title        = {A human-in-the-loop approach to understanding situation awareness
                  in cyber defence analysis},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {1},
  number       = {2},
  pages        = {e6},
  year         = {2013},
  url          = {https://doi.org/10.4108/trans.sesa.01-06.2013.e6},
  doi          = {10.4108/TRANS.SESA.01-06.2013.E6},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/TyworthGMMH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/Liu11,
  author       = {Peng Liu},
  title        = {Welcome message from the Editor-in-Chief},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {1},
  number       = {1},
  pages        = {e1},
  year         = {2011},
  url          = {https://doi.org/10.4108/trans.sesa.2011.e1},
  doi          = {10.4108/TRANS.SESA.2011.E1},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/Liu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MotahariMJ11,
  author       = {Sara Motahari and
                  Julia M. Mayer and
                  Quentin Jones},
  title        = {How did you know that about me? Protecting users against unwanted
                  inferences},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {1},
  number       = {1},
  pages        = {e3},
  year         = {2011},
  url          = {https://doi.org/10.4108/trans.sesa.2011.e3},
  doi          = {10.4108/TRANS.SESA.2011.E3},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/MotahariMJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/RazaviG11,
  author       = {Maryam Najafian Razavi and
                  Denis Gillet},
  title        = {A framework for usable end-user privacy control in social software
                  systems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {1},
  number       = {1},
  pages        = {e4},
  year         = {2011},
  url          = {https://doi.org/10.4108/trans.sesa.2011.e4},
  doi          = {10.4108/TRANS.SESA.2011.E4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/RazaviG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/XuDL11,
  author       = {Heng Xu and
                  Tamara Dinev and
                  Han Li},
  title        = {Trust in social computing. The case of peer-to-peer file sharing networks},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {1},
  number       = {1},
  pages        = {e5},
  year         = {2011},
  url          = {https://doi.org/10.4108/trans.sesa.2011.e5},
  doi          = {10.4108/TRANS.SESA.2011.E5},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/XuDL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/XuT11,
  author       = {Heng Xu and
                  Chuan{-}Hoo Tan},
  title        = {Introduction to special issue on information privacy and trust in
                  social media},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {1},
  number       = {1},
  pages        = {e2},
  year         = {2011},
  url          = {https://doi.org/10.4108/trans.sesa.2011.e2},
  doi          = {10.4108/TRANS.SESA.2011.E2},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/XuT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics