OPEN ACCESS
- SIFT: Sifting file types—application of explainable artificial intelligence in cyber forensics
- Modelling user notification scenarios in privacy policies
- FLSec-RPL: a fuzzy logic-based intrusion detection scheme for securing RPL-based IoT networks against DIO neighbor suppression attacks
- New partial key exposure attacks on RSA with additive exponent blinding
- Dynamic group fuzzy extractor
- EvilPromptFuzzer: generating inappropriate content based on text-to-image models
- ProcSAGE: an efficient host threat detection method based on graph representation learning
- Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones
- A multi-channel spatial information feature based human pose estimation algorithm
- TVRAVNF: an efficient low-cost TEE-based virtual remote attestation scheme for virtual network functions
- Efficient post-quantum secure deterministic wallet scheme
- Classification of DDoS attack traffic on SDN network environment using deep learning
- Revisiting frequency-smoothing encryption: new security definitions and efficient construction
- GLDOC: detection of implicitly malicious MS-Office documents using graph convolutional networks
- Revealing the exploitability of heap overflow through PoC analysis
- Threshold ring signature: generic construction and logarithmic size instantiation
- FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption
- A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud
- A circuit area optimization of MK-3 S-box
- Intrusion detection system for controller area network
- CT-GCN+: a high-performance cryptocurrency transaction graph convolutional model for phishing node classification
- Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity
- BRITD: behavior rhythm insider threat detection with time awareness and user adaptation
- F3l: an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android
ABSTRACT
Coming soon