Heim
Forschungstrends
Wissenschaftliche Artikel
Zeitschriften
Wissenschaftliche Zeitschriften
Open Access Journals
Zeitschriftensuche
Kontakt
Melden Sie sich an
Login
Sprache
English
German
Journal of Computer Security
Titel
Veröffentlichungsdatum
Sprache
Zitate
Using internal sensors and embedded detectors for intrusion detection1
2002/01/01
1
Using digital credentials on the World Wide Web
1997/07/01
1
A formal model of rational exchange and its application to the analysis of Syverson's protocol
2004/05/01
1
Using side channel TCP features for real-time detection of malware connections
2019/09/17
1
SIA: Secure information aggregation in sensor networks
2007/01/01
1
Probabilistic analysis of an anonymity system
2004/05/01
1
Model-based analysis of configuration vulnerabilities1
2002/01/01
1
EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity
2014/03/20
1
Data privacy in the Internet of Things based on anonymization: A review
2023/05/29
Prioritization and exchange chains in privacy-preserving kidney exchange
2024/02/05
Ensuring cybersecurity for industrial networks: A solution for ARP-based MITM attacks
2024/02/01
Machine-checked proofs of privacy against malicious boards for Selene & Co1
2023/10/13
Secure authentication protocols to resist off-line attacks on authentication data table
2024/02/02
A review on cloud security issues and solutions
2023/08/14
Online User Authentication System Using Keystroke Dynamics
2023/05/29
Log2Graph: A graph convolution neural network based method for insider threat detection
2024/04/24
Evaluating the stealth of reinforcement learning-based cyber attacks against unknown scenarios using knowledge transfer techniques
2024/04/23
DSLR–: A low-overhead data structure layout randomization for defending data-oriented programming
2023/11/24
A multiview clustering framework for detecting deceptive reviews
2024/02/02
A mutation-based approach for the formal and automated analysis of security ceremonies
2023/08/14
StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception
2023/08/14
MVDet: Encrypted malware traffic detection via multi-view analysis
2024/02/12
Special issue: 35th IEEE Computer Security Symposium – CSF 2022
2023/10/13
A certificateless signcryption with proxy-encryption for securing agricultural data in the cloud
2024/04/09
Automatic generation of sources lemmas in Tamarin: Towards automatic proofs of security protocols1
2022/08/25
Deploying ABAC policies using RBAC systems
2019/07/18
Tracking APTs in industrial ecosystems: A proof of concept
2019/09/17
Verifying constant-time implementations by abstract interpretation
2019/01/11
Abstractions for security protocol verification
2018/07/10
Invalid certificates in modern browsers: A socio-technical analysis
2018/07/10
«
‹ Durchlässig
Nächste ›
»