Heim
Forschungstrends
Wissenschaftliche Artikel
Zeitschriften
Wissenschaftliche Zeitschriften
Open Access Journals
Zeitschriftensuche
Kontakt
Melden Sie sich an
Login
Sprache
English
German
International Journal of Information Security
Titel
Veröffentlichungsdatum
Sprache
Zitate
Hate speech, toxicity detection in online social media: a recent survey of state of the art and opportunities
2023/09/25
English
Simulation extractable versions of Groth’s zk-SNARK revisited
2023/09/05
English
Improving spam email classification accuracy using ensemble techniques: a stacking approach
2023/09/20
English
BASPED: Blockchain assisted searchable public key encryption over outsourced data
2023/09/20
English
Enhancing attack resilience of cyber-physical systems through state dependency graph models
2023/07/22
English
Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents
2023/08/10
English
Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review
2023/08/07
English
Blockchain-based multi-diagnosis deep learning application for various diseases classification
2023/08/07
English
RADS: a real-time anomaly detection model for software-defined networks using machine learning
2023/07/07
English
A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android Pattern Unlock
2023/07/07
English
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks
2024/04/29
English
BitCracker: BitLocker meets GPUs
2022/05/03
English
IntentAuth: Securing Android’s Intent-based inter-process communication
2022/04/22
English
A Digital Asset Inheritance Model to Convey Online Persona Posthumously
2022/04/30
English
An effective attack scenario construction model based on identification of attack steps and stages
2023/05/28
English
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture
2023/05/18
English
Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques
2023/06/11
English
cFEM: a cluster based feature extraction method for network intrusion detection
2023/05/05
English
Mobile botnet detection: a comprehensive survey
2022/11/15
English
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment
2022/12/30
English
Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device
2022/12/05
English
Value-utilized taint propagation: toward precise detection of apps’ information flows across Android API calls
2022/08/06
English
Robust password security: a genetic programming approach with imbalanced dataset handling
2024/02/07
English
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks
2023/11/21
English
A review on digital twins for power generation and distribution
2023/12/01
English
A survey and characterization of Close Access Cyberspace Operations
2023/11/03
English
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks
2023/11/02
English
A method for insider threat assessment by modeling the internal employee interactions
2023/04/15
English
Cyber range design framework for cyber security education and training
2023/03/18
English
A novel two-level secure access control approach for blockchain platform in healthcare
2023/02/10
English
«
‹ Durchlässig
Nächste ›
»