Heim
Forschungstrends
Wissenschaftliche Artikel
Zeitschriften
Wissenschaftliche Zeitschriften
Open Access Journals
Zeitschriftensuche
Kontakt
Melden Sie sich an
Login
Sprache
English
German
International Journal of Information Security
Titel
Veröffentlichungsdatum
Sprache
Zitate
SpyDetector: An approach for detecting side-channel attacks at runtime
2018/06/02
English
19
Secure universal designated verifier signature without random oracles
2007/04/05
English
19
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings
2009/02/10
English
18
Implementing public-key cryptography on passive RFID tags is practical
2014/04/11
English
18
Efficient identity-based online/offline encryption and signcryption with short ciphertext
2016/02/18
English
18
Network-based detection of Android malicious apps
2016/08/01
English
18
A trust management scheme for IoT-enabled environmental health/accessibility monitoring services
2019/06/24
English
18
Measuring and visualizing cyber threat intelligence quality
2020/03/02
English
18
Integrity-verifiable conjunctive keyword searchable encryption in cloud storage
2017/11/08
English
18
An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks
2016/09/19
English
18
A case study in hardware Trojan design and implementation
2010/09/03
English
18
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information
2019/06/03
English
17
Privacy-preserving authentication framework using bloom filter for secure vehicular communications
2015/09/07
English
17
Secure localization with attack detection in wireless sensor networks
2011/04/19
English
17
MAPAS: a practical deep learning-based android malware detection system
2022/02/09
English
17
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model
2019/03/27
English
16
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets
2016/01/30
English
16
Security policy verification for multi-domains in cloud systems
2013/07/17
English
16
A study of IoT malware activities using association rule learning for darknet sensor data
2019/06/04
English
16
On the measurement of privacy as an attacker’s estimation error
2012/12/11
English
16
Privacy-preserving authentication of trees and graphs
2013/05/26
English
16
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0
2021/02/27
English
15
Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing
2019/06/26
English
15
Efficient microaggregation techniques for large numerical data volumes
2012/02/08
English
15
RORI-based countermeasure selection using the OrBAC formalism
2013/08/31
English
15
SAT-based model-checking for security protocols analysis
2007/09/21
English
15
A methodology to measure and monitor level of operational effectiveness of a CSOC
2017/02/16
English
15
SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications
2019/04/19
English
15
Feature dynamic deep learning approach for DDoS mitigation within the ISP domain
2019/07/10
English
14
Privacy-enhanced architecture for smart metering
2012/11/28
English
14
«
‹ Durchlässig
Nächste ›
»