default search action
EAI Endorsed Transactions on Security and Safety, Volume 6
Volume 6, Number 19, January 2019
- Naiwei Liu, Wanyu Zang, Songqing Chen, Meng Yu, Ravi S. Sandhu:
Adaptive Noise Injection against Side-Channel Attacks on ARM Platform. e1 - Vasileios Anastopoulos, Sokratis K. Katsikas:
A Methodology for the Dynamic Design of Adaptive Log Management Infrastructures. e2 - Rocio Lopez Perez, Florian Adamsky, Ridha Soua, Thomas Engel:
Forget the Myth of the Air Gap: Machine Learning for Reliable Intrusion Detection in SCADA Systems. e3 - Wei Zhang, Jingwen Zhao, Fengqiong Wei, Yunfang Chen:
Differentially Private High-Dimensional Data Publication via Markov Network. e4 - Yuzhe Richard Tang, Kai Li, Katchaguy Areekijseree, Shuigeng Zhou, Liting Hu:
Privacy-Preserving Multi-Party Directory Services. e5
Volume 6, Number 20, April 2019
- Vinay Sachidananda, Suhas Bhairav, Yuval Elovici:
Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service. e1 - Weiqi Cui, Jiangmin Yu, Yanmin Gong, Eric Chan-Tin:
Efficient, Effective, and Realistic Website Fingerprinting Mitigation. e2 - Anyi Liu, Selena Haidar, Yuan Cheng, Yingjiu Li:
Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log. e3 - Hongfa Xue, Yurong Chen, Guru Venkataramani, Tian Lan:
AMASS: Automated Software Mass Customization via Feature Identification and Tailoring. e4 - Qiumao Ma, Wensheng Zhang:
Octopus ORAM: An Oblivious RAM with Communication and Server Storage Efficiency. e5
Volume 6, Number 21, August 2019
- Saeed Ibrahim Alqahtani, Shujun Li, Haiyue Yuan, Patrice Rusconi:
Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? e1 - Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamouha:
Attacker Capability based Dynamic Deception Model for Large-Scale Networks. e2 - Yi Li, Kaiqi Xiong, Xiangyang Li:
Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur. e3 - Andrew Meyer, Sankardas Roy:
Do Metadata-based Deleted-File-Recovery (DFR) Tools Meet NIST Guidelines? e4 - Zhengping Luo, Zhe Qu, Tung Thanh Nguyen, Hui Zeng, Zhuo Lu:
Security of HPC Systems: From a Log-analyzing Perspective. e5
Volume 6, Number 22, 2020
- David Mohaisen, Sencun Zhu:
Editorial. e1 - Qais Tasali, Christine Sublett, Eugene Y. Vasserman:
Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems. e2 - Yuxuan Chen, Xuejing Yuan, Aohui Wang, Kai Chen, Shengzhi Zhang, Heqing Huang:
Manipulating Users' Trust on Amazon Echo: Compromising Smart Home from Outside. e3 - Agbotiname Lucky Imoize, Boluwatife Samuel Ben-Adeola, John Adetunji Adebisi:
Development of a Multifactor-Security-Protocol System Using Ambient Noise Synthesis. e4 - Yifan Tian, Jiawei Yuan, Yantian Hou:
CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized k-d Forest. e5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.