


Остановите войну!
for scientists:


default search action
Security and Communication Networks, Volume 2018
Volume 2018, 2018
- Shin-Yan Chiou
, Ching-Hsuan Lin:
An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment. 9146297:1-9146297:15 - Pengcheng Cao, Weiwei Liu
, Guangjie Liu
, Xiaopeng Ji
, Jiangtao Zhai
, Yuewei Dai:
A Wireless Covert Channel Based on Constellation Shaping Modulation. 1214681:1-1214681:15 - Jinpei Yan
, Yong Qi
, Qifan Rao:
LSTM-Based Hierarchical Denoising Network for Android Malware Detection. 5249190:1-5249190:18 - Yadong Zhou
, Kaiyue Chen, Junjie Zhang, Junyuan Leng, Yazhe Tang:
Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense. 4760632:1-4760632:15 - Tao Wang
, Hongchang Chen, Guozhen Cheng, Yulin Lu:
SDNManager: A Safeguard Architecture for SDN DoS Attacks Based on Bandwidth Prediction. 7545079:1-7545079:16 - Che Zhang
, Hong Xu
, Libin Liu
, Zhixiong Niu, Peng Wang:
Kuijia: Traffic Rescaling in Software-Defined Data Center WANs. 6361901:1-6361901:12 - Min Zhao
, Yan Xing, Xiao-Wei Li, Qiong-Hua Wang
:
Two-Step Integral Imaging Coding Based Three-Dimensional Information Encryption Approach. 2658318:1-2658318:9 - Ahmed Almusawi
, Haleh Amintoosi
:
DNS Tunneling Detection Method Based on Multilabel Support Vector Machine. 6137098:1-6137098:9 - Xiaoguang Niu
, Jiawei Wang
, Qiongzan Ye
, Yihao Zhang
:
A Privacy-Preserving Incentive Mechanism for Participatory Sensing Systems. 2593537:1-2593537:15 - Wenwen Fu
, Tao Li
, Zhigang Sun:
FAS: Using FPGA to Accelerate and Secure SDN Software Switches. 5650205:1-5650205:13 - Owen Lo
, William J. Buchanan
, Paul Griffiths, Richard Macfarlane:
Distance Measurement Methods for Improved Insider Threat Detection. 5906368:1-5906368:18 - Yongjae Lee, Seunghyeon Lee, Hyunmin Seo, Changhoon Yoon, Seungwon Shin
, Hyunsoo Yoon:
Duo: Software Defined Intrusion Tolerant System Using Dual Cluster. 6751042:1-6751042:13 - Huan Wang
, Hongxia Wang
:
Perceptual Hashing-Based Image Copy-Move Forgery Detection. 6853696:1-6853696:11 - Yu Sun
, Rongrong Ni
, Yao Zhao:
Nonoverlapping Blocks Based Copy-Move Forgery Detection. 1301290:1-1301290:11 - Chao Qi
, Jiangxing Wu, Guozhen Cheng, Jianjian Ai, Shuo Zhao:
Security Analysis of Dynamic SDN Architectures Based on Game Theory. 4123736:1-4123736:10 - Jiawei Tang, Anfeng Liu
, Ming Zhao
, Tian Wang:
An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks. 6328504:1-6328504:30 - Biao Han, Xiangrui Yang
, Zhigang Sun, Jinfeng Huang, Jinshu Su
:
OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN. 9649643:1-9649643:15 - Jinsoo Park
, Gangsan Kim, Hong-Yeop Song
, Chanki Kim
, Jong-Seon No, Suil Kim:
Analysis of Iterative Erasure Insertion and Decoding of FH/MFSK Systems without Channel State Information. 7318043:1-7318043:12 - Zhixiong Zheng
, Haibo Cheng
, Zijian Zhang
, Yiming Zhao
, Ping Wang
:
An Alternative Method for Understanding User-Chosen Passwords. 6160125:1-6160125:12 - Fang Liu
, Tong Li:
A Clustering k-Anonymity Privacy-Preserving Method for Wearable IoT Devices. 4945152:1-4945152:8 - Shang-Chiuan Su, Yi-Ren Chen, Shi-Chun Tsai
, Yi-Bing Lin:
Detecting P2P Botnet in Software Defined Networks. 4723862:1-4723862:13 - Jian Shen
, Jun Shen, Chin-Feng Lai
, Qi Liu, Tianqi Zhou:
Cloud Based Data Protection in Anonymously Controlled SDN. 9845426:1-9845426:8 - Ihsan H. Abdulqadder
, Deqing Zou, Israa T. Aziz
, Bin Yuan:
Validating User Flows to Protect Software Defined Network Environments. 1308678:1-1308678:14 - Xianyi Chen
, Haidong Zhong, Lizhi Xiong, Zhihua Xia
:
Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion. 1326235:1-1326235:9 - Dawen Xu
, Kai Chen, Rangding Wang, Shubing Su:
Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification. 1734961:1-1734961:14 - ByungRae Cha
, Sun Park
, JongWon Kim, Sung Bum Pan
, Juhyun Shin
:
International Network Performance and Security Testing Based on Distributed Abyss Storage Cluster and Draft of Data Lake Framework. 1746809:1-1746809:14 - Tianliang Lu
, Lu Zhang
, Yixian Fu
:
A Novel Immune-Inspired Shellcode Detection Algorithm Based on Hyperellipsoid Detectors. 2063089:1-2063089:10 - Haibo Yi
:
Under Quantum Computer Attack: Is Rainbow a Replacement of RSA and Elliptic Curves on Hardware? 2369507:1-2369507:9 - Dongmei Niu
, Hongxia Wang
, Minquan Cheng, Canghong Shi:
Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction. 2516324:1-2516324:12 - Chong Fu
, Gao-yuan Zhang, Mai Zhu, Zhe Chen, Weimin Lei:
A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy. 2708532:1-2708532:13 - Hongchen Wu
, Huaxiang Zhang, Lizhen Cui, Xinjun Wang:
A Heuristic Model for Supporting Users' Decision-Making in Privacy Disclosure for Recommendation. 2790373:1-2790373:13 - Pengdeng Li, Xiaofan Yang
, Qingyu Xiong
, Junhao Wen, Yuan Yan Tang
:
Defending against the Advanced Persistent Threat: An Optimal Control Approach. 2975376:1-2975376:14 - Shuang Zhao, Xiapu Luo, Xiaobo Ma
, Bo Bai, Yankang Zhao, Wei Zou, Zeming Yang, Man Ho Au, Xinliang Qiu:
Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing. 3182402:1-3182402:22 - Ady Wahyudi Paundu
, Doudou Fall, Daisuke Miyamoto, Youki Kadobayashi:
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment. 4216240:1-4216240:18 - Dongdong Zhao, Shu Fang, Jianwen Xiang
, Jing Tian, Shengwu Xiong
:
Iris Template Protection Based on Local Ranking. 4519548:1-4519548:9 - Zhihui Chu
, Huaifeng Chen
, Xiaoyun Wang
, Xiaoyang Dong
, Lu Li
:
Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques. 5160237:1-5160237:11 - Ming Luo
, Yi Luo, Yuwei Wan, Ze Wang:
Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT. 6140978:1-6140978:10 - Xuyun Zhang
, Julian Jang-Jaccard, Lianyong Qi
, Md. Zakirul Alam Bhuiyan
, Chang Liu:
Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications. 6238607:1-6238607:3 - Wilson S. Melo
, Raphael C. S. Machado
, Luiz Fernando Rust da Costa Carmo:
Using Physical Context-Based Authentication against External Attacks: Models and Protocols. 6590928:1-6590928:14 - Jin Cao
, Hui Li, Maode Ma
, Fenghua Li:
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks. 6854612:1-6854612:16 - Miao Yu
, Yongzheng Zhang
, Tianning Zang, Yipeng Wang, Yijing Wang:
Information Propagation Prediction Based on Key Users Authentication in Microblogging. 7024842:1-7024842:7 - Junhui He
, Junxi Chen, Shichang Xiao, Xiaoyu Huang
, Shaohua Tang:
A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition. 7080673:1-7080673:11 - Michele De Donno
, Nicola Dragoni
, Alberto Giaretta
, Angelo Spognardi:
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. 7178164:1-7178164:30 - Kang-Leng Chiew
, Jeffrey Choo Soon Fatt, San-Nah Sze
, Kelvin S. C. Yong:
Leverage Website Favicon to Detect Phishing Websites. 7251750:1-7251750:11 - Binh Van Nguyen
, Hyoyoung Jung
, Kiseon Kim
:
On the Antijamming Performance of the NR-DCSK System. 7963641:1-7963641:8 - Chenglong Cao
, Xiaoling Zhu
:
Practical Secure Transaction for Privacy-Preserving Ride-Hailing Services. 8053967:1-8053967:8 - Tianqi Zhou, Jian Shen
, Xiong Li
, Chen Wang, Jun Shen:
Quantum Cryptography for the Future Internet and the Security Analysis. 8214619:1-8214619:7 - Baraka D. Sija
, Young-Hoon Goo
, Kyu-Seok Shim
, Huru Hasanova
, Myung-Sup Kim
:
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View. 8370341:1-8370341:17 - Hyeonseong Jo
, Jaehyun Nam
, Seungwon Shin
:
NOSArmor: Building a Secure Network Operating System. 9178425:1-9178425:14 - Ping Zhang
, Honggang Hu, Qian Yuan:
Close to Optimally Secure Variants of GCM. 9715947:1-9715947:12 - Yu Yao
, Qiang Fu
, Wei Yang, Ying Wang, Chuan Sheng:
An Epidemic Model of Computer Worms with Time Delay and Variable Infection Rate. 9756982:1-9756982:11 - Ming Li
, Haiju Fan
, Hua Ren
, Dandan Lu
, Di Xiao
, Yang Li
:
Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain. 9803519:1-9803519:12 - Haitao He, Chun Shan
, Xiangmin Tian
, Yalei Wei, Guoyan Huang:
Analysis on Influential Functions in the Weighted Software Network. 1525186:1-1525186:10 - Rui Zhang
, Di Xiao
, Yanting Chang
:
A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing. 1591206:1-1591206:15 - Hyun-Gu Lee
, Jung Yeon Hwang
, Dong In Kim
, Shincheol Lee
, Sung-Hoon Lee
, Ji Sun Shin
:
Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors. 2567463:1-2567463:10 - Suk-Hwan Lee
:
Reversible Data Hiding for DNA Sequence Using Multilevel Histogram Shifting. 3530969:1-3530969:13 - So Ryoung Park
, Ilku Nam, Sanguk Noh:
Modeling and Simulation for the Investigation of Radar Responses to Electronic Attacks in Electronic Warfare Environments. 3580536:1-3580536:13 - Tomás Bajtos, Andrej Gajdos
, Lenka Kleinova, Katarína Lucivjanská
, Pavol Sokol
:
Network Intrusion Detection with Threat Agent Profiling. 3614093:1-3614093:17 - Kyle Coffey, Richard Smith, Leandros A. Maglaras
, Helge Janicke
:
Vulnerability Analysis of Network Scanning on SCADA Systems. 3794603:1-3794603:21 - Zhiyuan Jiang, Chao Feng
, Chaojing Tang:
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression. 4610320:1-4610320:21 - Tanping Zhou
, Ningbo Li, Xiaoyuan Yang
, Liqun Lv, Yitao Ding, Xu An Wang
:
Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme. 4635715:1-4635715:12 - Lu Ou
, Hui Yin
, Zheng Qin
, Sheng Xiao
, Guangyi Yang, Yupeng Hu:
An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme. 4724815:1-4724815:11 - Dianyan Xiao
, Yang Yu
:
Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption. 4957045:1-4957045:9 - HyunSeo Kang
, YoonJe Sung, HyoungJun Kwon
, SugJoon Yoon
, SangYeong Choi:
An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development. 5150730:1-5150730:12 - Qian Wang
, Jiadong Ren, Xiaoli Yang, Yongqiang Cheng
, Darryl N. Davis, Changzhen Hu:
Security Feature Measurement for Frequent Dynamic Execution Paths in Software System. 5716878:1-5716878:10 - Hongliang Zhu
, Meiqi Chen, Maohua Sun
, Xin Liao
, Lei Hu:
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing. 5841967:1-5841967:12 - Wencheng Sun, Zhiping Cai
, Yangyang Li, Fang Liu, Shengqun Fang, Guoyan Wang:
Security and Privacy in the Medical Internet of Things: A Review. 5978636:1-5978636:9 - Xiue Gao, Duoping Zhang, Keqiu Li, Bo Chen
:
A Cascading Failure Model for Command and Control Networks with Hierarchy Structure. 6063837:1-6063837:14 - Xia ShuangKui, Jianbin Wu
:
A Modification-Free Steganography Method Based on Image Information Entropy. 6256872:1-6256872:8 - Dan Li, Jiazhe Chen, An Wang, Xiaoyun Wang:
Analysis of Software Implemented Low Entropy Masking Schemes. 7206835:1-7206835:8 - Jinpei Yan
, Yong Qi
, Qifan Rao:
Detecting Malware with an Ensemble Method Based on Deep Neural Network. 7247095:1-7247095:16 - Zilong Jiang
, Chenhui Jin:
Multiple Impossible Differentials Cryptanalysis on 7-Round ARIA-192. 7453572:1-7453572:11 - Pham-Duy Thanh
, Hiep-Vu Van
, Insoo Koo
:
Efficient Channel Selection and Routing Algorithm for Multihop, Multichannel Cognitive Radio Networks with Energy Harvesting under Jamming Attacks. 7543212:1-7543212:12 - Shuhui Zhang
, Xiangxu Meng
, Lianhai Wang, Lijuan Xu, Xiaohui Han:
Secure Virtualization Environment Based on Advanced Memory Introspection. 9410278:1-9410278:16 - Emanuel Ferreira Jesus
, Vanessa R. L. Chicarino, Célio Vinicius N. de Albuquerque
, Antônio A. de A. Rocha:
A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack. 9675050:1-9675050:27 - Qi Zhang
, An Wang
, Yongchuan Niu
, Ning Shang
, Rixin Xu
, Guoshuang Zhang
, Liehuang Zhu
:
Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9. 9701756:1-9701756:14 - Yanan Chen, Zhenyu Lu, Hu Xiong
, Weixiang Xu:
Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario. 1378583:1-1378583:14 - Jorge Granjal
, Artur Pedroso
:
An Intrusion Detection and Prevention Framework for Internet-Integrated CoAP WSN. 1753897:1-1753897:14 - Barnali Gupta Banik
, Samir Kumar Bandyopadhyay
:
Blind Key Based Attack Resistant Audio Steganography Using Cocktail Party Effect. 1781384:1-1781384:21 - Yun Chen
, Kun Lv
, Changzhen Hu
:
A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments. 2058429:1-2058429:12 - Chunming Zhang
:
Global Behavior of a Computer Virus Propagation Model on Multilayer Networks. 2153195:1-2153195:9 - Heng Zhang, Zhiping Cai
, Qiang Liu
, Qingjun Xiao, Yangyang Li, Chak-Fong Cheang:
A Survey on Security-Aware Measurement in SDN. 2459154:1-2459154:14 - Hyunwoo Choi
, Yongdae Kim
:
Large-Scale Analysis of Remote Code Injection Attacks in Android Apps. 2489214:1-2489214:17 - Kevser Ovaz Akpinar
, Ibrahim Özçelik
:
Development of the ECAT Preprocessor with the Trust Communication Approach. 2639750:1-2639750:16 - Gaofeng He, Bingfeng Xu
, Haiting Zhu:
AppFA: A Novel Approach to Detect Malicious Android Applications on the Network. 2854728:1-2854728:15 - Chun Shan
, Benfu Jiang, Jingfeng Xue
, Fang Guan, Na Xiao:
An Approach for Internal Network Security Metric Based on Attack Probability. 3652170:1-3652170:11 - Bryan Monk, Julianna Mitchell
, Richard Frank, Garth Davies:
Uncovering Tor: An Examination of the Network Structure. 4231326:1-4231326:12 - Junxin Chen
, Leo Yu Zhang
, Yushu Zhang, Fabio Pareschi
, Yu-Dong Yao:
Exploiting the Security Aspects of Compressive Sampling. 4740174:1 - Milad Taleby Ahvanooey
, Qianmu Li
, Hiuk Jae Shim, Yanyan Huang:
A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents. 5325040:1-5325040:22 - Shahid Mahmood
, Shabieh Farwa
, Muhammad Rafiq, Syed Muhammad Jawwad Riaz, Tariq Shah, Sajjad Shaukat Jamal:
To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers. 5823230:1-5823230:8 - Fucai Luo
, Fuqun Wang, Kunpeng Wang, Jie Li, Kefei Chen:
LWR-Based Fully Homomorphic Encryption, Revisited. 5967635:1-5967635:12 - Jean Caminha
, Angelo Perkusich
, Mirko Barbosa Perkusich
:
A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things. 6063456:1-6063456:10 - Yao Wang
, Wan-Dong Cai, Pin Lyu, Wei Shao:
A Combined Static and Dynamic Analysis Approach to Detect Malicious Browser Extensions. 7087239:1-7087239:16 - Qianqian Yang
, Lei Hu
, Danping Shi, Yosuke Todo
, Siwei Sun:
On the Complexity of Impossible Differential Cryptanalysis. 7393401:1-7393401:11 - Krzysztof Szczypiorski
, Liqiang Wang, Xiangyang Luo
, Dengpan Ye:
Big Data Analytics for Information Security. 7657891:1-7657891:2 - Tongxiang Wang
, Xianglin Wei
, Jianhua Fan
, Tao Liang:
Jammer Localization in Multihop Wireless Networks Based on Gravitational Search. 7670939:1-7670939:11 - Yongbin Zeng
, Hui Guang, Guangsong Li
:
Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks. 8470949:1-8470949:9 - Reihaneh Safavi-Naini
, Alireza Poostindouz, Viliam Lisý:
Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication. 8475818:1-8475818:15 - Chenyu Wang
, Guoai Xu
, Wenting Li:
A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment. 9062675:1-9062675:15 - Yuntao Zhao
, Wenbo Zhang
, Yongxin Feng
, Bo Yu:
A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack. 9463653:1-9463653:8 - Hongyu Wang
, Jin Xu, Mingyuan Ma, Hongyan Zhang:
A New Type of Graphical Passwords Based on Odd-Elegant Labelled Graphs. 9482345:1-9482345:11 - Luca Caviglione
, Wojciech Mazurczyk, Steffen Wendzel
, Sebastian Zander:
Emerging and Unconventional: New Attacks and Innovative Detection Techniques. 9672523:1 - Jin Ye, Xiangyang Cheng
, Jian Zhu, Luting Feng, Ling Song
:
A DDoS Attack Detection Method Based on SVM in Software Defined Network. 9804061:1-9804061:8 - Mohamed Idhammad
, Karim Afdel, Mustapha Belouch
:
Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest. 1263123:1-1263123:13 - Wonsuk Choi, Youngkyung Lee, Duhyeong Lee, Hyoseung Kim, Jin Hyung Park, In Seok Kim, Dong Hoon Lee
:
Less Communication: Energy-Efficient Key Exchange for Securing Implantable Medical Devices. 1809302:1-1809302:16 - Ali El Ksimi
, Leghris Cherkaoui
:
Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks. 1816462:1-1816462:11 - Evgenia Novikova
, Yana A. Bekeneva
, Andrey Shorov
:
The Motif-Based Approach to the Analysis of the Employee Trajectories within Organization. 2476968:1-2476968:12 - Ye Yuan
, Liji Wu
, Yijun Yang
, Xiangmin Zhang:
A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism. 2483619:1-2483619:13 - Yulong Wang
, Junjie Yi
, Jun Guo
, Yanbo Qiao, Mingyue Qi
, Qingyu Chen
:
A Semistructured Random Identifier Protocol for Anonymous Communication in SDN Network. 2916356:1-2916356:20 - Bo Zhang
, Zhongtian Jia, Chuan Zhao:
An Efficient Certificateless Generalized Signcryption Scheme. 3578942:1-3578942:11 - Chen Wang
, Jian Shen
, Qi Liu, Yongjun Ren, Tong Li
:
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things. 3680851:1-3680851:7 - Xin Su
, Ziyu Wang, Xiaofeng Liu, Chang Choi
, Dongmin Choi
:
Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures. 4296934:1-4296934:14 - Manhua Liu
, Shuxin Liu
, Weiwu Yan
:
Latent Fingerprint Segmentation Based on Ridge Density and Orientation Consistency. 4529652:1-4529652:10 - Yi-Hong Du
, Shi-Hua Liu
:
Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks. 4691203:1-4691203:7 - Jun Xu, Xiong Zhang
, Meng Zhou:
A High-Security and Smart Interaction System Based on Hand Gesture Recognition for Internet of Things. 4879496:1-4879496:11 - Qingyi Zhu
, Seng W. Loke, Ye Zhang:
State-Based Switching for Optimal Control of Computer Virus Propagation with External Device Blocking. 4982523:1-4982523:10 - Chunming Zhang
, Jingwei Xiao:
Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model. 5353060:1-5353060:10 - Irene Arsuaga
, Nerea Toledo
, Igor Lopez
, Marina Aguado
:
A Framework for Vulnerability Detection in European Train Control Railway Communications. 5634181:1-5634181:9 - Ding Wang
, Shujun Li, Qi Jiang
:
User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs. 6150491:1-6150491:2 - Zhen-Hao Zhang
, Yurong Song
, Ling-Ling Xia, Yinwei Li
, Liang Zhang
, Guo-Ping Jiang
:
A Novel Load Capacity Model with a Tunable Proportion of Load Redistribution against Cascading Failures. 6254876:1-6254876:7 - Yang Xu
, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, Yaoxue Zhang:
A Feasible Fuzzy-Extended Attribute-Based Access Control Technique. 6476315:1-6476315:11 - Gábor Danner
, Árpád Berta
, István Hegedüs
, Márk Jelasity
:
Robust Fully Distributed Minibatch Gradient Descent with Privacy Preservation. 6728020:1-6728020:15