Security in Computing and Communications: 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers
暂无分享,去创建一个
Sabu M. Thampi | Danda B. Rawat | Gregorio Martinez Perez | Ryan K. L. Ko | G. Pérez | S. Thampi | D. Rawat | R. Ko
[1] Yih Huang,et al. Introducing Diversity and Uncertainty to Create Moving Attack Surfaces for Web Services , 2011, Moving Target Defense.
[2] Wei-Kuei Chen,et al. Image sharing method for gray-level images , 2013, J. Syst. Softw..
[3] Ingrid Verbauwhede,et al. The communication and computation cost of wireless security: extended abstract , 2011, WiSec '11.
[4] Ching-Nung Yang,et al. Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..
[5] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[6] Alejandro Alvaro Ramírez-Acosta,et al. Optimized robust multi-sensor scheme for simultaneous video and image iris recognition , 2018, Pattern Recognit. Lett..
[7] Christopher Krügel,et al. A quantitative study of accuracy in system call-based malware detection , 2012, ISSTA 2012.
[8] Michele Nappi,et al. Multibiometric score-level fusion through optimization and training , 2019, 2019 3rd International Conference on Bio-engineering for Smart Technologies (BioSMART).
[9] Paul J. Werbos,et al. Backpropagation Through Time: What It Does and How to Do It , 1990, Proc. IEEE.
[10] Paulo Shakarian,et al. Early Warnings of Cyber Threats in Online Discussions , 2017, 2017 IEEE International Conference on Data Mining Workshops (ICDMW).
[11] Huy Hoang Ngo,et al. Dynamic Key Cryptography and Applications , 2010, Int. J. Netw. Secur..
[12] Steve J. Chapin,et al. Address-space layout randomization using code islands , 2009, J. Comput. Secur..
[13] Lester S. Hill. Cryptography in An Algebraic Alphabet , 1929 .
[14] Waleed Al-Nuaimy,et al. Real-time Detection of Wearable Camera Motion Using Optical Flow , 2018, 2018 IEEE Congress on Evolutionary Computation (CEC).
[15] Elisa Bertino,et al. Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks , 2013, NSS.
[16] Yee Wei Law,et al. Assessing Security-Critical Energy-Efficient Sensor Networks , 2002 .
[17] Ayumu Kubota,et al. Detecting and Preventing Drive-By Download Attack via Participative Monitoring of the Web , 2013, 2013 Eighth Asia Joint Conference on Information Security.
[18] Syam Kumar Pasupuleti,et al. A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud , 2018, Journal of Ambient Intelligence and Humanized Computing.
[19] Colin Ware,et al. Information Visualization: Perception for Design , 2000 .
[20] Jian Zhang,et al. Classification of Android apps and malware using deep neural networks , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[21] Meenakshi Sharma,et al. A Hybrid Cryptosystem approach for file security by using merging mechanism , 2016, 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).
[22] Shahram Rahimi,et al. Domino-Effect Free Crash Recovery for Concurrent Failures in Cluster Federation , 2008, GPC.
[23] Manoj Kumar. AN EFFICIENT RECOVERY MECHANISM WITH CHECKPOINTING APPROACH FOR CLUSTER FEDERATION , 2014 .
[24] Tao Zhang,et al. Reducing energy consumption of mobile phones during data transmission and encryption for wireless body area network applications , 2015, Secur. Commun. Networks.
[25] Win Zaw,et al. Permission-Based Android Malware Detection , 2013 .
[26] Ibrahim Marouf,et al. INVESTIGATION STUDY OF FEASIBLE PRIME NUMBER TESTING ALGORITHMS , 2017 .
[27] Ching-Nung Yang,et al. Improving recovered image quality in secret image sharing by simple modular arithmetic , 2018, Signal Process. Image Commun..
[28] Xiaohu Tang,et al. Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud , 2018, IEEE Transactions on Services Computing.
[29] Hannes Holm,et al. An expert-based investigation of the Common Vulnerability Scoring System , 2015, Comput. Secur..
[30] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[31] Parviz Keshavarzi,et al. Advance hybrid key management architecture for SCADA network security , 2016, Secur. Commun. Networks.
[32] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[33] M. Curty,et al. Secure quantum key distribution , 2014, Nature Photonics.
[34] K. P. Soman,et al. Evaluation of Recurrent Neural Network and its Variants for Intrusion Detection System (IDS) , 2017, Int. J. Inf. Syst. Model. Des..
[35] Claudia Eckert,et al. Deep Learning for Classification of Malware System Call Sequences , 2016, Australasian Conference on Artificial Intelligence.
[36] Yoshua Bengio,et al. Greedy Layer-Wise Training of Deep Networks , 2006, NIPS.
[37] Srivaths Ravi,et al. System design methodologies for a wireless security processing platform , 2002, DAC '02.
[38] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[39] Yan Grunenberger,et al. The Cost of the "S" in HTTPS , 2014, CoNEXT.
[40] Jani Suomalainen,et al. Secure inspection of web transactions , 2012 .
[41] Sushil Jajodia,et al. Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks , 2016, DBSec.
[42] Manindra Agrawal. Primality Tests Based on Fermat's Little Theorem , 2006, ICDCN.
[43] Yiguo Qiao,et al. Anomaly intrusion detection method based on HMM , 2002 .
[44] J. Stone. Cyber War Will Take Place! , 2013 .
[45] Ahmad Al Badawi,et al. Frequency Analysis of 32-bit Modular Divider Based on Extended GCD Algorithm for Different FPGA chips , 2018 .
[46] V Jyothsna,et al. A Review of Anomaly based Intrusion Detection Systems , 2011 .
[47] Monther Aldwairi,et al. MALURLs: Malicious URLs Classification System , 2011 .
[48] Samhaa R. El-Beltagy,et al. A Fully Automated Approach for Arabic Slang Lexicon Extraction from Microblogs , 2014, CICLing.
[49] M. Abdullah-Al-Wadud,et al. Directional Age-Primitive Pattern (DAPP) for Human Age Group Recognition and Age Estimation , 2017, IEEE Transactions on Information Forensics and Security.
[50] Vinod Kumar,et al. Signature Based Intrusion Detection System Using SNORT , 2012 .
[51] Janani Kalyanam,et al. Solution to Detect, Classify, and Report Illicit Online Marketing and Sales of Controlled Substances via Twitter: Using Machine Learning and Web Forensics to Combat Digital Opioid Access , 2018, Journal of medical Internet research.
[52] Monther Aldwairi,et al. Anomaly Payload Signature Generation System Based on Efficient Tokenization Methodology , 2018 .
[53] Fei Su,et al. Joint multi-feature fusion and attribute relationships for facial attribute prediction , 2017, 2017 IEEE Visual Communications and Image Processing (VCIP).
[54] Hugo Proença,et al. UBEAR: A dataset of ear images captured on-the-move in uncontrolled conditions , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).
[55] Jan Almäng,et al. War, vagueness and hybrid war , 2019, Defence Studies.
[56] Hai Jin,et al. A hybrid ranking approach to estimate vulnerability for dynamic attacks , 2011, Comput. Math. Appl..
[57] Rama Chellappa,et al. HyperFace: A Deep Multi-Task Learning Framework for Face Detection, Landmark Localization, Pose Estimation, and Gender Recognition , 2019, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[58] Ville Leppänen,et al. A Survey on Fake Entities as a Method to Detect and Monitor Malicious Activity , 2017, 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP).
[59] E. Keren,et al. Encryption of pictures and shapes by random grids. , 1987, Optics letters.
[60] Panganamala Ramana Kumar,et al. Dynamic Watermarking: Active Defense of Networked Cyber–Physical Systems , 2016, Proceedings of the IEEE.
[61] Robert König,et al. Universally Composable Privacy Amplification Against Quantum Adversaries , 2004, TCC.
[62] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[63] Sushil Jajodia,et al. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities , 2014, IEEE Transactions on Dependable and Secure Computing.
[64] Arun Venkataramani,et al. Energy consumption in mobile phones: a measurement study and implications for network applications , 2009, IMC '09.
[65] S. Ishmukhametov,et al. On practical aspects of the Miller-Rabin Primality Test , 2013 .
[66] B. Buchanan,et al. Attributing Cyber Attacks , 2015 .
[67] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[68] Mark Stamp,et al. Introduction to Machine Learning with Applications in Information Security , 2017 .
[69] Yoshua Bengio,et al. Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation , 2014, EMNLP.
[70] Xiaofeng Chen,et al. Secure Distributed Deduplication Systems with Improved Reliability , 2015, IEEE Trans. Computers.
[71] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[72] Behnam Dezfouli,et al. Energy and Processing Demand Analysis of TLS Protocol in Internet of Things Applications , 2018, 2018 IEEE International Workshop on Signal Processing Systems (SiPS).
[73] Zahra Moravej,et al. Secure SCADA communication by using a modified key management scheme. , 2013, ISA transactions.
[74] Corrado Ronchi,et al. Hardened Client Platforms for Secure Internet Banking , 2008, ISSE.
[75] Milos Drutarovský,et al. True Random Number Generator Embedded in Reconfigurable Hardware , 2002, CHES.
[76] Robert J. Bunker. FIVE-DIMENSIONAL (CYBER) WARFIGHTING: CAN THE ARMY AFTER NEXT BE DEFEATED THROUGH COMPLEX CONCEPTS AND TECHNOLOGIES? , 1998 .
[77] Muhammad Abdul-Mageed,et al. SANA: A Large Scale Multi-Genre, Multi-Dialect Lexicon for Arabic Subjectivity and Sentiment Analysis , 2014, LREC.
[78] Muhammad Abdul-Mageed,et al. SAMAR: A System for Subjectivity and Sentiment Analysis of Arabic Social Media , 2012, WASSA@ACL.
[79] Shahram Rahimi,et al. A Novel Recovery Approach for Cluster Federations , 2007, GPC.
[80] Luc Van Gool,et al. Random Forests for Real Time 3D Face Analysis , 2012, International Journal of Computer Vision.
[81] Mahdi Abadi,et al. DbDHunter: An ensemble-based anomaly detection approach to detect drive-by download attacks , 2015, 2015 5th International Conference on Computer and Knowledge Engineering (ICCKE).
[82] Per Larsen,et al. SoK: Automated Software Diversity , 2014, 2014 IEEE Symposium on Security and Privacy.
[83] Hsinchun Chen,et al. Sentiment analysis in multiple languages: Feature selection for opinion classification in Web forums , 2008, TOIS.
[84] Nathan Clarke,et al. Advanced facial recognition for digital forensics , 2018 .
[85] Siu-Ming Yiu,et al. A multi-task learning model for malware classification with useful file access pattern from API call sequence , 2016, ArXiv.
[86] Tom M. Mitchell,et al. Weakly Supervised Extraction of Computer Security Events from Twitter , 2015, WWW.
[87] Mohammed H. Almeshekah,et al. Planning and Integrating Deception into Computer Security Defenses , 2014, NSPW '14.
[88] Reza Malekian,et al. The hybrid encryption algorithm of lightweight data in cloud storage , 2016, 2016 2nd International Symposium on Agent, Multi-Agent Systems and Robotics (ISAMSR).
[89] Ahmad Firdaus Ahmad Fadzil,et al. Comprehensive Performance Assessment on Open Source Intrusion Detection System , 2019 .
[90] Ali Dehghantanha,et al. Machine learning aided Android malware classification , 2017, Comput. Electr. Eng..
[91] Frederick B. Cohen,et al. Operating system protection through program evolution , 1993, Comput. Secur..
[92] George R. S. Weir,et al. From ZeuS to Zitmo: Trends in Banking Malware , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[93] Shahram Rahimi,et al. Novel Crash Recovery Approach for Concurrent Failures in Cluster Federation , 2009, GPC.
[94] Parviz Keshavarzi,et al. Key management issue in SCADA networks: A review , 2017 .
[95] Bing Qi,et al. Practical challenges in quantum key distribution , 2016, npj Quantum Information.
[96] M. Weber,et al. Politics as a Vocation , 1919, Princeton Readings in Political Thought.
[97] P. S. Avadhani,et al. A Comparison of Two Intrusion Detection Systems , 2013 .
[98] Zhibin Zhou,et al. Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).
[99] Mohammed Al-Kabi,et al. Evaluating social context in arabic opinion mining , 2018, Int. Arab J. Inf. Technol..
[100] Debbie W. Leung,et al. The Universal Composable Security of Quantum Key Distribution , 2004, TCC.
[101] Andrew Smith,et al. Public support for facial recognition via police body-worn cameras: Findings from a list experiment , 2020, Gov. Inf. Q..
[102] Riccardo Distasi,et al. MUBIDUS-I: A multibiometric and multipurpose dataset , 2019, 2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS).
[103] Srivaths Ravi,et al. Optimizing public-key encryption for wireless clients , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[104] Karsten Brauer. Authentication and security aspects in an international multi-user network , 2011 .
[105] Miguel Morales-Sandoval,et al. Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN , 2018, Secur. Commun. Networks.
[106] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[107] Zhiyuan Zheng,et al. Towards Improving Data Validity of Cyber-Physical Systems through Path Redundancy , 2017, CPSS@AsiaCCS.
[108] Audun Jøsang,et al. DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking , 2016, CCS.
[109] Monther Aldwairi,et al. MALURLS: A Lightweight Malicious Website Classification Based on URL Features , 2012 .
[110] Brent Byunghoon Kang,et al. POLaR: Per-Allocation Object Layout Randomization , 2019, 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[111] Elena Dubrova,et al. A List of Maximum Period NLFSRs , 2012, IACR Cryptol. ePrint Arch..
[112] Pete Burnap,et al. A Supervised Intrusion Detection System for Smart Home IoT Devices , 2019, IEEE Internet of Things Journal.
[113] Neil C. Rowe,et al. A Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systems , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[114] F. Xavier Roca,et al. Age and gender recognition in the wild with deep attention , 2017, Pattern Recognit..
[115] Tudor Dumitras,et al. Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits , 2015, USENIX Security Symposium.
[116] Xiaohui Liang,et al. SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud , 2017, IEEE Internet of Things Journal.
[117] Ville Leppänen,et al. Diversifying SQL to Prevent Injection Attacks , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[118] Ian H. Witten,et al. WEKA: a machine learning workbench , 1994, Proceedings of ANZIIS '94 - Australian New Zealnd Intelligent Information Systems Conference.
[119] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[120] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[121] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[122] Susan Elias,et al. Multiview gait-based gender classification through pose-based voting , 2019, Pattern Recognit. Lett..
[123] Dacheng Tao,et al. Trunk-Branch Ensemble Convolutional Neural Networks for Video-Based Face Recognition , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[124] Sushil Jajodia,et al. Proactive Defense Through Deception , 2019 .
[125] Yoshua Bengio,et al. A Neural Probabilistic Language Model , 2003, J. Mach. Learn. Res..
[126] Jari-Matti Mäkelä,et al. Preventing malicious attacks by diversifying Linux shell commands , 2015, SPLST.
[127] Richard A. Clarke,et al. Cyber War: The Next Threat to National Security and What to Do About It , 2010 .
[128] Sang-Uk Shin,et al. Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage , 2019, Wirel. Commun. Mob. Comput..
[129] Jeppe Teglskov Jacobsen,et al. The cyberwar mirage and the utility of cyberattacks in war: How to make real use of Clausewitz in the age of cyberspace , 2014 .
[130] Gaili Yue,et al. Face Recognition Based on Histogram Equalization and Convolution Neural Network , 2018, 2018 10th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC).
[131] Madhavi Latha Makkena,et al. Face Recognition and Human Tracking Using GMM, HOG and SVM in Surveillance Videos , 2017, Annals of Data Science.
[132] Eric Medvet,et al. Detecting Android malware using sequences of system calls , 2015, DeMobile@SIGSOFT FSE.
[133] Gordon Fyodor Lyon,et al. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .
[134] Chih-Hsien Hsia,et al. Lossless progressive secret sharing for grayscale and color images , 2019, Multimedia Tools and Applications.
[135] Berk Sunar,et al. A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks , 2007, IEEE Transactions on Computers.
[136] Yannick Abanda,et al. Image encryption by chaos mixing , 2016, IET Image Process..
[137] Arun Kumar Sangaiah,et al. Android malware detection based on system call sequences and LSTM , 2019, Multimedia Tools and Applications.
[138] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[139] Jack W. Stokes,et al. Large-scale malware classification using random projections and neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[140] Monther Aldwairi,et al. Switch architecture for optical burst switching networks , 2015 .
[141] Simone Atzeni,et al. Evaluation of Android Malware Detection Based on System Calls , 2016, IWSPA@CODASPY.
[142] Ashok Kumar Mohan,et al. An Investigation on HTTP/2 Security , 2018, J. Cyber Secur. Mobil..
[143] Mounir Ghogho,et al. Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).
[144] Gang Wang,et al. Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media , 2017, CIKM.
[145] Xingquan Zhu,et al. Machine Learning for Android Malware Detection Using Permission and API Calls , 2013, 2013 IEEE 25th International Conference on Tools with Artificial Intelligence.
[146] Al-Sakib Khan Pathan,et al. Checkpointing distributed computing systems: an optimisation approach , 2019 .
[147] M. Ståhlberg. THE TROJAN MONEY SPINNER , 2007 .
[148] R. Ito,et al. Image Size Invariant Visual Cryptography , 1999 .
[149] Masato Koashi,et al. Simple security proof of quantum key distribution based on complementarity , 2009 .
[150] Hiroshi Ishii,et al. Automated Detection of Drive-By Download Attack , 2015, 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[151] Alessandro Trifiletti,et al. A High-Speed Oscillator-Based Truly Random Number Source for Cryptographic Applications on a Smart Card IC , 2003, IEEE Trans. Computers.
[152] François-Xavier Standaert,et al. On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[153] Muhammad Abdul-Mageed,et al. AWATIF: A Multi-Genre Corpus for Modern Standard Arabic Subjectivity and Sentiment Analysis , 2012, LREC.
[154] Roberto Peon,et al. HPACK: Header Compression for HTTP/2 , 2015, RFC.
[155] Karen A. Scarfone,et al. A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .
[156] Per Larsen,et al. Security through Diversity: Are We There Yet? , 2014, IEEE Security & Privacy.
[157] Dennis Andriesse,et al. An Analysis of the Zeus Peer-to-Peer Protocol , 2014 .
[158] Simon W. Moore,et al. The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators , 2009, CHES.
[159] Golden G. Richard,et al. Detecting objective-C malware through memory forensics , 2016 .
[160] Ji Xiang,et al. Towards Fine-Grained Access Control on Browser Extensions , 2012, ISPEC.
[161] Lei Liu,et al. Chrome Extensions: Threat Analysis and Countermeasures , 2012, NDSS.
[162] Michael Welzl,et al. Can SPDY really make the web faster? , 2014, 2014 IFIP Networking Conference.
[163] Sellami Ali,et al. DECOY STATE QUANTUM KEY DISTRIBUTION , 2010 .
[164] Christine Morin,et al. A hierarchical checkpointing protocol for parallel applications in cluster federations , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[165] Chik How Tan,et al. Analysis and Enhancement of Random Number Generator in FPGA Based on Oscillator Rings , 2008, 2008 International Conference on Reconfigurable Computing and FPGAs.
[166] Markus Jakobsson,et al. Mutual Authentication for Low-Power Mobile Devices , 2002, Financial Cryptography.
[167] Abdelmgeid Amin Ali,et al. Image Steganography Technique By Using Braille Method of Blind People (LSBraille) , 2013 .
[168] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[169] Zhuo Lu,et al. Cyber Deception: Overview and the Road Ahead , 2018, IEEE Security & Privacy.
[170] Michele Nappi,et al. Gender classification on 2D human skeleton , 2019, 2019 3rd International Conference on Bio-engineering for Smart Technologies (BioSMART).
[171] Nattakant Utakrit. Review of Browser Extensions, a Man-in-the-Browser Phishing Techniques Targeting Bank Customers , 2009 .
[172] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[173] S. A. Alyamkin,et al. Age Recognition from Facial Images using Convolutional Neural Networks , 2019, Optoelectronics, Instrumentation and Data Processing.
[174] Shyi-Ming Chen,et al. Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[175] Guodong Guo,et al. A survey on deep learning based face recognition , 2019, Comput. Vis. Image Underst..
[176] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[177] Antonio Ruiz-Martínez,et al. Systematic literature review on the state of the art and future research work in anonymous communications systems , 2017, Comput. Electr. Eng..
[178] Anne E. James,et al. Network Intrusion Detection Systems in High-Speed Traffic in Computer Networks , 2013, 2013 IEEE 10th International Conference on e-Business Engineering.
[179] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[180] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[181] Marvin Theimer,et al. Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[182] Anjula Gupta,et al. Cryptography Algorithms: A Review , 2014 .
[183] Qasem Abu Al-Haija,et al. A Systematic Expository Review of Schmidt-Samoa Cryptosystem , 2018 .
[184] Dawn Song,et al. Mitigating buffer overflows by operating system randomization , 2002 .
[185] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[186] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[187] L. Alvisi,et al. A Survey of Rollback-Recovery Protocols , 2002 .
[188] Damian Kacperski,et al. COMPACT: Biometric Dataset of Face Images Acquired in Uncontrolled Indoor Environment , 2019, Comput. Sci..
[189] Tzung-Her Chen,et al. Threshold visual secret sharing by random grids , 2011, J. Syst. Softw..
[190] By Olivia A. Garard,et al. Clausewitzian Alchemy and the Modern Character of War , 2019, Orbis.
[191] Christine Morin,et al. Hybrid checkpointing for parallel applications in cluster federations , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..
[192] Pabak Indu,et al. Hiding Data in Text using ASCII Mapping Technology (AMT) , 2013 .
[193] Nathan Danneman,et al. Social Media Mining with R , 2014 .
[194] Witawas Srisa-an,et al. Significant Permission Identification for Machine-Learning-Based Android Malware Detection , 2018, IEEE Transactions on Industrial Informatics.
[195] Timothy W. Finin,et al. CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[196] Lior Rokach,et al. Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers , 2017, ArXiv.
[197] Young-Chang Hou,et al. Goal-programming-assisted visual cryptography method with unexpanded shadow images for general access structures , 2006 .
[198] Srinivas Devadas,et al. FPGA-Based True Random Number Generation Using Circuit Metastability with Adaptive Feedback Control , 2011, CHES.
[199] Ching-Nung Yang,et al. New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..
[200] Thomas Hardjono,et al. Security in Wireless LANs and MANs , 2005 .
[201] Mihir Bellare,et al. DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.
[202] Swarup Bhunia,et al. Hardware Trojan: Threats and emerging solutions , 2009, 2009 IEEE International High Level Design Validation and Test Workshop.
[203] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[204] Qasem Abu Al-Haija,et al. Radix-8 Design Alternatives of Fast Two Operands Interleaved Multiplication with Enhanced Architecture , 2019 .
[205] Yan Yan,et al. Multi-label learning based deep transfer neural network for facial attribute classification , 2018, Pattern Recognit..
[206] Vincenzo A. Sainato,et al. Cyber War Will Not Take Place , 2012 .
[207] Wenjia Li,et al. Detecting Malware for Android Platform: An SVM-Based Approach , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.
[208] Samee Ullah Khan,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 , 2008 .
[209] Shyong Jian Shyu,et al. Image encryption by multiple random grids , 2009, Pattern Recognit..
[210] Georgios Kambourakis,et al. The Mirai botnet and the IoT Zombie Armies , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).
[211] Maria Rigaki,et al. Adversarial deep learning against intrusion detection classifiers , 2017 .
[212] Monther Aldwairi,et al. Detecting Fake News in Social Media Networks , 2018, EUSPN/ICTH.
[213] Hannes Holm,et al. Baltic Cyber Shield : Research from a Red Team versus Blue Team Exercise , 2012 .
[214] Yi-Chun Yeh,et al. BrowserGuard: A Behavior-Based Solution to Drive-by-Download Attacks , 2011, IEEE Journal on Selected Areas in Communications.
[215] Igor Santos,et al. Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying , 2015, Log. J. IGPL.
[216] Duncan S. Wong,et al. Mutual authentication and key exchange for low power wireless communications , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[217] Ahmad-Reza Sadeghi,et al. On the (In)Security of Mobile Two-Factor Authentication , 2014, Financial Cryptography.
[218] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[219] Qasem Abu Al-Haija,et al. Implementing variable length Pseudo Random Number Generator (PRNG) with fixed high frequency (1.44 GHZ) via Vertix-7 FPGA family , 2015 .
[220] Angelos D. Keromytis,et al. SQLrand: Preventing SQL Injection Attacks , 2004, ACNS.
[221] Alfredo De Santis,et al. Modeling energy-efficient secure communications in multi-mode wireless mobile devices , 2015, J. Comput. Syst. Sci..
[222] H. Nissenbaum. A Contextual Approach to Privacy Online , 2011, Daedalus.
[223] Min Chen,et al. Privacy Protection and Intrusion Avoidance for Cloudlet-Based Medical Data Sharing , 2020, IEEE Transactions on Cloud Computing.
[224] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[225] Monther Aldwairi,et al. Automated malicious advertisement detection using VirusTotal, URLVoid, and TrendMicro , 2017, 2017 8th International Conference on Information and Communication Systems (ICICS).
[226] Kazumasa Omote,et al. An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode , 2015, 2015 10th Asia Joint Conference on Information Security.
[227] Wen-Pinn Fang,et al. Friendly progressive visual secret sharing , 2008, Pattern Recognit..
[228] Aron Culotta,et al. Tweedr: Mining twitter to inform disaster response , 2014, ISCRAM.
[229] Angelos D. Keromytis,et al. On the General Applicability of Instruction-Set Randomization , 2010, IEEE Transactions on Dependable and Secure Computing.
[230] Joeri de Ruiter,et al. Designed to Fail: A USB-Connected Reader for Online Banking , 2012, NordSec.
[231] Poornima Mohan,et al. Implementation and Comparison of different Data Hiding Techniques in Image Steganography , 2019, 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI).
[232] Martín Abadi,et al. Message-Locked Encryption for Lock-Dependent Messages , 2013, IACR Cryptol. ePrint Arch..
[233] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[234] Lin-Shan Lee,et al. Audio Word2Vec: Unsupervised Learning of Audio Segment Representations Using Sequence-to-Sequence Autoencoder , 2016, INTERSPEECH.
[235] Bostjan Brumen,et al. Performance analysis of two open source intrusion detection systems , 2016, 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[236] Remo Burkhard,et al. Knowledge visualization: The use of complementary visual representations for the transfer of knowledge. A model, a framework, and four new approaches , 2005 .
[237] Gerd Leuchs,et al. Attacks on practical quantum key distribution systems (and how to prevent them) , 2015, 1512.07990.
[238] Heng Yin,et al. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android , 2013, SecureComm.
[239] Mahmoud A. Smadi,et al. Efficient FPGA Implementation of RSA Coprocessor Using Scalable Modules , 2014, FNC/MobiSPC.
[240] Zhaohui Liang,et al. A System Call Randomization Based Method for Countering Code-Injection Attacks , 2009 .
[241] Irfan-Ullah Awan,et al. Performance Evaluation Study of Intrusion Detection Systems , 2011, ANT/MobiWIS.
[242] Alfredo De Santis,et al. Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.
[243] Benjamin Livshits,et al. Verified Security for Browser Extensions , 2011, 2011 IEEE Symposium on Security and Privacy.
[244] Bruno Robisson,et al. Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator , 2012, COSADE.
[245] Pan Jianwei. Quantum Science Satellite , 2014 .
[246] Muttukrishnan Rajarajan,et al. Android Security: A Survey of Issues, Malware Penetration, and Defenses , 2015, IEEE Communications Surveys & Tutorials.
[247] Srivaths Ravi,et al. A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.
[248] Martín Abadi,et al. On Protection by Layout Randomization , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[249] Laurent Fesquet,et al. A Self-Timed Ring Based True Random Number Generator , 2013, 2013 IEEE 19th International Symposium on Asynchronous Circuits and Systems.
[250] Christopher Krügel,et al. Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks , 2009, DIMVA.
[251] Antonio Ruiz-Martínez,et al. Privacy enhancement in anonymous network channels using multimodality injection , 2015, Secur. Commun. Networks.
[252] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[253] Subhash Chand Bunker,et al. Linear equation based visual secret sharing scheme , 2014, 2014 IEEE International Advance Computing Conference (IACC).
[254] Cengiz Acartürk,et al. The analysis of feature selection methods and classification algorithms in permission based Android malware detection , 2014, 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[255] Feng Hao,et al. DOMtegrity: ensuring web page integrity against malicious browser extensions , 2019, International Journal of Information Security.
[256] Honorio Martín,et al. A New TRNG Based on Coherent Sampling With Self-Timed Rings , 2016, IEEE Transactions on Industrial Informatics.
[257] Raffael Marty,et al. Applied Security Visualization , 2008 .
[258] Michele Nappi,et al. Gait Analysis for Gender Classification in Forensics , 2019, DependSys.
[259] Ranjit Kumar,et al. Gender Recognition Through Face Using Deep Learning , 2018 .
[260] Subramanian Ramanathan,et al. SALSA: A Novel Dataset for Multimodal Group Behavior Analysis , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[261] Jenq-Neng Hwang,et al. An Ensemble of Invariant Features for Person Reidentification , 2017, IEEE Transactions on Circuits and Systems for Video Technology.
[262] Xiangyu Ju. Android malware detection through permission and package , 2014, 2014 International Conference on Wavelet Analysis and Pattern Recognition.
[263] Xinghuo Yu,et al. A multi-module anomaly detection scheme based on system call prediction , 2013, 2013 IEEE 8th Conference on Industrial Electronics and Applications (ICIEA).
[264] Milos D. Ercegovac,et al. Digital Arithmetic , 2003, Wiley Encyclopedia of Computer Science and Engineering.
[265] Xiongfeng Ma,et al. ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .
[266] Stefan Savage,et al. Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser , 2017, CSET @ USENIX Security Symposium.
[267] Jari-Matti Mäkelä,et al. Diversification of System Calls in Linux Binaries , 2014, INTRUST.
[268] Wolfgang Hommel,et al. A Process Framework for Stakeholder-specific Visualization of Security Metrics , 2018, ARES.
[269] Michael E. Lesk,et al. The New Front Line: Estonia under Cyberassault , 2007, IEEE Security & Privacy.
[270] Hazem M. Hajj,et al. ArSentD-LEV: A Multi-Topic Corpus for Target-based Sentiment Analysis in Arabic Levantine Tweets , 2019, ArXiv.
[271] Yoshua Bengio,et al. The problem of learning long-term dependencies in recurrent networks , 1993, IEEE International Conference on Neural Networks.
[272] Mahdi Aiash,et al. Machine Learning Based Botnet Identification Traffic , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[273] Kailash Chandra Ray,et al. Dynamic Hash key-based stream cipher for secure transmission of real time ECG signal , 2016, Secur. Commun. Networks.
[274] Mohey M. Hadhoud,et al. Studying the Effects of Most Common Encryption Algorithms , 2011, Int. Arab. J. e Technol..
[275] Aaron Brantly. The Violence of Hacking: State Violence and Cyberspace , 2017 .
[276] Elena Dubrova,et al. On Constructing Secure and Hardware-Efficient Invertible Mappings , 2015, 2016 IEEE 46th International Symposium on Multiple-Valued Logic (ISMVL).
[277] Jiannong Cao,et al. Checkpointing in hybrid distributed systems , 2004, 7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings..
[278] Li-Jia Wei,et al. Sec-Buzzer: cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation , 2016, Soft Computing.
[279] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[280] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[281] Henry Rõigas. Cyber War in Perspective: Lessons from the Conflict in Ukraine , 2018 .
[282] Kevin Curran,et al. Man in the Browser Attacks , 2012, Int. J. Ambient Comput. Intell..
[283] Qasem Abu Al-Haija,et al. A comparative study up to 1024 bit Euclid's GCD algorithm FPGA implementation and synthesizing , 2016, 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA).
[284] Gary Warner,et al. A flow-based approach for Trickbot banking trojan detection , 2019, Comput. Secur..
[285] Ayumu Kubota,et al. An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors , 2014, 2014 Ninth Asia Joint Conference on Information Security.
[286] Herbert Bos,et al. How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication , 2016, Financial Cryptography.
[287] Yu Yen,et al. Human Tracking for Facility Surveillance , 2019 .
[288] Syam Kumar Pasupuleti,et al. Efficient revocable CP-ABE for big data access control in cloud computing , 2019, Int. J. Secur. Networks.
[289] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[290] Mario Stipcevic,et al. True Random Number Generators , 2014, Open Problems in Mathematics and Computational Science.
[291] Xiangliang Zhang,et al. Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection , 2014, IEEE Transactions on Information Forensics and Security.
[292] Kuan-Ta Chen,et al. DroneFace: An Open Dataset for Drone Research , 2017, MMSys.
[293] Aqsa Rashid,et al. Scrutiny of Steganalysis for Flipping Steganography Method , 2019 .
[294] Mohit Sewak,et al. An investigation of a deep learning based malware detection system , 2018, ARES.
[295] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[296] Makhlouf Aliouat,et al. Checkpointing distributed application running on mobile ad hoc networks , 2018, Int. J. High Perform. Comput. Netw..
[297] Ping Zhang,et al. Fraud Track on Secure Electronic Check System , 2018, Int. J. Digit. Crime Forensics.
[298] K. K. Soundra Pandian,et al. Hybrid image sharing scheme using non-recursive hash key based stream cipher , 2018, Multimedia Tools and Applications.
[299] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[300] K. P. Soman,et al. Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.
[301] Zhou Zhiping,et al. The Study of Intrusion Prediction Based on HsMM , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[302] M. O. Adigun,et al. Towards privacy with tokenization as a service , 2014, 2014 IEEE 6th International Conference on Adaptive Science & Technology (ICAST).
[303] Riccardo Distasi,et al. Optimization of Score-Level Biometric Data Fusion by Constraint Construction Training , 2019, iSCI.
[304] Cihan Topal,et al. Gender recognition with uniform local binary patterns , 2018, 2018 26th Signal Processing and Communications Applications Conference (SIU).
[305] Mohamed Shehab,et al. Towards improving browser extension permission management and user awareness , 2012, 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[306] Abdelmgeid A. Ali,et al. Enhancing SMM Image Steganography Method by using LSBraille Image Steganography Method (SMMWB; Secret Message Matching With Braille) , 2013 .
[307] Shahram Rahimi,et al. A New Roll-Forward Checkpointing / Recovery Mechanism for Cluster Federation , 2006 .
[308] Marc Cheong,et al. A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter , 2011, Inf. Syst. Frontiers.
[309] Dhanashri Ashok Bhosale,et al. Comparative study and analysis of network intrusion detection tools , 2015, 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).
[310] Monther Aldwairi,et al. Detection of Drive-by Download Attacks Using Machine Learning Approach , 2017, Int. J. Inf. Secur. Priv..
[311] J. Yuill,et al. Honeyfiles: deceptive files for intrusion detection , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[312] Jean-Luc Gaudiot,et al. Hardware Acceleration for Cryptography Algorithms by Hotspot Detection , 2013, GPC.
[313] Anastasios Tefas,et al. Face Verification and Recognition for Digital Forensics and Information Security , 2019, 2019 7th International Symposium on Digital Forensics and Security (ISDFS).
[314] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[315] Kim-Kwang Raymond Choo,et al. Shellshock Vulnerability Exploitation and Mitigation: A Demonstration , 2017 .
[316] Song Guo,et al. A Pre-Authentication Approach to Proxy Re-Encryption in Big Data Context , 2017, IEEE Transactions on Big Data.
[317] Lior Rokach,et al. Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers , 2017, RAID.
[318] Erik Gartzke,et al. The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth , 2013, International Security.
[319] Nathaniel Evans,et al. Active Defense Techniques , 2018, Cyber Resilience of Systems and Networks.
[320] Stefan Metzger,et al. Stakeholder Specific Visualization and Automated Reporting of Network Scanning Results applying Vis4Sec , 2018, DFN-Forum Kommunikationstechnologien.
[321] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[322] Ramesh Karri,et al. Minimizing energy consumption of secure wireless session with QoS constraints , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[323] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[324] Md Sazzad Hossain. Social Media and Terrorism , 2015 .
[325] Andrea F. Abate,et al. Near Real-Time Three Axis Head Pose Estimation Without Training , 2019, IEEE Access.
[326] Jiguo Li,et al. Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing , 2017, IEEE Transactions on Services Computing.
[327] Yuan Ma,et al. Entropy Evaluation for Oscillator-Based True Random Number Generators , 2014, CHES.
[328] Rajkumar Buyya,et al. iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments , 2016, Softw. Pract. Exp..
[329] Shyong Jian Shyu,et al. Image encryption by random grids , 2007, Pattern Recognit..
[330] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[331] Rafal Rohozinski,et al. Stuxnet and the Future of Cyber War , 2011 .
[332] Eoghan Casey,et al. Digital Evidence and Computer Crime , 2000 .
[333] Hend S. Al-Khalifa,et al. A System for Sentiment Analysis of Colloquial Arabic Using Human Computation , 2014, TheScientificWorldJournal.
[334] K. P. Soman,et al. Applying convolutional neural network for network intrusion detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[335] Michele Nappi,et al. Transfer Learning for Facial Attributes Prediction and Clustering , 2019, iSCI.
[336] M. Drutarovsky,et al. A Robust Chaos-Based True Random Number Generator Embedded in Reconfigurable Switched-Capacitor Hardware , 2007, 2007 17th International Conference Radioelektronika.
[337] Martin Thomson,et al. Hypertext Transfer Protocol Version 2 (HTTP/2) , 2015, RFC.
[338] Benny Pinkas,et al. Secure Deduplication of Encrypted Data without Additional Independent Servers , 2015, CCS.
[339] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[340] Vivek Kanhangad,et al. Gender classification in smartphones using gait information , 2018, Expert Syst. Appl..
[341] Mutaz Mohammad,et al. A Numerical Solution of Fredholm Integral Equations of the Second Kind Based on Tight Framelets Generated by the Oblique Extension Principle , 2019, Symmetry.
[342] Peng Ning,et al. Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[343] M. Nirmala Devi,et al. Golden-chip free power metric based hardware trojan detection and diagnosis , 2017 .
[344] Ajit Singh,et al. Review on Multibiometrics: Classifications, Normalization and Fusion Levels , 2018, 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE).
[345] Karen Scarfone,et al. Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.
[346] Ville Leppänen,et al. Chapter 28 – Man-in-the-Browser Attacks in Modern Web Browsers , 2014 .
[347] Makhlouf Aliouat,et al. A New Efficient Checkpointing Algorithm for Distributed Mobile Computing , 2015 .
[348] Hugo Proença,et al. QUIS-CAMPI: an annotated multi-biometrics data feed from surveillance scenarios , 2017, IET Biom..
[349] Aziz Mohaisen,et al. Detecting and Classifying Android Malware Using Static Analysis along with Creator Information , 2015, Int. J. Distributed Sens. Networks.
[350] N. Mohankumar,et al. Malicious combinational Hardware Trojan detection by Gate Level Characterization in 90nm technology , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[351] S. R. El-Beltagy,et al. Open issues in the sentiment analysis of Arabic social media: A case study , 2013, 2013 9th International Conference on Innovations in Information Technology (IIT).
[352] Roberto Di Pietro,et al. Titans' revenge: Detecting Zeus via its own flaws , 2013, Comput. Networks.
[353] Simha Sethumadhavan,et al. Reviving instruction set randomization , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[354] Tadashi Dohi,et al. Comparing Checkpoint and Rollback Recovery Schemes in a Cluster System , 2012, ICA3PP.
[355] Eko Hari Rachmawanto,et al. Simple and secure image steganography using LSB and triple XOR operation on MSB , 2018, 2018 International Conference on Information and Communications Technology (ICOIACT).
[356] Robert H. Deng,et al. Deduplication on Encrypted Big Data in Cloud , 2016, IEEE Transactions on Big Data.
[357] Wai Sze Leung,et al. Improving Hidden Message Extraction Using LSB Steganalysis Techniques , 2018, ICISA.
[358] Gandharba Swain,et al. Performance evaluation parameters of image steganography techniques , 2016, 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS).
[359] K. P. Soman,et al. Evaluating effectiveness of shallow and deep networks to intrusion detection system , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[360] Sambit Bakshi,et al. Wavelet energy feature based source camera identification for ear biometric images , 2020, Pattern Recognit. Lett..
[361] Jian-Wei Pan,et al. Source attack of decoy-state quantum key distribution using phase information , 2013, 1304.2541.
[362] Mourad Debbabi,et al. SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream , 2017, ARES.
[363] Chao Yang,et al. Provable ownership of files in deduplication cloud storage , 2015, Secur. Commun. Networks.
[364] Chip Elliott,et al. Current status of the DARPA quantum network (Invited Paper) , 2005, SPIE Defense + Commercial Sensing.
[365] Amosse Edouard,et al. Event detection and analysis on short text messages. (Détection d'événement et analyse des messages courts) , 2017 .
[366] Abed Allah Khamaiseh,et al. A comprehensive survey of arabic sentiment analysis , 2019, Inf. Process. Manag..
[367] Qasem Abu Al-Haija,et al. Cost analysis study of variable parallel prefix adders using altera cyclone IV FPGA kit , 2017, 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA).
[368] Rastislav Lukac,et al. Bit-level based secret sharing for image encryption , 2005, Pattern Recognition.
[369] Angelos D. Keromytis,et al. Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution , 2011, Moving Target Defense.
[370] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[371] Ville Leppänen,et al. A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification , 2016, NordSec.
[372] Sean Lawson,et al. Putting the "war" in cyberwar: Metaphor, analogy, and cybersecurity discourse in the United States , 2012, First Monday.
[373] Ali Kanso,et al. A novel secret image sharing scheme using large primes , 2017, Multimedia Tools and Applications.
[374] Jong Min Kim,et al. Power Adaptive Data Encryption for Energy-Efficient and Secure Communication in Solar-Powered Wireless Sensor Networks , 2016, J. Sensors.
[375] Christopher Krügel,et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.
[376] Simon Parkinson,et al. Fog computing security: a review of current applications and security solutions , 2017, Journal of Cloud Computing.
[377] Adi Shamir,et al. How to share a secret , 1979, CACM.
[378] Jing He,et al. Security in Fog Computing through Encryption , 2016 .
[379] Divya Bhatnagar,et al. A Comparative Study of Symmetric Key Encryption Algorithms , 2014 .
[380] Arwa Alrawais,et al. Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.
[381] Ja-Chen Lin,et al. An image-sharing method with user-friendly shadow images , 2003, IEEE Trans. Circuits Syst. Video Technol..
[382] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[383] Wei Cao,et al. Implementation of high performance hardware architecture of face recognition algorithm based on local binary pattern on FPGA , 2015, 2015 IEEE 11th International Conference on ASIC (ASICON).
[384] Indrajit Ray,et al. Dynamic Security Risk Management Using Bayesian Attack Graphs , 2012, IEEE Transactions on Dependable and Secure Computing.
[385] M. Wilscy,et al. Detection of randomized bot command and control traffic on an end-point host , 2016 .
[386] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[387] Orachat Chitsobhuk,et al. Multi-pipeline Architecture for Face Recognition on FPGA , 2009, 2009 International Conference on Digital Image Processing.
[388] Helen J. Wang,et al. RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).
[389] Bidyut Gupta,et al. A Recovery Scheme for Cluster Federations Using Sender-based Message Logging , 2011, J. Comput. Inf. Technol..
[390] Odysseas G. Koufopavlou,et al. Random number generator architecture and VLSI implementation , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).
[391] Aleix M. Martinez,et al. The AR face database , 1998 .
[392] Zachary Chase Lipton. A Critical Review of Recurrent Neural Networks for Sequence Learning , 2015, ArXiv.