Risks and Security of Internet and Systems: 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019, Proceedings
暂无分享,去创建一个
Slim Kallel | Nora Cuppens-Boulahia | Ahmed Hadj Kacem | Frédéric Cuppens | Pegah Nikbakht Bideh | F. Cuppens | N. Cuppens-Boulahia | A. Kacem | Slim Kallel | Linus Karlsson | Martin Hell
[1] Scott Craver,et al. On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.
[2] Robin van Meteren. Using Content-Based Filtering for Recommendation , 2000 .
[3] Qi Li,et al. Building accountability into the Internet of Things: the IoT Databox model , 2018, Journal of Reliable Intelligent Environments.
[4] Jiannan Li,et al. The Policy Effect of the General Data Protection Regulation (GDPR) on the Digital Public Health Sector in the European Union: An Empirical Investigation , 2019, International journal of environmental research and public health.
[5] Juan Camilo Vargas,et al. Blockchain-based consent manager for GDPR compliance , 2019, Open Identity Summit.
[6] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[7] Jie Gu,et al. An effective intrusion detection framework based on SVM with feature augmentation , 2017, Knowl. Based Syst..
[8] Ganthan Narayana Samy,et al. Security threats categories in healthcare information systems , 2010, Health Informatics J..
[9] Zhibin Zhou,et al. Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption , 2015, IEEE Transactions on Computers.
[10] Hamad Alrimeih,et al. Fast and Flexible Hardware Support for ECC Over Multiple Standard Prime Fields , 2014, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[11] Kam-Fai Wong,et al. Interpreting TF-IDF term weights as making relevance decisions , 2008, TOIS.
[12] Carol Woody,et al. Introduction to the OCTAVE ® Approach , 2003 .
[13] Erik Tews,et al. Practical attacks against WEP and WPA , 2009, WiSec '09.
[14] Craig H. Rowland,et al. Covert Channels in the TCP/IP Protocol Suite , 1997, First Monday.
[15] Ana Ferreira,et al. TagUBig - Taming Your Big Data , 2018, 2018 International Carnahan Conference on Security Technology (ICCST).
[16] Douglas L. Reilly,et al. Credit card fraud detection with a neural-network , 1994, 1994 Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences.
[17] Dawn Xiaodong Song,et al. TaintEraser: protecting sensitive data leaks using application-level taint tracking , 2011, OPSR.
[18] John K. Ousterhout,et al. In Search of an Understandable Consensus Algorithm , 2014, USENIX ATC.
[19] Bashar Nuseibeh,et al. Requirements-driven adaptive security: Protecting variable assets at runtime , 2012, 2012 20th IEEE International Requirements Engineering Conference (RE).
[20] Kenneth G. Paterson,et al. Plaintext Recovery Attacks Against WPA/TKIP , 2014, FSE.
[21] Dan Schnackenberg,et al. Statistical approaches to DDoS attack detection and response , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[22] Thomas Plantard,et al. Modular Number Systems: Beyond the Mersenne Family , 2004, Selected Areas in Cryptography.
[23] John Mylopoulos,et al. Goal-driven risk assessment in requirements engineering , 2011, Requirements Engineering.
[24] Frank Piessens,et al. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 , 2017, CCS.
[25] Yajin Zhou,et al. NDroid: Toward Tracking Information Flows Across Multiple Android Contexts , 2019, IEEE Transactions on Information Forensics and Security.
[26] Bu-Sung Lee,et al. Power spectrum entropy based detection and mitigation of low-rate DoS attacks , 2018, Comput. Networks.
[27] João Paulo Papa,et al. Internet of Things: A survey on machine learning-based intrusion detection approaches , 2019, Comput. Networks.
[28] Jun Yang,et al. Model of Collaborative UAV Swarm Toward Coordination and Control Mechanisms Study , 2015, ICCS.
[29] Rong Jin,et al. Understanding bag-of-words model: a statistical framework , 2010, Int. J. Mach. Learn. Cybern..
[30] Bernhard Rinner,et al. Communication and Coordination for Drone Networks , 2016, ADHOCNETS.
[31] Josep Domingo-Ferrer,et al. Privacy and Data Protection by Design - from policy to engineering , 2014, ArXiv.
[32] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[33] Michail Maniatakos,et al. The Cybersecurity Landscape in Industrial Control Systems , 2016, Proceedings of the IEEE.
[34] Agustí Verde Parera,et al. General data protection regulation , 2018 .
[35] Yiyu Yao,et al. Measuring Retrieval Effectiveness Based on User Preference of Documents , 1995, J. Am. Soc. Inf. Sci..
[36] Christos Douligeris,et al. ForChaos: Real Time Application DDoS Detection Using Forecasting and Chaos Theory in Smart Home IoT Network , 2019, Wirel. Commun. Mob. Comput..
[37] Venizelos Efthymiou,et al. STRATEGIC RESEARCH AGENDA FOR EUROPE’S ELECTRICITY NETWORKS OF THE FUTURE: European Technology Platform SmartGrids , 2007 .
[38] Axel van Lamsweerde,et al. Elaborating security requirements by construction of intentional anti-models , 2004, Proceedings. 26th International Conference on Software Engineering.
[39] Len Hamey,et al. A survey of security and privacy issues in the Internet of Things from the layered context , 2019, Trans. Emerg. Telecommun. Technol..
[40] V. Lim. The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .
[41] Jürgen Beyerer,et al. The EU General Data Protection Regulation and its Effects on Designing Assistive Environments , 2018, PETRA.
[42] Bernd Freisleben,et al. CARDWATCH: a neural network based database mining system for credit card fraud detection , 1997, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr).
[43] Judea Pearl,et al. Bayesian Networks , 1998, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[44] Ramiro Gonçalves,et al. Intrusion detection systems in Internet of Things: A literature review , 2018, 2018 13th Iberian Conference on Information Systems and Technologies (CISTI).
[45] Adel M. Alimi,et al. Age, Gender, Race and Smile Prediction Based on Social Textual and Visual Data Analyzing , 2016, ISDA.
[46] Vijay Sivaraman,et al. Real-Time Detection of DNS Exfiltration and Tunneling from Enterprise Networks , 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).
[47] Sebastian Zander,et al. A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.
[48] Barry Smyth,et al. Case-Based Recommendation , 2007, The Adaptive Web.
[49] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[50] Thomas Plantard,et al. Arithmetic operations in the polynomial modular number system , 2005, 17th IEEE Symposium on Computer Arithmetic (ARITH'05).
[51] Andrea Back,et al. A new perspective on neutralization and deterrence: Predicting shadow IT usage , 2017, Inf. Manag..
[52] Robert H. Deng,et al. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing , 2012, IEEE Transactions on Information Forensics and Security.
[53] Gilles Louppe,et al. Understanding Random Forests: From Theory to Practice , 2014, 1407.7502.
[54] Shveti Sejpal,et al. Comparative Performance Analysis of Secured LWT-SVD Based Color Image Watermarking Technique in YUV, YIQ and YCbCr Color Spaces , 2016 .
[55] Ashok A. Ghatol,et al. Combined DWT-DCT digital Watermarking Technique Software Used for CTS of Bank , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).
[56] Pervaiz K. Ahmed,et al. What Drives Information Security Policy Violations among Banking Employees?: Insights from Neutralization and Social Exchange Theory , 2015, J. Glob. Inf. Manag..
[57] Hesham Hefny,et al. Intrusion Detection System Using Machine Learning Approaches , 2018 .
[58] Yu Chen,et al. Protection of Database Security via Collaborative Inference Detection , 2008, IEEE Transactions on Knowledge and Data Engineering.
[59] Kiyoharu Aizawa,et al. Geometrically Invariant Object-Based Watermarking using SIFT Feature , 2006, 2007 IEEE International Conference on Image Processing.
[60] P. Biernacki,et al. Snowball Sampling: Problems and Techniques of Chain Referral Sampling , 1981 .
[61] Reid A. Johnson,et al. Calibrating Probability with Undersampling for Unbalanced Classification , 2015, 2015 IEEE Symposium Series on Computational Intelligence.
[62] Karin Bernsmed,et al. A Cloud Accountability Policy Representation Framework , 2014, CLOSER.
[63] Gyungho Lee,et al. DDoS Attack Detection and Wavelets , 2003, Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712).
[64] Sven Hartmann,et al. Efficient Inference Control for Open Relational Queries , 2010, DBSec.
[65] Saoussen Cheikhrouhou,et al. The temporal perspective in business process modeling: a survey and research challenges , 2014, Service Oriented Computing and Applications.
[66] Nick Feamster,et al. Machine Learning DDoS Detection for Consumer Internet of Things Devices , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[67] Claudia Keser,et al. Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[68] Zvika Brakerski,et al. Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP , 2012, CRYPTO.
[69] S. Mamede,et al. Innovations in medical internship: benchmarking and application within the King Saud bin Abdulaziz University for Health Sciences. , 2010, Education for health.
[70] Marlon Dumas,et al. Optimized Execution of Business Processes on Blockchain , 2016, BPM.
[71] Susan J. Harrington,et al. The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions , 1996, MIS Q..
[72] Asifullah Khan,et al. Robust image watermarking technique using triangular regions and Zernike moments for quantization based embedding , 2017, Multimedia Tools and Applications.
[73] Nicolas Gama,et al. Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds , 2016, ASIACRYPT.
[74] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[75] Zhemin Yang,et al. LeakMiner: Detect Information Leakage on Android with Static Taint Analysis , 2012, 2012 Third World Congress on Software Engineering.
[76] Zhaohui Wu,et al. Enterprise Pattern: integrating the business process into a unified enterprise model of modern service company , 2017, Enterp. Inf. Syst..
[77] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[78] Nick Cercone,et al. Auditing and Inference Control for Privacy Preservation in Uncertain Environments , 2006, EuroSSC.
[79] Brent Waters,et al. Secure attribute-based systems , 2006, CCS '06.
[80] W. Alec Cram,et al. Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance , 2019, MIS Q..
[81] Merrill Warkentin,et al. Beyond Deterrence: An Expanded View of Employee Computer Abuse , 2013, MIS Q..
[82] George Danezis,et al. A pact with the devil , 2006, NSPW '06.
[83] Mohamed Jmaiel,et al. Multi-layer coordinated adaptation based on graph refinement for cooperative activities , 2008 .
[84] Chris Clifton,et al. Privacy-preserving data integration and sharing , 2004, DMKD '04.
[85] Rüdiger W. Brause,et al. Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.
[86] Tao Xie,et al. WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.
[87] Orlenys López-Pintado,et al. Caterpillar: A Blockchain-Based Business Process Management System , 2017, BPM.
[88] Rene Meis,et al. Problem-Based Consideration of Privacy-Relevant Domain Knowledge , 2013, Privacy and Identity Management.
[89] Jon T. S. Quah,et al. Real Time Credit Card Fraud Detection using Computational Intelligence , 2007, 2007 International Joint Conference on Neural Networks.
[90] Paul Benjamin Lowry,et al. Examining the intended and unintended consequences of organisational privacy safeguards , 2016, Eur. J. Inf. Syst..
[91] Honggang Wang. Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks , 2010, The Journal of Supercomputing.
[92] Serge Chaumette,et al. Characterizing Topological Assumptions of Distributed Algorithms in Dynamic Networks , 2009, SIROCCO.
[93] Muawia A. Elsadig,et al. Packet Length Covert Channel: A Detection Scheme , 2018, 2018 1st International Conference on Computer Applications & Information Security (ICCAIS).
[94] Pr. Mahmoud Abdellaoui,et al. A novel cryptographic solution to secure mobile wireless sensors networks , 2019, Int. J. Secur. Networks.
[95] Mahesh Chandra Govil,et al. A comparative analysis of SVM and its stacking with other classification algorithm for intrusion detection , 2016, 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring).
[96] A. Annie Portia,et al. Analysis on credit card fraud detection methods , 2011, 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET).
[97] W. W. Minor,et al. Techniques of Neutralization: a Reconceptualization and Empirical Examination , 1981 .
[98] V. Canda,et al. A new mode of using all-or-nothing transforms , 2002, Proceedings IEEE International Symposium on Information Theory,.
[99] Adel M. Alimi,et al. Deep neural network features for horses identity recognition using multiview horses’ face pattern , 2017, International Conference on Machine Vision.
[100] Sophie Ahrens,et al. Recommender Systems , 2012 .
[101] V. Prasad,et al. H.264/AVC video protection model based on private cloud for military organisation , 2016, 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT).
[102] A Yahia,et al. Survey on Covert Storage Channel in Computer Network Protocols Detection and Mitigation Techniques , 2016 .
[103] Isil Dillig,et al. Apposcopy: semantics-based detection of Android malware through static analysis , 2014, SIGSOFT FSE.
[104] Oded Regev,et al. The Learning with Errors Problem (Invited Survey) , 2010, 2010 IEEE 25th Annual Conference on Computational Complexity.
[105] Chong-Wah Ngo,et al. k-means: A revisit , 2018, Neurocomputing.
[106] Bhusari,et al. Application of Hidden Markov Model in Credit Card Fraud Detection , 2011 .
[107] Hesham El-Sayed,et al. Traceroute Based IP Channel for Sending Hidden Short Messages , 2006, IWSEC.
[108] Valentin Sgarciu,et al. Anomaly Intrusions Detection Based on Support Vector Machines with an Improved Bat Algorithm , 2015, 2015 20th International Conference on Control Systems and Computer Science.
[109] Jinquan Zeng,et al. Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology , 2012, 2012 8th International Conference on Natural Computation.
[110] Tancrède Lepoint,et al. NFLlib: NTT-Based Fast Lattice Library , 2016, CT-RSA.
[111] Hartmut Ehrig,et al. Fundamentals of Algebraic Graph Transformation , 2006, Monographs in Theoretical Computer Science. An EATCS Series.
[112] Hervé Debar,et al. Dynamic risk management response system to handle cyber threats , 2017, Future Gener. Comput. Syst..
[113] Mathias Weske,et al. Blockchains for Business Process Management - Challenges and Opportunities , 2017, ACM Trans. Manag. Inf. Syst..
[114] Igor Nai Fovino,et al. A Permission verification approach for android mobile applications , 2015, Comput. Secur..
[115] Ekrem Duman,et al. Detecting credit card fraud by decision trees and support vector machines , 2011 .
[116] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[117] Yuan Xue,et al. A language for describing attacks on cyber-physical systems , 2015, Int. J. Crit. Infrastructure Prot..
[118] Shadi Aljawarneh,et al. Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..
[119] Mariem Abid. System-Level Hardwa Synthesis of Dataflow Programs with HEVC as Study Use Case , 2016 .
[120] Ali Al-Haj,et al. Copyright protection of e-government document images using digital watermarking , 2017, 2017 3rd International Conference on Information Management (ICIM).
[121] Mohamed Jmaiel,et al. A rule-driven approach for architectural self adaptation in collaborative activities using graph grammars , 2010, Int. J. Auton. Comput..
[122] Mathias Ekstedt,et al. Quantitative Information Security Risk Estimation Using Probabilistic Attack Graphs , 2016, RISK.
[123] Julien Eynard,et al. A Full RNS Variant of FV Like Somewhat Homomorphic Encryption Schemes , 2016, SAC.
[124] David K. Y. Yau,et al. Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis , 2018, IEEE Transactions on Information Forensics and Security.
[125] Burton S. Kaliski,et al. A Cryptographic Library for the Motorola DSP56000 , 1991, EUROCRYPT.
[126] Anacleto Correia,et al. An Approach to GDPR Based on Object Role Modeling , 2019, WorldCIST.
[127] Paul D. Yoo,et al. From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods , 2018, IEEE Communications Surveys & Tutorials.
[128] Alessandra Gorla,et al. Checking app behavior against app descriptions , 2014, ICSE.
[129] Konstantin Kogos,et al. A random traffic padding to limit packet size covert channels , 2015, 2015 Federated Conference on Computer Science and Information Systems (FedCSIS).
[130] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[131] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[132] Engin Kirda,et al. UNVEIL: A large-scale, automated approach to detecting ransomware (keynote) , 2016, SANER.
[133] Leïla Azouz Saïdane,et al. Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).
[134] Alaa Tharwat,et al. Parameter investigation of support vector machine classifier with kernel functions , 2019, Knowledge and Information Systems.
[135] Wathiq Laftah Al-Yaseen,et al. Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system , 2017, Expert Syst. Appl..
[136] Raouf Boutaba,et al. A comprehensive survey on machine learning for networking: evolution, applications and research opportunities , 2018, Journal of Internet Services and Applications.
[137] Yashwant Prasad Singh,et al. ONE-CLASS SUPPORT VECTOR MACHINES APPROACH TO ANOMALY DETECTION , 2013, Appl. Artif. Intell..
[138] Xin Luo,et al. Awareness Education as the Key to Ransomware Prevention , 2007, Inf. Secur. J. A Glob. Perspect..
[139] Zhongying Bai,et al. 4-Way Handshake Solutions to Avoid Denial of Service Attack in Ultra Wideband Networks , 2009, 2009 Third International Symposium on Intelligent Information Technology Application.
[140] Michael Naehrig,et al. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme , 2013, IMACC.
[141] Aad van Moorsel,et al. Smartphone Continuous Authentication Using Deep Learning Autoencoders , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).
[142] Lefteris Angelis,et al. WIVSS: a new methodology for scoring information systems vulnerabilities , 2013, PCI '13.
[143] Fatima Ezzahra Ouerfelli,et al. On the Collaborative Inference of DDoS: An Information-theoretic Distributed Approach , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).
[144] Jaime A. Camelio,et al. A cyber-physical attack taxonomy for production systems: a quality control perspective , 2019, J. Intell. Manuf..
[145] Joachim Biskup,et al. On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints , 2011, ISC.
[146] Azzedine Boukerche,et al. On the Impact of DDoS Attacks on Software-Defined Internet-of-Vehicles Control Plane , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).
[147] Wolfgang Garn,et al. How Artificial Intelligence and machine learning research impacts payment card fraud detection: A survey and industry benchmark , 2018, Eng. Appl. Artif. Intell..
[148] I. V. Kotenko,et al. Detection of anomalies in data for monitoring of security components in the Internet of Things , 2015, 2015 XVIII International Conference on Soft Computing and Measurements (SCM).
[149] Irina Shklovski,et al. An Analysis of the Consequences of the General Data Protection Regulation (GDPR) on Social Network Research , 2019, ArXiv.
[150] Sebastian Zander,et al. Pattern-Based Survey and Categorization of Network Covert Channel Techniques , 2014, ACM Comput. Surv..
[151] V. Sheng,et al. An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment , 2018 .
[152] Josep Domingo-Ferrer,et al. Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics , 2015, ArXiv.
[153] Eric S. K. Yu,et al. A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities , 2010, Requirements Engineering.
[154] Steven C. H. Hoi,et al. Face Detection using Deep Learning: An Improved Faster RCNN Approach , 2017, Neurocomputing.
[155] W. Alec Cram,et al. Organizational information security policies: a review and research framework , 2017, Eur. J. Inf. Syst..
[156] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[157] Igor V. Kotenko,et al. Event correlation in the integrated cyber-physical security system , 2016, 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM).
[158] Mohammad Zulkernine,et al. Bad-token: denial of service attacks on WPA3 , 2019, SIN.
[159] John C. S. Lui,et al. TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime , 2016, CCS.
[160] Adel M. Alimi,et al. Online Arabic writer identification based on Beta-elliptic model , 2015, 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA).
[161] Nick Cercone,et al. Dynamic inference control in privacy preference enforcement , 2006, PST.
[162] Xiaohua Jia,et al. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.
[163] Bernhard Rinner,et al. An Autonomous Multi-UAV System for Search and Rescue , 2015, DroNet@MobiSys.
[164] Dewan Md. Farid,et al. Application of Machine Learning Approaches in Intrusion Detection System: A Survey , 2015 .
[165] Abas Md Said,et al. Hybrid machine learning technique for intrusion detection system , 2015 .
[166] Manisha Patil,et al. A brief study of Wannacry Threat: Ransomware Attack 2017 , 2017 .
[167] Roland Siegwart,et al. BRISK: Binary Robust invariant scalable keypoints , 2011, 2011 International Conference on Computer Vision.
[168] Philippe Gaborit,et al. Lattice-based homomorphic encryption of vector spaces , 2008, 2008 IEEE International Symposium on Information Theory.
[169] Jin Cao,et al. Tracking Long Duration Flows in Network Traffic , 2010, 2010 Proceedings IEEE INFOCOM.
[170] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[171] Hee-su Chae,et al. Selection for efficient Intrusion Detection using Attribute Ratio , .
[172] Qingtang Su,et al. Robust color image watermarking technique in the spatial domain , 2018, Soft Comput..
[173] Yu Guan,et al. Mobile Based Continuous Authentication Using Deep Features , 2018, EMDL@MobiSys.
[174] John Mylopoulos,et al. Security and privacy requirements analysis within a social setting , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..
[175] Naiqi Wu,et al. SVM-DT-based adaptive and collaborative intrusion detection , 2018, IEEE/CAA Journal of Automatica Sinica.
[176] Slim Kallel,et al. An Engineering Process for Security Patterns Application in Component Based Models , 2013, 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[177] Andrew Y. Ng,et al. Convolutional-Recursive Deep Learning for 3D Object Classification , 2012, NIPS.
[178] Patrick Traynor,et al. CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).
[179] Orlenys López-Pintado,et al. Caterpillar: A business process execution engine on the Ethereum blockchain , 2018, Softw. Pract. Exp..
[180] Adel M. Alimi,et al. 2009 10th International Conference on Document Analysis and Recognition Combining Multiple HMMs Using On-line and Off-line Features for Off-line Arabic Handwriting Recognition , 2022 .
[181] Vijay Varadharajan,et al. A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection , 2019, IEEE Communications Surveys & Tutorials.
[182] Stuart Henry,et al. Degrees of Deviance: Student Accounts of Their Deviant Behavior , 1999 .
[183] Mohand-Said Hacid,et al. Effectively and efficiently selecting access control rules on materialized views over relational databases , 2010, IDEAS '10.
[184] Xiapu Luo,et al. TCP covert timing channels: Design and detection , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[185] Khalil Drira,et al. GMTE: A Tool for Graph Transformation and Exact/Inexact Graph Matching , 2013, GbRPR.
[186] Xiaoyu Chen,et al. Run-Time Risk Management in Adaptive ICT Systems , 2013, 2013 International Conference on Availability, Reliability and Security.
[187] Gagandeep Kaur,et al. Wavelets Based Anomaly-Based Detection System or J48 and Naïve Bayes Based Signature-Based Detection System: A Comparison , 2018 .
[188] Lamia Chaari,et al. Intrusion Detection Study and Enhancement Using Machine Learning , 2019, CRiSIS.
[189] Fei Wang,et al. VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[190] Hanna M. Wallach,et al. Topic modeling: beyond bag-of-words , 2006, ICML.
[191] Sarah Nait Bahloul,et al. Securing Materialized Views: a Rewriting-Based Approach , 2013 .
[192] Atilla Özgür,et al. A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015 , 2016, PeerJ Prepr..
[193] Haralambos Mouratidis,et al. Secure Tropos: a Security-Oriented Extension of the Tropos Methodology , 2007, Int. J. Softw. Eng. Knowl. Eng..
[194] Ruth Breu,et al. Sectet: an extensible framework for the realization of secure inter-organizational workflows , 2006, Internet Res..
[195] Gregory D. Abowd,et al. Securing context-aware applications using environment roles , 2001, SACMAT '01.
[196] Igor V. Kotenko,et al. Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic Inference , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[197] Gary B. Wills,et al. Formal Modelling of Data Integration Systems Security Policies , 2016, Data Science and Engineering.
[198] Paul F. Cromwell,et al. the devil made me do it: use of neutralizations by shoplifters , 2003 .
[199] Rick Cattell,et al. Scalable SQL and NoSQL data stores , 2011, SGMD.
[200] Jean-Marie Flaus,et al. Filters based Approach with Temporal and Combinational Constraints for Cybersecurity of Industrial Control Systems , 2018 .
[201] M. V. Kuzin,et al. Payment card fraud detection using neural network committee and clustering , 2015, Optical Memory and Neural Networks.
[202] Nicolas Gama,et al. Efficient Multiplication over Extension Fields , 2012, WAIFI.
[203] Kenneth G. Paterson,et al. On the Security of RC4 in TLS , 2013, USENIX Security Symposium.
[204] Harry S. Delugach,et al. Wizard: A Database Inference Analysis and Detection System , 1996, IEEE Trans. Knowl. Data Eng..
[205] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[206] Tolga Acar,et al. Analyzing and comparing Montgomery multiplication algorithms , 1996, IEEE Micro.
[207] Yutaka Kawai,et al. Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption , 2015, ISPEC.
[208] Christian Sturm,et al. A Lean Architecture for Blockchain Based Decentralized Process Execution , 2018, Business Process Management Workshops.
[209] Bouabidi Imen,et al. Hierarchical organization with a cross layers using smart sensors for intelligent cities , 2015, 2015 SAI Intelligent Systems Conference (IntelliSys).
[210] Zheng Lin,et al. Research on customer segmentation model by clustering , 2005, ICEC '05.
[211] Dustin Ormond,et al. Don't make excuses! Discouraging neutralization to reduce IT policy violation , 2013, Comput. Secur..
[212] Gerardo Schneider,et al. Is Privacy by Construction Possible? , 2018, ISoLA.
[213] Chellapilla Patvardhan,et al. Effective Color image watermarking scheme using YCbCr color space and QR code , 2017, Multimedia Tools and Applications.
[214] Thomas Plantard,et al. Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation , 2008, ACISP.
[215] James Hrica. Floating-Point Design with Vivado HLS , 2012 .
[216] Michael Granitzer,et al. Sequence classification for credit-card fraud detection , 2018, Expert Syst. Appl..
[217] Song Chao,et al. Network Covert Channel Detection with Cluster based on Hierarchy and Density , 2012 .
[218] Ira S. Moskowitz,et al. A Study of Inference Problems in Distributed Databases , 2002, DBSec.
[219] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[220] Joachim Biskup,et al. Reducing inference control to access control for normalized database schemas , 2008, Inf. Process. Lett..
[221] Mathy Vanhoef,et al. Dragonblood: A Security Analysis of WPA3's SAE Handshake , 2019, IACR Cryptol. ePrint Arch..
[222] Ketil Stølen,et al. Model-Driven Risk Analysis - The CORAS Approach , 2010 .
[223] Dongqing Xie,et al. Real-time Network Risk Evaluation Paradigm-inspired by Immune , 2015, International Conference on Computing, Networking and Communications.
[224] Zhen Huang,et al. PScout: analyzing the Android permission specification , 2012, CCS.
[225] Zouheir Trabelsi,et al. Towards Optimized TCP/IP Covert Channels Detection, IDS and Firewall Integration , 2008, 2008 New Technologies, Mobility and Security.
[226] Naixue Xiong,et al. A Fuzzy Probability Bayesian Network Approach for Dynamic Cybersecurity Risk Assessment in Industrial Control Systems , 2018, IEEE Transactions on Industrial Informatics.
[227] Muawia A. Elsadig,et al. Covert Channels : Countermeasures Techniques , 2018 .
[228] V. Braun,et al. Using thematic analysis in psychology , 2006 .
[229] Mehrdad Aliasgari,et al. Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions , 2018 .
[230] Zhiyong Cai,et al. Integrated Covert Channel Countermeasure Model in MLS Networks , 2009, 2009 International Conference on Information Engineering and Computer Science.
[231] Wesley W. Chu,et al. Database Security Protection Via Inference Detection , 2006, ISI.
[232] Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.
[233] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[234] Serge Chaumette,et al. Dynamicity Aware Graph Relabeling Systems (DA-GRS), A Local Computation based Model to Describe Manet Algorithms , 2005, IASTED PDCS.
[235] Varghese Paul,et al. An imperceptible spatial domain color image watermarking scheme , 2016, Journal of King Saud University - Computer and Information Sciences.
[236] Iftikhar Ahmad,et al. Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000 , 2018 .
[237] Bashar Nuseibeh,et al. Security Requirements Engineering: A Framework for Representation and Analysis , 2008, IEEE Transactions on Software Engineering.
[238] Erik Wästlund,et al. Usable Transparency with the Data Track: A Tool for Visualizing Data Disclosures , 2015, CHI Extended Abstracts.
[239] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[240] Karandeep Kaur,et al. A Survey on Internet of Things – Architecture, Applications, and Future Trends , 2018, 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC).
[241] Tara N. Sainath,et al. FUNDAMENTAL TECHNOLOGIES IN MODERN SPEECH RECOGNITION Digital Object Identifier 10.1109/MSP.2012.2205597 , 2012 .
[242] Serkan Öztürk,et al. A novel hybrid DCT and DWT based robust watermarking algorithm for color images , 2019, Multimedia Tools and Applications.
[243] Adel M. Alimi,et al. Bag of face recognition systems based on holistic approaches , 2015, 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA).
[244] Tobias Pulls,et al. Tools for Cloud Accountability: A4Cloud Tutorial , 2014, Privacy and Identity Management.
[245] Xiaoou Tang,et al. Learning a Deep Convolutional Network for Image Super-Resolution , 2014, ECCV.
[246] Qun Li,et al. Network Traffic Anomaly Detection Based on Wavelet Analysis , 2018, 2018 IEEE 16th International Conference on Software Engineering Research, Management and Applications (SERA).
[247] Zhuming Bi,et al. Blockchain-based business process management (BPM) framework for service composition in industry 4.0 , 2018, Journal of Intelligent Manufacturing.
[248] Stephan Faßbender,et al. Functional requirements under security PresSuRE , 2014, 2014 9th International Conference on Software Paradigm Trends (ICSOFT-PT).
[249] Angelo De Caro,et al. jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[250] Katia P. Sycara,et al. WebMate: a personal agent for browsing and searching , 1998, AGENTS '98.
[251] Paul Barrett,et al. Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor , 1986, CRYPTO.
[252] Brent Waters,et al. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.
[253] Yuval Elovici,et al. ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology , 2017, IEEE Transactions on Information Forensics and Security.
[254] Xiaoqi Ma,et al. Analysing and attacking the 4-way handshake of IEEE 802.11i standard , 2013, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).
[255] Krzysztof Juszczyszyn,et al. Evaluation of an Impact of the DoS Attacks on the Selected Virtualization Platforms , 2018 .
[256] Tobias Pulls,et al. Transparency, Privacy and Trust - Technology for Tracking and Controlling My Data Disclosures: Does This Work? , 2016, IFIPTM.
[257] Fengjun Li,et al. Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.
[258] Yuri Monakhov,et al. A Machine-Synesthetic Approach To DDoS Network Attack Detection , 2019, IntelliSys.
[259] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[260] Fernanda Lima Kastensmidt,et al. Analyzing Reliability and Performance Trade-Offs of HLS-Based Designs in SRAM-Based FPGAs Under Soft Errors , 2017, IEEE Transactions on Nuclear Science.
[261] Leslie Lamport,et al. Paxos Made Simple , 2001 .
[262] Sushil Jajodia,et al. VULCON: A System for Vulnerability Prioritization, Mitigation, and Management , 2018, ACM Trans. Priv. Secur..
[263] Jan Mendling,et al. Untrusted Business Process Monitoring and Execution Using Blockchain , 2016, BPM.
[264] Erhard Rahm,et al. A survey of approaches to automatic schema matching , 2001, The VLDB Journal.
[265] Maritta Heisel,et al. Secure Data Processing in the Cloud , 2017, ESOCC Workshops.
[266] Liqing Zhang,et al. Credit Card Fraud Detection Using Convolutional Neural Networks , 2016, ICONIP.
[267] Seungwon Shin,et al. Toward Semantic Assessment of Vulnerability Severity: A Text Mining Approach , 2018, CIKM Workshops.
[268] Isabel Maria Lopes,et al. Improvement of the Applicability of the General Data Protection Regulation in Health Clinics , 2019, WorldCIST.
[269] Maritta Heisel,et al. Towards an End-to-End Architecture for Run-Time Data Protection in the Cloud , 2018, 2018 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA).
[270] Basim Nasih,et al. Application of Wavelet Transform and Its Advantages Compared To Fourier Transform , 2016 .
[271] Routa Moussaileb,et al. Detection of Side Channel Attacks Based on Data Tainting in Android Systems , 2017, SEC.
[272] Hans Hedbom,et al. Trust and Assurance HCI , 2011, Privacy and Identity Management for Life.
[273] Nadeem Akhtar,et al. Real-Time Credit-Card Fraud Detection using Artificial Neural Network Tuned by Simulated Annealing Algorithm , 2014 .
[274] Adel M. Alimi,et al. ReLiDSS: Novel lie detection system from speech signal , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).
[275] Teek Parval Sharma,et al. On the IEEE 802.11i security: a denial-of-service perspective , 2015, Secur. Commun. Networks.
[276] Irene M. Y. Woon,et al. Perceptions of Information Security at the Workplace : Linking Information Security Climate to Compliant Behavior , 2006 .
[277] Ahmed A. Alzahrani,et al. The role of neutralisation techniques in violating hospitals privacy policies in Saudi Arabia , 2018, 2018 4th International Conference on Information Management (ICIM).
[278] G. R. Blakley,et al. A Computer Algorithm for Calculating the Product AB Modulo M , 1983, IEEE Trans. Computers.
[279] Haralambos Mouratidis,et al. Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management , 2012, J. Univers. Comput. Sci..
[280] David A. Huffman,et al. A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.
[281] F. Taylor,et al. Large moduli multipliers for signal processing , 1981 .
[282] Farouk Kamoun,et al. End to End Cloud Computing Architecture Based on A Novel Classification of Security Issues , 2017, 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA).
[283] Sushil Jajodia,et al. Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures , 2000, IEEE Trans. Knowl. Data Eng..
[284] A. V. Olgac,et al. Performance Analysis of Various Activation Functions in Generalized MLP Architectures of Neural Networks , 2011 .
[285] Stephan Haarmann,et al. Estimating the Duration of Blockchain-Based Business Processes Using Simulation , 2019, ZEUS.
[286] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[287] Bashar Nuseibeh,et al. Security requirements engineering: when anti-requirements hit the fan , 2002, Proceedings IEEE Joint International Conference on Requirements Engineering.
[288] Yiwei Li. Generalization of k-means Related Algorithms , 2019, ArXiv.
[289] D. Harkins,et al. Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).
[290] Chunhua Wang,et al. Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.
[291] Elena Trofimenko,et al. Program-technical aspects of encryption protection of users' data , 2016, 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET).
[292] Areej Al-Bataineh,et al. Analysis and detection of malicious data exfiltration in web traffic , 2012, 2012 7th International Conference on Malicious and Unwanted Software.
[293] Vincent H. Berk,et al. Data exfiltration and covert channels , 2006, SPIE Defense + Commercial Sensing.
[294] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[295] B. Byers,et al. Bias Crime Motivation , 1999 .
[296] Frank Piessens,et al. Denial of Service Attacks Against the 4-Way Wi-Fi Handshake , 2017 .
[297] Antonio Kung,et al. Methods and Tools for GDPR Compliance Through Privacy and Data Protection Engineering , 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[298] Gresham M. Sykes,et al. Techniques of neutralization: A theory of delinquency. , 1957 .
[299] William M. Campbell,et al. Recommender Systems for the Department of Defense and Intelligence Community , 2016 .
[300] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[301] Prashant R. Deshmukh,et al. Active warden for TCP sequence number base covert channel , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[302] Nancy Reichman,et al. The Criminal Elite: The Sociology of White-Collar Crime. , 1986 .
[303] Biswanath Mukherjee,et al. SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack , 2009 .
[304] Paul Benjamin Lowry,et al. Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations Under Conditions of Strain and Excess , 2015, J. Assoc. Inf. Syst..
[305] Jaspreet Kaur,et al. Countermeasures for Covert Channel-Internal Control Protocols , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[306] Kelley L. Dempsey,et al. Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations: National Institute of Standards and Technology Special Publication 800-137 , 2011 .
[307] Immo Fritsche,et al. Account Strategies for the Violation of Social Norms: Integration and Extension of Sociological and Social Psychological Typologies , 2002 .
[308] Magdy M. A. Salama,et al. Distributed generation technologies, definitions and benefits , 2004 .
[309] Gary B. Wills,et al. Exposing data leakage in Data Integration Systems , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).
[310] Parvez Faruki,et al. Network Intrusion Detection for IoT Security Based on Learning Techniques , 2019, IEEE Communications Surveys & Tutorials.
[311] Aron Laszka,et al. Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach , 2017, Financial Cryptography.
[312] Vijay Chidambaram,et al. Analyzing the Impact of GDPR on Storage Systems , 2019, HotStorage.
[313] Rabah Attia,et al. A GDPR Controller for IoT Systems: Application to e-Health , 2019, 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE).
[314] Michael B. Blankenship,et al. examining the role of differential association and techniques of neutralization in explaining corporate crime , 2005 .
[315] Shareeful Islam,et al. An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System , 2018, Applied Sciences.
[316] Maritta Heisel,et al. Problem-based Elicitation of Security Requirements - The ProCOR Method , 2018, ENASE.
[317] Pascal Véron,et al. Efficient modular operations using the adapted modular number system , 2020, Journal of Cryptographic Engineering.
[318] Muawia A. Elsadig,et al. A balanced approach to eliminate packet length-based covert channels , 2017, 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS).
[319] Ana María Monteiro,et al. Intrusion Detection in Computer Networks Based on KNN, K-Means++ and J48 , 2018, IntelliSys.
[320] Konstantinos Demertzis,et al. ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology , 2018, SecITC.
[321] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[322] Adel M. Alimi,et al. Understand Me if You Can! Global Soft Biometrics Recognition from Social Visual Data , 2016, HIS.
[323] Helen M. Edwards,et al. Problem frames: analyzing and structuring software development problems , 2002, Softw. Test. Verification Reliab..
[324] Juan Enrique Ramos,et al. Using TF-IDF to Determine Word Relevance in Document Queries , 2003 .
[325] Stéphane Mallat,et al. A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..
[326] Jean-Christophe Burie,et al. A Spatial Domain Steganography for Grayscale Documents Using Pattern Recognition Techniques , 2017, 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR).
[327] K. Harald Gjermundrød,et al. privacyTracker: A Privacy-by-Design GDPR-Compliant Framework with Verifiable Data Traceability Controls , 2016, ICWE Workshops.
[328] Abhinav Srivastava,et al. Credit Card Fraud Detection Using Hidden Markov Model , 2008, IEEE Transactions on Dependable and Secure Computing.
[329] Mikko T. Siponen,et al. New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs , 2012, Inf. Manag..
[330] Ketki Nanadikar,et al. FireCol: A Collaborative Protection Network for the Detection of Flooding DDOS Attack , 2014 .
[331] Jianzhong Li,et al. Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition , 2017, Multimedia Tools and Applications.
[332] Mahendra Kumar Pandey,et al. Non-blind Arnold scrambled hybrid image watermarking in YCbCr color space , 2018, Microsystem Technologies.
[333] Yoshua Bengio,et al. Extracting and composing robust features with denoising autoencoders , 2008, ICML '08.
[334] Serge Chaumette,et al. Control of a Remote Swarm of Drones/Robots Through a Local (Possibly Model) Swarm: Qualitative and Quantitative Issues , 2017, PE-WASUN '17.
[335] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[336] Pietro Ferrara,et al. Static Analysis for GDPR Compliance , 2018, ITASEC.
[337] Shichao Zhang,et al. A novel kNN algorithm with data-driven k parameter computation , 2017, Pattern Recognit. Lett..
[338] Bulusu Vardhan,et al. Enhancing the Performance of an Intrusion Detection System Through Multi-Linear Dimensionality Reduction and Multi-Class SVM , 2018 .
[339] Karen A. Scarfone,et al. A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .
[340] Joan Oldman,et al. The Professional Fence , 1976 .
[341] Leyla Bilge,et al. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.
[342] Waqar Ahmad,et al. A Comparative Study of Data Mining Algorithms for High Detection Rate in Intrusion Detection System , 2018 .
[343] Vishal Vatsa,et al. A Game-Theoretic Approach to Credit Card Fraud Detection , 2005, ICISS.
[344] Nabil Derbel,et al. Handwriting trajectory movements controlled by a Beta-elliptic model , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..
[345] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[346] Yuning Jiang,et al. A Language and Repository for Cyber Security of Smart Grids , 2018, 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC).
[347] M. Marshall. Sampling for qualitative research. , 1996, Family practice.
[348] Rachel Player,et al. Simple Encrypted Arithmetic Library-SEAL , 2017 .
[349] Mitali Bansal,et al. Credit Card Fraud Detection Using Self Organised Map , 2014 .
[350] Joseph W. Rogers,et al. Neutralization Techniques , 1974 .
[351] Ibrahim Nadir,et al. Contemporary cybercrime: A taxonomy of ransomware threats & mitigation techniques , 2018, 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET).
[352] Dazhong Wu,et al. Cybersecurity for digital manufacturing , 2018, Journal of Manufacturing Systems.
[353] Margus Välja,et al. A Framework for Automatic IT Architecture Modeling: Applying Truth Discovery , 2019, Complex Syst. Informatics Model. Q..
[354] Siddhartha Bhattacharyya,et al. Data mining for credit card fraud: A comparative study , 2011, Decis. Support Syst..
[355] Thomas Plantard,et al. Arithmétique modulaire pour la cryptographie , 2005 .
[356] W. Thompson,et al. Privacy versus public health: the impact of current confidentiality rules. , 2010, American journal of public health.
[357] Su Jin,et al. Attribute-Based Encryption Schemes , 2011 .
[358] Héctor M. Pérez Meana,et al. Sender verification system for official documents based on watermarking technique , 2013, 2013 10th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE).
[359] Adel M. Alimi,et al. A Neuro-beta-Elliptic Model for Handwriting Generation Movements , 2012, 2012 International Conference on Frontiers in Handwriting Recognition.
[360] Naofumi Takagi,et al. A Radix-4 Modular Multiplication Hardware Algorithm for Modular Exponentiation , 1992, IEEE Trans. Computers.
[361] Carolina Adaros Boye,et al. Cyber-Risks in the Industrial Internet of Things (IIoT): Towards a Method for Continuous Assessment , 2018, ISC.
[362] M. Tech. Fraud Detection in Credit Card by Clustering Approach , 2014 .
[363] Fabio Massacci,et al. Computer Aided Threat Identification , 2011, 2011 IEEE 13th Conference on Commerce and Enterprise Computing.
[364] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[365] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[366] Khan Muhammad,et al. CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method , 2017, Multimedia Tools and Applications.
[367] Gwen Littlewort,et al. Recognizing facial expression: machine learning and application to spontaneous behavior , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[368] Heith Copes,et al. streetlife and the rewards of auto theft , 2003 .
[369] Hsiao-Hwa Chen,et al. Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges , 2014, IEEE Systems Journal.
[370] Emmanuel Coquery,et al. Access control to materialized views: an inference-based approach , 2011, PhD '11.
[371] Brian Kingsbury,et al. New types of deep neural network learning for speech recognition and related applications: an overview , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[372] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[373] Alair Pereira do Lago,et al. Credit Card Fraud Detection with Artificial Immune System , 2008, ICARIS.