SCN - volume 2019 论文列表 |
点击这里查看 Security and Communication Networks 的JCR分区、影响因子等信息 |
Bohun Kim Junghoon Cho Byungjun Choi Jongsun Park Hwajeong Seo
A Novel Framework to Classify Malware in MIPS Architecture-Based IoT Devices.Tran Nghi Phu Kien Hoang Dang Dung Ngo Quoc Nguyen Dai Tho Nguyen Ngoc Binh
QoS3: Secure Caching in HTTPS Based on Fine-Grained Trust Delegation.Abdulrahman Al-Dailami Chang Ruan Zhihong Bao Tao Zhang
A Bayesian Classification Intrusion Detection Method Based on the Fusion of PCA and LDA.Zhidong Shen Yuhao Zhang Weiying Chen
Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge Processing.Jianping Zeng Shuang Wu Yanyu Chen Rui Zeng Chengrong Wu
polarRLCE: A New Code-Based Cryptosystem Using Polar Codes.Jingang Liu Yongge Wang Zongxiang Yi Zhiqiang Lin
An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy.Lin Li Chin-Chen Chang Hefeng Chen
Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning. CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis.Mee Lan Han Byung Il Kwak Huy Kang Kim
F2P-ABS: A Fast and Secure Attribute-Based Signature for Mobile Platforms.Guofeng Lin Yunhao Xia Chun Ying Zhixin Sun
Cryptanalysis of the Lightweight Block Cipher BORON. Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard.Aysha Shabbir Maryam Shabbir Muhammad Rizwan Fahad Ahmad
A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks. Industrial Control Intrusion Detection Approach Based on Multiclassification GoogLeNet-LSTM Model.Ankang Chu Yingxu Lai Jing Liu
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks.Quanrun Li Ching-Fang Hsu Kim-Kwang Raymond Choo Debiao He
AI-Driven Cyber Security Analytics and Privacy Protection.Jiageng Chen Chunhua Su Zheng Yan
Construction of New S-Box Using Action of Quotient of the Modular Group for Multimedia Security.Imran Shahzad Qaiser Mushtaq Abdul Razaq
Novel Meaningful Image Encryption Based on Block Compressive Sensing.Chen Pan Guodong Ye Xiaoling Huang Junwei Zhou
Active Defense Strategy Selection Method Based on Two-Way Signaling Game.Xiaohu Liu Hengwei Zhang Yuchen Zhang Lulu Shao Jihong Han
Detection of Trojaning Attack on Neural Networks via Cost of Sample Classification.Hui Gao Yunfang Chen Wei Zhang
Estimating the Relative Speed of RF Jammers in VANETs.Dimitrios Kosmanos Antonios Argyriou Leandros A. Maglaras
Session-Based Webshell Detection Using Machine Learning in Web Logs.Yixin Wu Yuqiang Sun Cheng Huang Peng Jia Luping Liu
Design of Intrusion Detection and Prevention in SCADA System for the Detection of Bias Injection Attacks. Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping.Lin Ding Lei Wang Dawu Gu Chenhui Jin Jie Guan
MWPoW: Multiple Winners Proof of Work Protocol, a Decentralisation Strengthened Fast-Confirm Blockchain Protocol. Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments. Physical Layer Security in Nonorthogonal Multiple Access Wireless Network with Jammer Selection.Langtao Hu Xin Zheng Chunsheng Chen
Enhancing Modbus-RTU Communications for Smart Metering in Building Energy Management Systems. Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions.Ignazio Pedone Antonio Lioy Fulvio Valenza
Analysis of DES Plaintext Recovery Based on BP Neural Network. A Novel Three-Layer QR Code Based on Secret Sharing Scheme and Liner Code. Evaluation of Deep Learning Methods Efficiency for Malicious and Benign System Calls Classification on the AWSCTD.Dainius Ceponis Nikolaj Goranin
An API Semantics-Aware Malware Detection Method Based on Deep Learning.Xin Ma Shize Guo Wei Bai Jun Chen Shiming Xia Zhisong Pan
Using XGBoost to Discover Infected Hosts Based on HTTP Traffic.Weina Niu Ting Li Xiaosong Zhang Teng Hu Tianyu Jiang Heng Wu
SNI: Supervised Anonymization Technique to Publish Social Networks Having Multiple Sensitive Labels.A. Karimi Rizi Mohammad Naderi Dehkordi N. Nemat bakhsh
An Indistinguishably Secure Function Encryption Scheme. Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface.Dong Wang Xiaosong Zhang Ting Chen Jingwei Li
Laplace Input and Output Perturbation for Differentially Private Principal Components Analysis.Yahong Xu Geng Yang Shuangjie Bai
A Novel Construction of Constrained Verifiable Random Functions.Muhua Liu Ping Zhang Qingtao Wu
Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images.Pyung-Han Kim Eun-Jun Yoon Kwan-Woo Ryu Ki-Hyun Jung
SSLDetecter: Detecting SSL Security Vulnerabilities of Android Applications Based on a Novel Automatic Traversal Method.Junwei Tang Jingjing Li Ruixuan Li Hongmu Han Xiwu Gu Zhiyong Xu
CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs.Yi Zhao Kaitai Liang Bo Yang Liqun Chen
A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition.Shuaiwei Zhang Xiaoyuan Yang Lin Chen Weidong Zhong
Optimistic Fair Exchange in Cloud-Assisted Cyber-Physical Systems.Jun Wang Feixiang Luo Zequan Zhou Xiling Luo Zhen Wang
An Analysis of DDoS Attacks on the Instant Messengers.Mohammad Faisal Sohail Abbas Haseeb Ur Rahman Muhammad Zahid Khan Arif Ur Rahman
Corrigendum to "Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment".Rameez Asif William J. Buchanan
VPN Traffic Detection in SSL-Protected Channel.Muhammad Zain ul Abideen Shahzad Saleem Madiha Ejaz
PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks.Weiping Wang Feng Zhang Xi Luo Shigeng Zhang
Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs.Jiaye Pan Yi Zhuang Binglin Sun
A Blockchain-Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem.Konstantinos Rantos George Drosatos Antonios Kritsas Christos Ilioudis Alexandros Papanikolaou Adam P. Filippidis
Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data.Hefeng Chen Hsiao-Ling Wu Chin-Chen Chang Long-Sheng Chen
A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms.Baek Kyung Song Joon Soo Yoo Miyeon Hong Ji Won Yoon
All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis.Mi-Jung Choi Jiwon Bang Jongwook Kim Hajin Kim Yang-Sae Moon
An Active Controller Selection Scheme for Minimizing Packet-In Processing Latency in SDN. Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning.Francisco Sales de Lima Filho Frederico Augusto Fernandes Silveira Agostinho de Medeiros Brito Júnior Genoveva Vargas-Solar Luiz Felipe Q. Silveira
Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation.En Zhang Jun-Zhe Zhu Gong-Li Li Jian Chang Yu Li
Multidivisible Online/Offline Cryptography and Its Application to Signcryptions. Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis. LTE Phone Number Catcher: A Practical Attack against Mobile Privacy.Chuan Yu Shuhui Chen Zhiping Cai
An Object Proxy-Based Dynamic Layer Replacement to Protect IoMT Applications.Bo Han Yinliang Zhao Changpeng Zhu
Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network.Yingxu Lai Jingwen Zhang Zenghui Liu
Privacy Protection of Social Networks Based on Classified Attribute Encryption.Lin Zhang Li Li Eric Medwedeff Haiping Huang Xiong Fu Ruchuan Wang
Power Grid Estimation Using Electric Network Frequency Signals. Sensitivity of Importance Metrics for Critical Digital Services Graph to Service Operators' Self-Assessment Errors. Detection of Free-Form Copy-Move Forgery on Digital Images.Emre Gürbüz Güzin Ulutas Mustafa Ulutas
Automatic Identification of Honeypot Server Using Machine Learning Techniques.Cheng Huang Jiaxuan Han Xing Zhang Jiayong Liu
A Malware and Variant Detection Method Using Function Call Graph Isomorphism.Jinrong Bai Qibin Shi Shiguang Mu
Generative Reversible Data Hiding by Image-to-Image Translation via GANs.Zhuo Zhang Guangyuan Fu Fuqiang Di Changlong Li Jia Liu
Evaluating the Impact of Name Resolution Dependence on the DNS.Haiyan Xu Zhaoxin Zhang Jianen Yan Xin Ma
A Data-Driven Approach to Cyber Risk Assessment.Paolo Santini Giuseppe Gottardi Marco Baldi Franco Chiaraluce
Big Data Analytics for Cyber Security.Pelin Angin Bharat K. Bhargava Rohit Ranchal
A Novel Trust Model Based on Node Recovery Technique for WSN. Social Security and Privacy for Social IoT Polymorphic Value Set: A Solution to Inference Attacks on Social Networks. Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions.Keita Emura Goichiro Hanaoka Yutaka Kawai Takahiro Matsuda Kazuma Ohara Kazumasa Omote Yusuke Sakai
A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection.Yanping Shen Kangfeng Zheng Chunhua Wu Yixian Yang
A Secure and Efficient ECC-Based Anonymous Authentication Protocol. Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT.Mingyong Yin Xingshu Chen Qixu Wang Wei Wang Yulong Wang
Improved Malware Detection Model with Apriori Association Rule and Particle Swarm Optimization.Olawale Surajudeen Adebayo Normaziah Abdul Aziz
Comprehensive Risk Identification Model for SCADA Systems.Abdelghafar M. Elhady Hazem M. El-Bakry Ahmed Abou Elfetouh
Detecting Shilling Attacks with Automatic Features from Multiple Views.Yaojun Hao Fuzhi Zhang Jian Wang Qingshan Zhao Jianfang Cao
Linear (t, n) Secret Sharing Scheme with Reduced Number of Polynomials.Kenan Kingsley Phiri Hyunsung Kim
Application-Level Unsupervised Outlier-Based Intrusion Detection and Prevention. Safety and Security Coengineering in Embedded Systems.Daniel Schneider Jens Braband Erwin Schoitsch Sascha Uhrig Stefan Katzenbeisser
Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags.Madiha Khalid Umar Mujahid Khokhar Muhammad Najam-ul-Islam
Comment on "Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment". Research on Defensive Strategy of Real-Time Price Attack Based on Multiperson Zero-Determinant.Zhuoqun Xia Zhenwei Fang Fengfei Zou Jin Wang Arun Kumar Sangaiah
ID-Based Strong Designated Verifier Signature over ℛ-SIS Assumption.Jie Cai Han Jiang Pingyuan Zhang Zhihua Zheng Hao Wang Guangshi Lü Qiuliang Xu
A Novel Method for Location Privacy Protection in LBS Applications.Dan Lu Qilong Han Kejia Zhang Haitao Zhang Bisma Gull
Security Requirements Engineering in Safety-Critical Railway Signalling Networks.Markus Heinrich Tsvetoslava Vateva-Gurova Tolga Arul Stefan Katzenbeisser Neeraj Suri Henk Birkholz Andreas Fuchs Christoph Krauß Maria Zhdanova Don Kuzhiyelil Sergey Tverdyshev Christian Schlehuber
Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN).Ashwag Albakri Lein Harn Sejun Song
Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users.Bo Feng Qiang Li Yuede Ji Dong Guo Xiangyu Meng
A Distributed Access Control with Outsourced Computation in Fog Computing.Qihua Wang Huaqun Wang Yufeng Wang Rui Guo
Recent Advancements in Intrusion Detection Systems for the Internet of Things.Zeeshan Ali Khan Peter Herrmann
An Approach Enabling Various Queries on Encrypted Industrial Data Stream.Tao Wang Bo Yang Guoyong Qiu Lina Zhang Yong Yu Yanwei Zhou Juncai Guo
A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things.Qinglan Zhao Shuntong Yang Dong Zheng Baodong Qin
Efficient Cancelable Iris Template Generation for Wearable Sensors. Random Fault Attacks on a Class of Stream Ciphers.Harry Bartlett Ed Dawson Hassan Qahur Al Mahri Md. Iftekhar Salam Leonie Simpson Kenneth Koon-Ho Wong
A Secure Data Sharing Scheme with Designated Server.Binrui Zhu Jiameng Sun Jing Qin Jixin Ma
Separable Reversible Data Hiding in Encrypted Images Based on Difference Histogram Modification. A Hyperchaotic Color Image Encryption Algorithm and Security Analysis.Chenghai Li Fangzheng Zhao Chen Liu Lei Lei Jie Zhang
Fingerprint Protected Password Authentication Protocol.Chao Yang Junwei Zhang Jingjing Guo Yu Zheng Li Yang Jianfeng Ma
A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment.Feifei Wang Guoai Xu Chenyu Wang Junhao Peng
Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems.Thein Than Thwin Sangsuree Vasupongayya
A Novel Device Identification Method Based on Passive Measurement.Wei Sun Hao Zhang Li-jun Cai Ai-min Yu Jinqiao Shi Jian-Guo Jiang
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems.Hisham A. Kholidy Abdelkarim Erradi
Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms.Jiadong Ren Jiawei Guo Qian Wang Huang Yuan Hao Xiaobing Hu Jingjing
Integrating Traffics with Network Device Logs for Anomaly Detection.Jiazhong Lu Fengmao Lv Zhongliu Zhuo Xiaosong Zhang Xiaolei Liu Teng Hu Wei Deng
Security Cryptanalysis of NUX for the Internet of Things.Yu Liu Xiaolei Liu Yanmin Zhao
RMMDI: A Novel Framework for Role Mining Based on the Multi-Domain Information.Wei Bai Zhisong Pan Shize Guo Zhe Chen
Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach.Kaifan Huang Pengdeng Li Lu-Xing Yang Xiaofan Yang Yuan Yan Tang
Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network. CasCP: Efficient and Secure Certificateless Authentication Scheme for Wireless Body Area Networks with Conditional Privacy-Preserving.Yong Xie Songsong Zhang Xiang Li Yanggui Li Yuan Chai
Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks.Mengxia Shuai Bin Liu Nenghai Yu Ling Xiong
Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme.Quanbo Qu Baocang Wang Yuan Ping Zhili Zhang
A Cancelable Template for the Low-Quality Fingerprints from Wearable Devices. SLFAT: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames.Qian Lu Haipeng Qu Yuzhan Ouyang Jiahui Zhang
A Lightweight BCH Code Corrector of TRNG with Measurable Dependence.Hojoong Park Yongjin Yeom Ju-Sung Kang
Analyzing Reliability of the Communication for Secure and Highly Available GOOSE-Based Logic Selectivity.Peyman Jafary Antti Supponen Mikko Salmenperä Sami Repo
A Server-Side JavaScript Security Architecture for Secure Integration of Third-Party Libraries.Neline van Ginkel Willem De Groef Fabio Massacci Frank Piessens
Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification.Rui Zhu Li Xu Yali Zeng Xun Yi
Detection of Dummy Trajectories Using Convolutional Neural Networks.Jiaji Pan Yi-Ning Liu Weiming Zhang
An Enhanced and Resource-Aware RFID Multitag Grouping Protocol.Hala Abu Dhailah Eyad Taqieddin Abdallah Y. Alma'aitah
The Prediction of Serial Number in OpenSSL's X.509 Certificate. Erratum to "A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism".Ye Yuan Liji Wu Yijun Yang Xiangmin Zhang
HeteMSD: A Big Data Analytics Framework for Targeted Cyber-Attacks Detection Using Heterogeneous Multisource Data.Ankang Ju Yuanbo Guo Ziwei Ye Tao Li Jing Ma
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends.Mohamed Amine Ferrag Leandros A. Maglaras Abdelouahid Derhab
Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic.Leila Khatibzadeh Zarrintaj Bornaee Abbas Ghaemi Bafghi
Secure and Efficient Searchable Public Key Encryption for Resource Constrained Environment Based on Pairings under Prime Order Group. New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing. Anonymous and Efficient Message Authentication Scheme for Smart Grid.Libing Wu Jing Wang Sherali Zeadally Debiao He
A Practical Authentication Framework for VANETs.Baosheng Wang Yi Wang Rongmao Chen
Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things.Xuyun Zhang Yuan Yuan Zhili Zhou Shancang Li Lianyong Qi Deepak Puthal
Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud.Yujiao Song Hao Wang Xiaochao Wei Lei Wu
Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments.Ping Wang Bin Li Hongjin Shi Yaosheng Shen Ding Wang
WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense.Amirreza Niakanlahiji Jafar Haadi Jafarian
Dynamic Resource Provisioning on Fog Landscapes.Hoang-Nam Pham-Nguyen Quang Tran Minh
EPLC: An Efficient Privacy-Preserving Line-Loss Calculation Scheme for Residential Areas of Smart Grid.Yinqiao Xiong Peidong Zhu Zhizhu Liu Hui Yin Tiantian Deng
Visual and Textual Analysis for Image Trustworthiness Assessment within Online News.Federica Lago Quoc-Tin Phan Giulia Boato
MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication.Tianbo Lu Ting Meng Chao Li Guozhen Dong Huiyang Li Jiao Zhang Xiaoyan Zhang
Usability Evaluation Model for Biometric System considering Privacy Concern Based on MCDM Model.Junhyoung Oh Ukjin Lee Kyungho Lee
Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing.Lei He Jianfeng Ma Ruo Mo Dawei Wei
Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks.Young-Seob Jeong Jiyoung Woo Ah Reum Kang
Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV). The Meeting of Acquaintances: A Cost-Efficient Authentication Scheme for Light-Weight Objects with Transient Trust Level and Plurality Approach.Tran Khanh Dang Khanh T. K. Tran
Machine Learning for Wireless Multimedia Data Security.Zhaoqing Pan Ching-Nung Yang Victor S. Sheng Naixue Xiong Weizhi Meng
Corrigendum to "Development of the ECAT Preprocessor with the Trust Communication Approach".Kevser Ovaz Akpinar Ibrahim Özçelik
Corrigendum to "Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing".Jieren Cheng Mengyang Li Xiangyan Tang Victor S. Sheng Yifu Liu Wei Guo
A Quantum-Based Database Query Scheme for Privacy Preservation in Cloud Environment.Wenjie Liu Peipei Gao Zhihao Liu Hanwu Chen Maojun Zhang
MalDeep: A Deep Learning Classification Framework against Malware Variants Based on Texture Visualization.Yuntao Zhao ChunYu Xu Bo Bo Yongxin Feng
Optimizing Computer Worm Detection Using Ensembles.Nelson Ochieng Waweru Mwangi Ismail Ateya
Dynamic Nonparametric Random Forest Using Covariance.SeokHwan Choi Jin-Myeong Shin Yoon-Ho Choi
Security Measure for Image Steganography Based on High Dimensional KL Divergence.Haitao Song Guangming Tang Yifeng Sun Zhanzhan Gao
A Novel (t, n) Secret Sharing Scheme Based upon Euler's Theorem. On the Constructions of New Symmetric Ciphers Based on Nonbijective Multivariate Maps of Prescribed Degree.Vasyl Ustimenko Urszula Romanczuk-Polubiec Aneta Wróblewska Monika Katarzyna Polak Eustrat Zhupa
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities.Joseph I. Choi Kevin R. B. Butler
Measuring the Sum-of-Squares Indicator of Boolean Functions in Encryption Algorithm for Internet of Things.Yu Zhou Yongzhuang Wei Fengrong Zhang
SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations.Mingfu Xue Chengxiang Yuan Zhe Liu Jian Wang
Efficient Extraction of Network Event Types from NetFlows. Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems.Fute Shang Buhong Wang Fuhu Yan Tengyao Li
SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks.Meiyu Zhang Qianying Zhang Shijun Zhao Zhiping Shi Yong Guan
A Buffer Overflow Prediction Approach Based on Software Metrics and Machine Learning.Jiadong Ren Zhangqi Zheng Qian Liu Zhiyao Wei Huaizhi Yan
Blind Image Watermarking Based on Adaptive Data Spreading in n-Level DWT Subbands.Yong-Seok Lee Young-Ho Seo Dong-Wook Kim
A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment.Wenting Shen Jing Qin Jixin Ma
On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key.Édgar Salguero Dorokhin Walter Fuertes Edison Lascano
Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation.Haiying Ma Zhanjun Wang Zhijin Guan
Secure Information Sharing System for Online Patient Networks. Mining the Key Nodes from Software Network Based on Fault Accumulation and Propagation.Guoyan Huang Qian Wang Xinqian Liu Xiaobing Hao Huaizhi Yan
FORTRESS: An Efficient and Distributed Firewall for Stateful Data Plane SDN.Maurantonio Caprolu Simone Raponi Roberto Di Pietro
Practical Web Spam Lifelong Machine Learning System with Automatic Adjustment to Current Lifecycle Phase. Multifeature Named Entity Recognition in Information Security Based on Adversarial Learning. A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function. Virtual Network Embedding Based on Security Level with VNF Placement.Dhanu Dwiardhika Takuji Tachibana
Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System.Krzysztof Cabaj Marcin Gregorczyk Wojciech Mazurczyk Piotr Nowakowski Piotr Zórawski
SSPSoC: A Secure SDN-Based Protocol over MPSoC.Soultana Ellinidou Gaurav Sharma Théo Rigas Tristan Vanspouwen Olivier Markowitch Jean-Michel Dricot
Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image.Bin Ma Bing Li Xiao-Yu Wang Chunpeng Wang Jian Li Yun-Qing Shi
A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design.Yasuyuki Kawanishi Hideaki Nishihara Daisuke Souma Hirotaka Yoshida Yoichi Hata
Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment.Toan-Thinh Truong Minh-Triet Tran Anh Duc Duong
Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective.Jian Sun Guanhua Huang Arun Kumar Sangaiah Guangyang Zhu Xiaojiang Du
A Cooperative Denoising Algorithm with Interactive Dynamic Adjustment Function for Security of Stacker in Industrial Internet of Things.Darong Huang Lanyan Ke Bo Mi Guosheng Wei Jian Wang Shaohua Wan
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning.Teng Hu Weina Niu Xiaosong Zhang Xiaolei Liu Jiazhong Lu Yuan Liu
Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks.Dilara Acarali Muttukrishnan Rajarajan Nikos Komninos Bruno Bogaz Zarpelão
Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees.Wenli Shang Tianyu Gong Chunyu Chen Jing Hou Peng Zeng
A Short Server-Aided Certificateless Aggregate Multisignature Scheme in the Standard Model. RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications.Mishall Al-Zubaidie Zhongwei Zhang Ji Zhang
Security, Privacy, and Trust for Cyberphysical-Social Systems.Laurence T. Yang Wei Wang Gregorio Martínez Pérez Willy Susilo
A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning.Yuntao Zhao Bo Bo Yongxin Feng ChunYu Xu Bo Yu
A New Group Location Privacy-Preserving Method Based on Distributed Architecture in LBS.JingJing Wang Yiliang Han Xiaoyuan Yang Tanping Zhou Jiayong Chen
Integrity Audit of Shared Cloud Data with Identity Tracking.Yunxue Yan Lei Wu Wenyu Xu Hao Wang Zhao Man Liu
Group-Based Susceptible-Infectious-Susceptible Model in Large-Scale Directed Networks.Xu Wang Bo Song Wei Ni Ren Ping Liu Y. Jay Guo Xinxin Niu Kangfeng Zheng
Tightly Secure Lossy Trapdoor Functions: Constructions and Applications. Efficient Lossless Compression Based Reversible Data Hiding Using Multilayered n-Bit Localization.Rashid Abbasi Lixiang Xu Farhan Amin Bin Luo
Image Encryption with Double Spiral Scans and Chaotic Maps.Zhenjun Tang Ye Yang Shijie Xu Chunqiang Yu Xianquan Zhang
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy.Daode Zhang Jie Li Bao Li Xianhui Lu Haiyang Xue Dingding Jia Yamin Liu
An Explainable Password Strength Meter Addon via Textual Pattern Recognition. Security and Privacy for Smart Cyber-Physical Systems.Liran Ma Yan Huo Chunqiang Hu Wei Li
FPGA Implementation of Digital Images Watermarking System Based on Discrete Haar Wavelet Transform.Mohamed Ali Hajjaji Mohamed Gafsi Abdessalem Ben Abdelali Abdellatif Mtibaa
Mathematical Models for Malware Propagation.Ángel Martín del Rey Lu-Xing Yang Vasileios Karyotis
Single-Round Pattern Matching Key Generation Using Physically Unclonable Function.Yuichi Komano Kazuo Ohta Kazuo Sakiyama Mitsugu Iwamoto Ingrid Verbauwhede
Differentially Private Release of the Distribution of Clustering Coefficients across Communities.Xiaoye Li Jing Yang Zhenlong Sun Jianpei Zhang
Identifying Known and Unknown Mobile Application Traffic Using a Multilevel Classifier. A Cloud Service Trust Evaluation Model Based on Combining Weights and Gray Correlation Analysis.