Cybersecurity, Vol. 5, 2022
Articles
1.) Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognition. --Ruipeng Yang, Aimin Yu, Lijun Cai and Dan Meng
2.) Deep 3D mesh watermarking with self-adaptive robustness. --Feng Wang, Hang Zhou, Han Fang, Weiming Zhang and Nenghai Yu
3.) Unleashing the power of pseudo-code for binary code similarity analysis. --Weiwei Zhang, Zhengzi Xu, Yang Xiao and Yinxing Xue
4.) The differential fault analysis on block cipher FeW. --Haiyan Xiao, Lifang Wang and Jinyong Chang
5.) Phishing website prediction using base and ensemble classifier techniques with cross-validation. --Anjaneya Awasthi and Noopur Goel
6.) NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices. --Yu Zhang, Nanyu Zhong, Wei You, Yanyan Zou, Kunpeng Jian, Jiahuan Xu, Jian Sun, Baoxu Liu and Wei Huo
7.) Valet attack on privacy: a cybersecurity threat in automotive Bluetooth infotainment systems. --Vishnu Renganathan, Ekim Yurtsever, Qadeer Ahmed and Aylin Yener
8.) A lightweight DDoS detection scheme under SDN context. --Kun Jia, Chaoge Liu, Qixu Liu, Junnan Wang, Jiazhi Liu and Feng Liu
9.) A fully dynamic forward-secure group signature from lattice. --Zhijian Liao, Qiong Huang and Xinjian Chen
10.) PUMD: a PU learning-based malicious domain detection framework. --Zhaoshan Fan, Qing Wang, Haoran Jiao, Junrong Liu, Zelin Cui, Song Liu and Yuling Liu
11.) Study of methods for endpoint aware inspection in a next generation firewall. --Jenny Heino, Antti Hakkala and Seppo Virtanen
12.) Embedded fuzzing: a review of challenges, tools, and solutions. --Max Eisele, Marcello Maugeri, Rachna Shriwas, Christopher Huth and Giampaolo Bella
13.) CAMFuzz: Explainable Fuzzing with Local Interpretation. --Ji Shi, Wei Zou, Chao Zhang, Lingxiao Tan, Yanyan Zou, Yue Peng and Wei Huo
14.) Sarve: synthetic data and local differential privacy for private frequency estimation. --Gatha Varma, Ritu Chauhan and Dhananjay Singh
15.) On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities. --Masoud Mehrabi Koushki, Ibrahim AbuAlhaol, Anandharaju Durai Raju, Yang Zhou, Ronnie Salvador Giagone and Huang Shengqiang
16.) Hybrid dual attack on LWE with arbitrary secrets. --Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang and Zhenfei Zhang
17.) The inconsistency of documentation: a study of online C standard library documents. --Ruishi Li, Yunfei Yang, Jinghua Liu, Peiwei Hu and Guozhu Meng
-----
-----
1.) Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognition. --Ruipeng Yang, Aimin Yu, Lijun Cai and Dan Meng
2.) Deep 3D mesh watermarking with self-adaptive robustness. --Feng Wang, Hang Zhou, Han Fang, Weiming Zhang and Nenghai Yu
3.) Unleashing the power of pseudo-code for binary code similarity analysis. --Weiwei Zhang, Zhengzi Xu, Yang Xiao and Yinxing Xue
4.) The differential fault analysis on block cipher FeW. --Haiyan Xiao, Lifang Wang and Jinyong Chang
5.) Phishing website prediction using base and ensemble classifier techniques with cross-validation. --Anjaneya Awasthi and Noopur Goel
6.) NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices. --Yu Zhang, Nanyu Zhong, Wei You, Yanyan Zou, Kunpeng Jian, Jiahuan Xu, Jian Sun, Baoxu Liu and Wei Huo
7.) Valet attack on privacy: a cybersecurity threat in automotive Bluetooth infotainment systems. --Vishnu Renganathan, Ekim Yurtsever, Qadeer Ahmed and Aylin Yener
8.) A lightweight DDoS detection scheme under SDN context. --Kun Jia, Chaoge Liu, Qixu Liu, Junnan Wang, Jiazhi Liu and Feng Liu
9.) A fully dynamic forward-secure group signature from lattice. --Zhijian Liao, Qiong Huang and Xinjian Chen
10.) PUMD: a PU learning-based malicious domain detection framework. --Zhaoshan Fan, Qing Wang, Haoran Jiao, Junrong Liu, Zelin Cui, Song Liu and Yuling Liu
11.) Study of methods for endpoint aware inspection in a next generation firewall. --Jenny Heino, Antti Hakkala and Seppo Virtanen
12.) Embedded fuzzing: a review of challenges, tools, and solutions. --Max Eisele, Marcello Maugeri, Rachna Shriwas, Christopher Huth and Giampaolo Bella
13.) CAMFuzz: Explainable Fuzzing with Local Interpretation. --Ji Shi, Wei Zou, Chao Zhang, Lingxiao Tan, Yanyan Zou, Yue Peng and Wei Huo
14.) Sarve: synthetic data and local differential privacy for private frequency estimation. --Gatha Varma, Ritu Chauhan and Dhananjay Singh
15.) On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities. --Masoud Mehrabi Koushki, Ibrahim AbuAlhaol, Anandharaju Durai Raju, Yang Zhou, Ronnie Salvador Giagone and Huang Shengqiang
16.) Hybrid dual attack on LWE with arbitrary secrets. --Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang and Zhenfei Zhang
17.) The inconsistency of documentation: a study of online C standard library documents. --Ruishi Li, Yunfei Yang, Jinghua Liu, Peiwei Hu and Guozhu Meng
-----
-----
Ruipeng Yang - Personal Name
Lei Bi - Personal Name
Masoud Mehrabi Koushki - Personal Name
Gatha Varma - Personal Name
Ji Shi - Personal Name
Max Eisele - Personal Name
Jenny Heino - Personal Name
Zhaoshan Fan - Personal Name
Zhijian Liao - Personal Name
Kun Jia - Personal Name
Vishnu Renganathan - Personal Name
Yu Zhang - Personal Name
Anjaneya Awasthi - Personal Name
Haiyan Xiao - Personal Name
Weiwei Zhang - Personal Name
Feng Wang - Personal Name
Ruishi Li - Personal Name
Lei Bi - Personal Name
Masoud Mehrabi Koushki - Personal Name
Gatha Varma - Personal Name
Ji Shi - Personal Name
Max Eisele - Personal Name
Jenny Heino - Personal Name
Zhaoshan Fan - Personal Name
Zhijian Liao - Personal Name
Kun Jia - Personal Name
Vishnu Renganathan - Personal Name
Yu Zhang - Personal Name
Anjaneya Awasthi - Personal Name
Haiyan Xiao - Personal Name
Weiwei Zhang - Personal Name
Feng Wang - Personal Name
Ruishi Li - Personal Name
Vol. 5, 2022
2523-3246
e-Journal TI
Inggris
Springer Nature
2022
Cambridge, United Kingdom
LOADING LIST...
LOADING LIST...