Cybersecurity, Vol. 6, 2023
Articles
1.) Generic attacks on small-state stream cipher constructions in the multi-user setting. --Jianfu Huang, Ye Luo, Qinggan Fu, Yincen Chen, Chao Wang and Ling Song
2.) Evicting and filling attack for linking multiple network addresses of Bitcoin nodes. --Huashuang Yang, Jinqiao Shi, Yue Gao, Xuebin Wang, Yanwei Sun, Ruisheng Shi and Dongbin Wang
3.) Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk. --Chuyi Yan, Chen Zhang, Meng Shen, Ning Li, Jinhao Liu, Yinhao Qi, Zhigang Lu and Yuling Liu
4.) An efficient permutation approach for SbPN-based symmetric block ciphers. --Mir Nazish, M. Tariq Banday, Insha Syed and Sheena Banday
5.) IHVFL: a privacy-enhanced intention-hiding vertical federated learning framework for medical data. --Fei Tang, Shikai Liang, Guowei Ling and Jinyong Shan
6.) Intrusion detection systems for wireless sensor networks using computational intelligence techniques. --Vaishnavi Sivagaminathan, Manmohan Sharma and Santosh Kumar Henge
7.) Detecting fake reviewers in heterogeneous networks of buyers and sellers: a collaborative training-based spammer group algorithm. --Qi Zhang, Zhixiang Liang, Shujuan Ji, Benyong Xing and Dickson K. W. Chiu
8.) Continuously non-malleable codes from block ciphers in split-state model. --Anit Kumar Ghosal and Dipanwita Roychowdhury
9.) Use of subword tokenization for domain generation algorithm classification. --Sea Ran Cleon Liew and Ngai Fong Law
10.) A buffer overflow detection and defense method based on RISC-V instruction set extension. -- Chang Liu, Yan-Jun Wu, Jing-Zheng Wu and Chen Zhao
11.) Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset. --B S Sharmila and Rohini Nagapadma
12.) Detecting compromised email accounts via login behavior characterization. --Jianjun Zhao, Can Yang, Di Wu, Yaqin Cao, Yuling Liu, Xiang Cui and Qixu Liu
13.) Security estimation of LWE via BKW algorithms. --Yu Wei, Lei Bi, Xianhui Lu and Kunpeng Wang
14.) A convolutional neural network to detect possible hidden data in spatial domain images. --Jean De La Croix Ntivuguruzwa and Tohari Ahmad
15.) Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs. --Armita Kazeminajafabadi and Mahdi Imani
16.) Towards the universal defense for query-based audio adversarial attacks on speech recognition system. --Feng Guo, Zheng Sun, Yuxuan Chen and Lei Ju
17.) FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems. --Kaisheng Fan, Weizhe Zhang, Guangrui Liu and Hui He
------
------
1.) Generic attacks on small-state stream cipher constructions in the multi-user setting. --Jianfu Huang, Ye Luo, Qinggan Fu, Yincen Chen, Chao Wang and Ling Song
2.) Evicting and filling attack for linking multiple network addresses of Bitcoin nodes. --Huashuang Yang, Jinqiao Shi, Yue Gao, Xuebin Wang, Yanwei Sun, Ruisheng Shi and Dongbin Wang
3.) Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk. --Chuyi Yan, Chen Zhang, Meng Shen, Ning Li, Jinhao Liu, Yinhao Qi, Zhigang Lu and Yuling Liu
4.) An efficient permutation approach for SbPN-based symmetric block ciphers. --Mir Nazish, M. Tariq Banday, Insha Syed and Sheena Banday
5.) IHVFL: a privacy-enhanced intention-hiding vertical federated learning framework for medical data. --Fei Tang, Shikai Liang, Guowei Ling and Jinyong Shan
6.) Intrusion detection systems for wireless sensor networks using computational intelligence techniques. --Vaishnavi Sivagaminathan, Manmohan Sharma and Santosh Kumar Henge
7.) Detecting fake reviewers in heterogeneous networks of buyers and sellers: a collaborative training-based spammer group algorithm. --Qi Zhang, Zhixiang Liang, Shujuan Ji, Benyong Xing and Dickson K. W. Chiu
8.) Continuously non-malleable codes from block ciphers in split-state model. --Anit Kumar Ghosal and Dipanwita Roychowdhury
9.) Use of subword tokenization for domain generation algorithm classification. --Sea Ran Cleon Liew and Ngai Fong Law
10.) A buffer overflow detection and defense method based on RISC-V instruction set extension. -- Chang Liu, Yan-Jun Wu, Jing-Zheng Wu and Chen Zhao
11.) Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset. --B S Sharmila and Rohini Nagapadma
12.) Detecting compromised email accounts via login behavior characterization. --Jianjun Zhao, Can Yang, Di Wu, Yaqin Cao, Yuling Liu, Xiang Cui and Qixu Liu
13.) Security estimation of LWE via BKW algorithms. --Yu Wei, Lei Bi, Xianhui Lu and Kunpeng Wang
14.) A convolutional neural network to detect possible hidden data in spatial domain images. --Jean De La Croix Ntivuguruzwa and Tohari Ahmad
15.) Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs. --Armita Kazeminajafabadi and Mahdi Imani
16.) Towards the universal defense for query-based audio adversarial attacks on speech recognition system. --Feng Guo, Zheng Sun, Yuxuan Chen and Lei Ju
17.) FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems. --Kaisheng Fan, Weizhe Zhang, Guangrui Liu and Hui He
------
------
Jianfu Huang - Personal Name
Feng Guo - Personal Name
Armita Kazeminajafabadi - Personal Name
Jean De La Croix Ntivuguruzwa - Personal Name
Yu Wei - Personal Name
B S Sharmila - Personal Name
Chang Liu - Personal Name
Sea Ran Cleon Liew - Personal Name
Anit Kumar Ghosal - Personal Name
Qi Zhang - Personal Name
Vaishnavi Sivagaminathan - Personal Name
Fei Tang - Personal Name
Mir Nazish - Personal Name
Chuyi Yan - Personal Name
Huashuang Yang - Personal Name
Kaisheng Fan - Personal Name
Feng Guo - Personal Name
Armita Kazeminajafabadi - Personal Name
Jean De La Croix Ntivuguruzwa - Personal Name
Yu Wei - Personal Name
B S Sharmila - Personal Name
Chang Liu - Personal Name
Sea Ran Cleon Liew - Personal Name
Anit Kumar Ghosal - Personal Name
Qi Zhang - Personal Name
Vaishnavi Sivagaminathan - Personal Name
Fei Tang - Personal Name
Mir Nazish - Personal Name
Chuyi Yan - Personal Name
Huashuang Yang - Personal Name
Kaisheng Fan - Personal Name
Vol. 6, 2023
2523-3246
e-Journal TI
Inggris
Springer Nature
2023
Cambridge, United Kingdom
LOADING LIST...
LOADING LIST...