Advanced Search

  • SEARCHING...
  • SEARCHING...

Detail Record


XML

Cybersecurity, Vol. 8, 2025

Article

1. Integral cryptanalysis on reduce-round SAILFISH-I. --Yanjun Li, Lixian Zhang, Yiping Lin, Jian Liu and Yani Sun
2. Bag2image: a multi-instance network traffic representation for network security event prediction. --Jiachen Zhang, Daoqi Han, Zhaoxuan Lv, Yueming Lu, Junke Duan, Yang Liu and Xinyu Zhang
3. Efficient network attack path optimization method based on prior knowledge-based PPO algorithm. --Qiuxiang Li, Jianping Wu
4. A combined feature selection approach for malicious email detection based on a comprehensive email dataset. --Han Zhang, Yong Shi, Ming Liu, Libo Chen, Songyang Wu and Zhi Xue
5. The secret behind instant messaging: video identification attack against complex protocols. --Ruiqi Huang, Hua Wu, Xiaohui Wang, Guang Cheng and Xiaoyan Hu
6. Zero-trust based dynamic access control for cloud computing. --Ri Wang, Chen Li, Kun Zhang and Bibo Tu
7. Deep neural network modeling attacks on arbiter-PUF-based designs. --Huanwei Wang, Weining Hao, Yonghe Tang, Bing Zhu, Weiyu Dong and Wei Liu
8. Speedup signing: pre-rejection sampling towards dilithium. --Lianglin Yan, Ming Luo and Mingsheng Wang
9. When LLMs meet cybersecurity: a systematic literature review. --Jie Zhang, Haoyu Bu, Hui Wen, Yongji Liu, Haiqiang Fei, Rongrong Xi, Lun Li, Yun Yang, Hongsong Zhu and Dan Meng
10. Detection to false data for smart grid. --Jian Zheng, Shumiao Ren, Jingyue Zhang, Yu Kui, Jingyi Li, Qin Jiang and Shiyan Wang
11. A novel oversampling method based on Wasserstein CGAN for imbalanced classification. --Hongfang Zhou, Heng Pan, Kangyun Zheng, Zongling Wu and Qingyu Xiang
12. IRMAOC: an interpretable role mining algorithm based on overlapping clustering. --Yaqi Yang, Jun’e Li, Tao Zhang, Lu Chen, Guirong Huang and Zhuo Lv
13. Angus: efficient active learning strategies for provenance based intrusion detection. --Lin Wu, Yulai Xie, Jin Li, Dan Feng, Jinyuan Liang and Yafeng Wu
14. Privacy-preserving attribute-based access control using homomorphic encryption. --Malte Kerl, Ulf Bodin and Olov Schelén
15. A privacy-enhanced framework with deep learning for botnet detection. --Guangli Wu, Xingyue Wang
-------
-------
Zhang, Jie - Personal Name
Kerl, Malte - Personal Name
Lin Wu - Personal Name
Yang, Yaqi - Personal Name
Zhou, Hongfang - Personal Name
Zheng, Jian - Personal Name
Yan, Lianglin - Personal Name
Wang, Huanwei - Personal Name
Wang, Ri - Personal Name
Huang, Ruiqi - Personal Name
Zhang, Han - Personal Name
Qiuxiang Li - Personal Name
Zhang, Jiachen - Personal Name
Yanjun Li - Personal Name
Guangli Wu - Personal Name
Vol. 8, 2025
2523-3246
e-Journal PTI
Inggris
Springer Nature Singapore Pte Ltd.
2024
Cambridge, United Kingdom
LOADING LIST...
LOADING LIST...