Printer Friendly

Browse Data security topic

Methods subtopic

Articles

1-300 out of 600 article(s) nextnext page
Title Author Type Date Words
How to fix your Google Gmail password on your mobile device. Oct 15, 2021 644
Simple ways to enhance website security. Sep 17, 2021 545
Cybercriminals target mobile banking in PH, SEA, threat surges 60%. Sep 15, 2021 721
Online Privacy Guide for Students. Sep 10, 2021 569
Deep Learning Based DNS Tunneling Detection and Blocking System. Altuncu, Mehmet Ali; Gulagiz, Fidan Kaya; Ozcan, Hikmetcan; Bayir, Omer Faruk; Gezgin, Alperen; Niya Report Aug 1, 2021 7003
Polymorphic Path Transferring for Secure Flow Delivery. Zhang, Rongbo; Li, Xin; Zhan, Yan Report Aug 1, 2021 11207
A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing. Dai, Yingling; Weng, Jian; Yang, Anjia; Yu, Shui; Deng, Robert H. Report Aug 1, 2021 9944
Cyber Risks No Longer Science-Fiction for Libraries. Regan, Kevin Jul 19, 2021 919
Beware, it's a scam! Editorial Jul 9, 2021 802
Cyber Insurance Industry in Crosshairs of Ransomware Criminals. Bajak, Frank Jul 7, 2021 1313
Leading by Example: How Insurers Can Manage Cyber Risk Within Their Own Operations. Blosfield, Elizabeth Jul 7, 2021 624
A Message from a Cybersecurity Expert. Sfoglia, Pete Jul 5, 2021 660
The Cybercrime Challenge for Agents. Wetzel, Tom Jul 5, 2021 652
Cryptomining still threatens SMBs in PH. Jun 22, 2021 536
Forgotten Your Passwords? They Soon May Be Lost Altogether ? with Insurers' Help. Patterson, James Jun 21, 2021 1279
Experts Call Colonial Pipeline Attack a Wake-Up Call, Say Bigger Attacks Could Be Ahead. Blosfield, Elizabeth Jun 9, 2021 686
Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks. Shin, Tran Song Dat; Shin, Yong-Hyeon; Lee, Changhoon Report Jun 1, 2021 5758
Secrecy Capacity Analysis of an Underlay Cognitive Radio Network in the Presence of Co-channel and Primary Network Interference. Bayat, Emre; Colak, Sultan Aldirmaz Report Jun 1, 2021 4790
Multi Label Deep Learning classification approach for False Data Injection Attacks in Smart Grid. Prasanna, Srinivasan. V.; Balasubadra, K.; Saravanan, K.; Arjun, V.S.; Malarkodi, S. Report Jun 1, 2021 8151
LSTM Android Malicious Behavior Analysis Based on Feature Weighting. Yang, Qing; Wang, Xiaoliang; Zheng, Jing; Ge, Wenqi; Bai, Ming; Jiang, Frank Report Jun 1, 2021 6455
Robust Secure Transmit Design with Artificial Noise in the Presence of Multiple Eavesdroppers. Liu, Xiaochen; Gao, Yuanyuan; Sha, Nan; Zang, Guozhen; Wang, Shijie. Report Jun 1, 2021 6718
On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks. Wang, Qiuhua; Kang, Mingyang; Yuan, Lifeng; Wang, Yunlu; Miao, Gongxun; Choo, Kim-Kwang Raymond Report Jun 1, 2021 9600
Cyber Security Is a Conversation Agents Need to Have with Clients. Holmes, Jeff May 17, 2021 1018
More government sites are vulnerable to cyber attacks. May 6, 2021 729
Efficient Proxy Re-encryption Scheme for E-Voting System. Xiong, Hu Report May 1, 2021 10925
State of the Art of Anti-Screen Capture Protection Techniques. Lee, Young; Hahn, SangGeun Report May 1, 2021 7656
EDGE: An Enticing Deceptive-content GEnerator as Defensive Deception. Li, Huanruo; Guo, Yunfei; Huo, Shumin; Ding, Yuehang Report May 1, 2021 7192
Methodology for Computer Security Incident Response Teams into IoT Strategy. Bernal, Alejandro Enciso; Monterrubio, Sergio Mauricio Martinez; Fuente, Javier Parra; Crespo, Ruben Report May 1, 2021 8320
Random Number Generator and Secure Communication Applications Based on Infinitely Many Coexisting Chaotic Attractors. Noor, Abdullah; Taskiran, Zehra Gulru Cam Report May 1, 2021 4074
'Ask App Not To Track'. Apr 30, 2021 549
Cybersecurity is everyone's responsibility. Apr 25, 2021 698
Why healthcare and cybersecurity must go hand in hand to protect the Covid-19 vaccine supply chain. Apr 24, 2021 626
Med Tech Report: Change is hard: Lessons from an EHR conversion. Notte, Chris; Skolnik, Neil Apr 1, 2021 1072
Image Deduplication Based on Hashing and Clustering in Cloud Storage. Chen, Lu; Xiang, Feng; Sun, Zhixin Report Apr 1, 2021 5969
High Capacity Information Hiding Method Based on Pixel-value Adjustment with Modulus Operation. Li, Teng; Zhang, Yu; Wang, Sha; Sun, Jun-Jie Report Apr 1, 2021 4984
Defending and Detecting Audio Adversarial Example using Frame Offsets. Gong, Yongkang; Yan, Diqun; Mao, Terui; Wang, Donghua; Wang, Rangding Report Apr 1, 2021 4969
Safe and secure; that is how it should be. Mar 29, 2021 594
Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching. Hamza, Ali; Shehzad, Danish; Sarfraz, Muhammad Shahzad; Habib, Usman; Shafi, Numan Report Mar 1, 2021 11511
Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance. Liu, Qiang; Xiang, Xuyu; Qin, Jiaohua; Tan, Yun; Zhang, Qin Report Mar 1, 2021 8004
Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System. Khosravy, Mahdi; Nakamura, Kazuaki; Hirose, Yuki; Nitta, Naoko; Babaguchi, Noboru Report Mar 1, 2021 6947
Detecting Malware in Cyberphysical Systems Using Machine Learning: a Survey. Montes, F.; Bermejo, J.; Sanchez, L.E.; Bermejo, J.R.; Sicilia, J.A. Report Mar 1, 2021 10559
Civil Service Commission data breach, thousands of user details exposed. Feb 28, 2021 541
Philippine government data leaks remain unplugged. Feb 23, 2021 722
Fundamentals in bridging the cybersecurity skills gap. Feb 16, 2021 840
Privacy Protection Method for Sensitive Weighted Edges in Social Networks. Gong, Weihua; Jin, Rong; Li, Yanjun; Yang, Lianghuai; Mei, Jianping Report Feb 1, 2021 7054
Verification Algorithm for the Duplicate Verification Data with Multiple Verifiers and Multiple Verification Challenges. Xu, Guangwei; Lai, Miaolin; Feng, Xiangyang; Huang, Qiubo; Luo, Xin; Li, Li; Li, Shan Report Feb 1, 2021 8116
A Systematic Treat Model for Software-Defined Networking. Zhang, Wenbin; Wu, Zehui; Wei, Qiang; Yuan, Huijie Report Feb 1, 2021 9173
A Privacy-preserving Data Aggregation Scheme with Efficient Batch Verification in Smart Grid. Zhang, Yueyu; Chen, Jie; Zhou, Hua; Dang, Lanjun Report Feb 1, 2021 7187
HOW TO AVOID BECOMING A VICTIM; Falling prey to money scams and data breaches can set anxiety levels soaring. These tips will help you keep control of your cash and stay safe online. Jan 31, 2021 857
Lockdown fraud! HOW TO AVOID BECOMING A VICTIM; Falling prey to money scams and data breaches can set anxiety levels soaring. These tips will help you keep control of your cash and stay safe online. Jan 31, 2021 806
Lockdown fraud! How to avoid becoming a victim; Falling prey to money scams and data breaches can set anxiety levels soaring. These tips will help you keep control of your cash and stay safe online. Jan 31, 2021 806
Safeguard your personal information. Editorial Jan 11, 2021 553
A "Hack" of a Close Vote. Markuson, Daniel Jan 1, 2021 914
UDP-Based Active Scan for IoT Security (UAIS). Jung, Hyun-Chul; Jo, Hyun-geun; Lee, Heejo Report Jan 1, 2021 5246
FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN. Lian, Weichen; Li, Zhaobin; Guo, Chao; Wei, Zhanzhen; Peng, Xingyuan Report Jan 1, 2021 8845
Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System. Zhang, Wei; Wu, Yi; Xiong, Hu; Qin, Zhiguang Report Jan 1, 2021 7753
Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption. Liu, Zhenhua; Ji, Jiaqi; Yin, Fangfang; Wang, Baocang Report Jan 1, 2021 8090
Cybersecurity Attacks during a Pandemic: It Is Not Just IT's Job! Middaugh, Donna J. Report Jan 1, 2021 1381
Fastening data security with a remote working environment. Dec 29, 2020 556
Teach children about data privacy and fake news through these books. Dec 21, 2020 506
Ensuring Security and Privacy While Remote Working. Dec 18, 2020 693
Madayn organises awareness lectures on investment methods, labour law and cybersecurity. By: Times News Service Dec 5, 2020 299
Kabataang Digital. Dec 2, 2020 747
Fortinet Expands Network Security Expert Training Institute. Dec 2, 2020 800
Generative Adversarial Networks: A Literature Review. Cheng, Jieren; Yang, Yue; Tang, Xiangyan; Xiong, Naixue; Lei, Feifei Report Dec 1, 2020 11172
Semi-supervised based Unknown Attack Detection in EDR Environment. Hwang, Chanwoong; Kim, Doyeon; Lee, Taejin Report Dec 1, 2020 6856
Kaspersky and Siemens Underscore the Importance of Securing Industry 4.0 Apps. Nov 13, 2020 798
How to reclaim a hacked YouTube account. Nov 3, 2020 601
Elevate Cyberdefenders' Skills Amid a Transforming World. Nov 1, 2020 551
Network Traffic Classification Based on Deep Learning. Li, Junwei; Pan, Zhisong Report Nov 1, 2020 8694
Two-Pathway Model for Enhancement of Protocol Reverse Engineering. Goo, Young-Hoon; Shim, Kyu-Seok; Baek, Ui-Jun; Kim, Myung-Sup Report Nov 1, 2020 7569
A Reversible Data Hiding Method for AMBTC Compressed Image without Expansion inside Stego Format. Hui, Zheng; Zhou, Quan Report Nov 1, 2020 7628
Integral Attacks on Some Lightweight Block Ciphers. Zhu, Shiqiang; Wang, Gaoli; He, Yu; Qian, Haifeng Report Nov 1, 2020 8976
Enhanced Privacy Preservation of Cloud Data by using ElGamal Elliptic Curve (EGEC) Homomorphic Encryption Scheme. vedaraj, M.; Ezhumalai, P. Report Nov 1, 2020 4924
Securing Anonymous Authenticated Announcement Protocol for Group Signature in Internet of Vehicles. Amir, Nur Afiqah Suzelan; Malip, Amizah; Othman, Wan Ainun Mior Report Nov 1, 2020 9800
Majority of Pinoys prefer digital IDs - survey. Oct 28, 2020 747
Working from home: How to manage data protection risk. Oct 7, 2020 619
DOF orders GFIs and agencies to boost cybersecurity capability. Oct 7, 2020 511
Network Security: How to Create a Secure WiFi Network. Oct 1, 2020 1183
Optimization of 3D Triangular Mesh Watermarking Using ACO-Weber's Law. Narendra, Modigarl; Valarmathi, M.L.; Anbarasi, L. Jani Report Oct 1, 2020 5525
CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud. Hwang, Yong-Woon; Lee, Im-Yeong Report Oct 1, 2020 8373
B-Corr Model for Bot Group Activity Detection Based on Network Flows Traffic Analysis. Hostiadi, Dandy Pramana; Wibisono, Waskitho; Ahmad, Tohari Report Oct 1, 2020 8690
Searchable Encrypted String for Query Support on Different Encrypted Data Types. Azizi, Shahrzad; Mohammadpur, Davud Report Oct 1, 2020 6010
USING CYBERSECURITY FAILURES TO CRITIQUE THE SEC'S APPROACH TO CRYPTO REGULATION. Goforth, Carol R. Sep 22, 2020 20333
SPOILING FOR A FIGHT: HACKING BACK WITH THE ACTIVE CYBER DEFENSE CERTAINTY ACT. Porch, Alice M. Sep 22, 2020 10339
A JOP GADGET DISCOVERY AND ANALYSIS TOOL. Brizendine, Bramwell; Stroschein, Josh Sep 22, 2020 6403
ALERT PRIORITIZATION AND STRENGTHENING: TOWARDS AN INDUSTRY STANDARD PRIORITY SCORING SYSTEM FOR IDS ANALYSTS USING OPEN SOURCE TOOLS AND MODELS OF MACHINE LEARNING. Dangi, Bikram; Gamet, Jeremy; Kulm, Arica; Nelson, Tj; O'Brien, Austin; Pauli, Wayne E. Sep 22, 2020 6662
IDENTIFYING A PSYCHOMETRIC PROFILE FOR VULNERABILITY ASSESSMENT PROFESSIONALS: TALENT IDENTIFICATION TO SUPPORT CAREER ASSESSMENT. Crosby, Martha; Ikehara, Curtis; Neidert, Gregory P.M.; Zantua, Morgan A. Sep 22, 2020 3597
Teachers and Students, Protect your Digital Life by Following these Tips. Sep 20, 2020 599
Parent consent needed to record online classes. Sep 16, 2020 708
Policy-Based Composition and Embedding of Extended Virtual Networks and SFCs for IIoT. Mandarawi, Waseem; Rottmeier, Jurgen; Rezaeighale, Milad; de Meer, Hermann Report Sep 1, 2020 10941
Stymie hackers with these 6 steps. Patrick, Byron Sep 1, 2020 1223
A Heterogeneous IoT Node Authentication Scheme Based on Hybrid Blockchain and Trust Value. Zhang, Shiqiang; Cao, Yang; Ning, Zhenhu; Xue, Fei; Cao, Dongzhi; Yang, Yongli Sep 1, 2020 9817
A Four-Layer Robust Storage in Cloud using Privacy Preserving Technique with Reliable Computational Intelligence in Fog-Edge. Nirmala, E.; Muthurajkumar, S. Sep 1, 2020 6491
Information Security and Knowledge Sharing: A Blockchain Perspective. Huang, Kai-Ping Report Sep 1, 2020 5561
Traceable Attribute-Based Secure Data Sharing with Hidden Policies in Mobile Health Networks. Liu, Xueyan; Luo, Yukun; Yang, Xiaotao Report Aug 31, 2020 7793
Certificateless Proxy Reencryption Scheme (CPRES) Based on Hyperelliptic Curve for Access Control in Content-Centric Network (CCN). Ullah, Zahid; Zeb, Asim; Ullah, Insaf; Awan, Khalid Mahmood; Saeed, Yousaf; Uddin, M. Irfan; Khasawn Report Aug 31, 2020 9180
A Tool-Based Perspective on Software Code Maintainability Metrics: A Systematic Literature Review. Ardito, Luca; Coppola, Riccardo; Barbato, Luca; Verga, Diego Report Aug 31, 2020 18330
Modified Decision Tree Technique for Ransomware Detection at Runtime through API Calls. Ullah, Faizan; Javaid, Qaisar; Salam, Abdu; Ahmad, Masood; Sarwar, Nadeem; Shah, Dilawar; Abrar, Muh Report Aug 31, 2020 6068
Analysis of Digital Image Watermarking Techniques through Hybrid Methods. Begum, Mahbuba; Uddin, Mohammad Shorif Aug 31, 2020 7341
TikTok Strengthens its Commitment to Safer Online Self-Expression. Aug 31, 2020 744
Bridging the Cybersecurity Skills Gap Through Artificial Intelligence. Aug 26, 2020 604
Protecting your home network from iOS 14's Private Address feature. Feria, Rom Aug 19, 2020 602
How to Avoid the Ransomware Onslaught. Kitchen, David E.; Valach, Anthony P. Aug 1, 2020 1776
A Dual Privacy Preserving Algorithm in Spatial Crowdsourcing. Wang, Shengxiang; Jia, Xiaofan; Sang, Qianqian Report Jul 31, 2020 3871
Power Allocation for Reducing PAPR of Artificial-Noise-Aided Secure Communication System. Hong, Tao; Zhang, Geng-xin Report Jul 31, 2020 8898
Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption. Khan, Muhammad Asghar; Ullah, Insaf; Nisar, Shibli; Noor, Fazal; Qureshi, Ijaz Mansoor; Khanzada, Fa Report Jul 31, 2020 9437
Flow Chart Generation-Based Source Code Similarity Detection Using Process Mining. Zhang, Feng; Li, Lulu; Liu, Cong; Zeng, Qingtian Report Jul 31, 2020 8930
QuPiD Attack: Machine Learning-Based Privacy Quantification Mechanism for PIR Protocols in Health-Related Web Search. Khan, Rafiullah; Ahmad, Arshad; Alsayed, Alhuseen Omar; Binsawad, Muhammad; Islam, Arshad; Ullah, Mo Report Jul 31, 2020 6801
Three-Dimensional Head-Pose Estimation for Smart Iris Recognition from a Calibrated Camera. Akrout, Belhassen; Fakhfakh, Sana Report Jul 31, 2020 6613
How to make your Google Drive or Microsoft OneDrive private. Feria , Rom Jul 27, 2020 743
A Lightweight Cryptography Algorithm for Secure Smart Cities and IOT. Abed, Ahmed Mohsin; Boyaci, Ali Report Jul 14, 2020 3746
Globe shares tips to keep passwords and accounts secure. Jul 10, 2020 583
WARNING: Use .gov.ph at your own risk. Jul 4, 2020 557
Cybersecurity Resources for a Remote Workforce. Anders, Susan B. Column Jul 1, 2020 1340
Evaluating Encryption Algorithms for Sensitive Data Using Different Storage Devices. Sassani, Bahman A.; Alkorbi, Mohammed; Jamil, Noreen; Naeem, M. Asif; Mirza, Farhaan Report Jun 30, 2020 5134
Multifeature-Based Behavior of Privilege Escalation Attack Detection Method for Android Applications. Shen, Limin; Li, Hui; Wang, Hongyi; Wang, Yihuan Report Jun 30, 2020 9509
FaceApp face gender-swapping activity you can't resist. Jun 19, 2020 559
TECHNOLOGY AND BUSINESS CONTINUITY: Organizations must be prepared to leverage technology to enable recovery from the unexpected and unavoidable. Jiles, Loreal; Nathan, Barry Jun 1, 2020 1244
A world without passwords? Patrick, Byron Jun 1, 2020 934
5 Ways to Protect your Data when Working from Home. May 19, 2020 785
COVID-19: How to secure your home network for remote working. Huda Tabrez, Senior News Editor May 18, 2020 1484
A Hybrid Trust-Modeling Approach for IoT Security. Bahtiyar, Serif Report May 2, 2020 7072
Surviving a Pandemic in an Era of Cybercrime. Wertheim, Steven May 1, 2020 1218
DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective. Kim, Jiyeon; Kim, Hyung-Jong May 1, 2020 5706
Data security tips to help weather a pandemic. Yoo, Jamie May 1, 2020 1285
How To Stay Safe Online. Gopal, Deepa; K., Christina Apr 7, 2020 653
Federal Telework During the COVID-19 Pandemic: Cybersecurity Issues in Brief. Report Apr 1, 2020 4458
An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing. Su, Xin; Gong, Qingbo; Zheng, Yi; Liu, Xuchong; Li, Kuan-Ching Mar 31, 2020 7517
An Approach Based on Customized Robust Cloaked Region for Geographic Location Information Privacy Protection. Shen, Zhidong; Lu, Siyuan; Huang, Huijuan; Yuan, Meng; Tang, Guoming; Chen, Weiying; Zhang, Taige; Z Technical report Mar 1, 2020 5896
Tips for Fighting Off Cybercrime in 2020. Wertheim, Steven Column Mar 1, 2020 944
BLOCKCHAIN: POST-QUANTUM SECURITY & LEGAL ECONOMICS. Haney, Brian Seamus Mar 1, 2020 15234
Data Privacy and the Financial Services Industry: A Federal Approach to Consumer Protection. Soubouti, Fara Mar 1, 2020 11129
Turn to e-Services for secure access to taxpayer information, key tools. Schreiber, Gerard H., Jr.; Young, Marilyn Jan 1, 2020 1394
CREATING CYBERSECURITY AWARENESS. Brands, Kristine Jan 1, 2020 1053
A Survey of Artificial Intelligence Techniques for Cybersecurity Improvement. Alrajhi, Athari M. Jan 1, 2020 3983
Cybersecurity of Online Proctoring Systems. Slusky, Ludwig Report Jan 1, 2020 8362
Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs. Pan, Jiaye; Zhuang, Yi; Sun, Binglin Nov 30, 2019 14802
Five ways to strengthen employee cybersecurity awareness. Nov 17, 2019 632
Criminals thrive on data abundance - here's how we'll catch them. Duguin, Stephane Nov 3, 2019 1151
How to Create an Incident Response Plan. Wertheim, Steven Nov 1, 2019 1100
How to protect companies from 3rd party data breaches. Sep 1, 2019 817
Housekeeping tips to mitigate data security risk. Yoo, Jamie Sep 1, 2019 1230
Don't let your guard down when gaming. Aug 7, 2019 558
What solution does DEVCON offer to help efficiently protect against harmful cyber attacks? Louie, Maggie Aug 1, 2019 339
How to Know Where Critical Data Reside. Wertheim, Steven Column Jul 1, 2019 837
A quick look at how you can keep your phone safe from attackers looking to steal your data. Jun 20, 2019 1020
Accounting firm data breaches: One state's records; Find out the most common types of breaches and how to guard against them all. Cheng, Christine; Flasher, Renee; Higgins, James P. Jun 1, 2019 3050
Challenging Outdated Technology. Cherry, Michael; Imwinkelried, Edward J.; Riley, Elven; Epstein, Jules; Switzer, Mark; King, Jack Jun 1, 2019 760
Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices. Liu, Weiwei; Liu, Guangjie; Ji, Xiaopeng; Zhai, Jiangtao; Dai, Yuewei Report Apr 1, 2019 7906
A Cooperative Jamming Based Joint Transceiver Design for Secure Communications in MIMO Interference Channels. Huang, Boyang; Kong, Zhengmin; Fang, Yanjun; Jin, Xin Report Apr 1, 2019 6567
The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle. Zeng, Qian; Zhang, Zhongshan Report Apr 1, 2019 5748
DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network. Chen, Tieming; Mao, Qingyu; Lv, Mingqi; Li, Yinglong Report Apr 1, 2019 6740
The Security DV-Hop Algorithm against Multiple-Wormhole-Node-Link in WSN. Li, Jianpo; Wang, Dong Report Apr 1, 2019 9246
PROTECT YOURSELF FROM ONLINE IDENTITY THEFT. Apr 1, 2019 499
How to Stay Safe on Public WiFi. Apr 1, 2019 426
How To Protect Your Social Security Number From Data Breaches. Mar 25, 2019 974
Future tense. Vieth, Peter Mar 25, 2019 1044
Identity Theft: Protect Your /Medicare account. Mar 22, 2019 354
Costly Crisis Management. Helms, Karla Jo Mar 1, 2019 679
A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model. Lu, Yang; Li, Jiguo Report Mar 1, 2019 10509
Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service. Chen, Liqing; Li, Jiguo; Zhang, Yichen Report Mar 1, 2019 11957
Pairing Free Certificate Based Signcryption Schemes Using ECQV Implicit Certificates. Braeken, A. Report Mar 1, 2019 9107
A Probabilistic Test based Detection Scheme against Automated Attacks on Android In-app Billing Service. Kim, Heeyoul Report Mar 1, 2019 6049
Advanced insider threat detection model to apply periodic work atmosphere. Oh, Junhyoung; Kim, Tae Ho; Lee, Kyung Ho Report Mar 1, 2019 5510
A Secured and Energy Efficient Wireless Sensor Networks (WSN) Utilizing CRT-Based Forwarding Technique. Raji, Kamaldeen Ayodele; Gbolagade, Kazeem Alagbe Report Mar 1, 2019 5676
Kaspersky Lab: Sing Your Way to Security: Unique, Memorable Passwords Stronger Than Constant Change. Feb 5, 2019 769
A Relay-assisted Secure Handover Mechanism for High-speed Trains. Zhao, Yue; Tian, Bo; Chen, Zhouguo; Yang, Jin; Li, Saifei Report Feb 1, 2019 6364
Face Spoofing Attack Detection Using Spatial Frequency and Gradient-Based Descriptor. Ali, Zahid; Park, Unsang Report Feb 1, 2019 9289
An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography. Qiu, Shuming; Xu, Guosheng; Ahmad, Haseeb; Xu, Guoai; Qiu, Xinping; Xu, Hong Report Feb 1, 2019 11720
Lattice-based Threshold Ring Signature with Message Block Sharing. Chen, Jiangshan; Hu, Yupu; Gao, Wen; Liang, Hongmei Report Feb 1, 2019 8129
Reversible Data Hiding in Permutation-based Encrypted Images with Strong Privacy. Shiu, Chih-Wei; Chen, Yu-Chi; Hong, Wien Report Feb 1, 2019 7028
Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing. Zha, Jiningo; Xu, Chunxiang; Chen, Kefei Report Feb 1, 2019 11288
Image Encryption with The Cross Diffusion of Two Chaotic Maps. Jiao, Ge; Peng, Xiaojiang; Duan, Kaiwen Report Feb 1, 2019 5512
Robust Image Watermarking via Perceptual Structural Regularity-based JND Model. Wang, Chunxing; Xu, Meiling; Wan, Wenbo; Wang, Jian; Meng, Lili; Li, Jing; Sun, Jiande Report Feb 1, 2019 7842
Higher-Order Masking Scheme against DPA Attack in Practice: McEliece Cryptosystem Based on QD-MDPC Code. Han, Mu; Wang, Yunwen; Ma, Shidian; Wan, Ailan; Liu, Shuai Report Feb 1, 2019 8884
CoMP Transmission for Safeguarding Dense Heterogeneous Networks with Imperfect CSI. Yunjia, Xu; Kaizhi, Huang; Xin, Hu; Yi, Zou; Yajun, Chen; Wenyu, Jiang Report Jan 1, 2019 8414
Agent Based Information Security Framework for Hybrid Cloud Computing. Tariq, Muhammad Imran Report Jan 1, 2019 10931
Optimization-based Image Watermarking Algorithm Using a Maximum-Likelihood Decoding Scheme in the Complex Wavelet Domain. Liu, Jinhua; Rao, Yunbo Report Jan 1, 2019 7336
Improvement of Mitigation Techniques against SYN Flood Attack for Free and Open Source Firewalls. Kapis, Kosmas; Nico Kyando, Davis Jan 1, 2019 7359
A Behaviour Profiling Based Technique for Network Access Control Systems. Muhammad, Musa Abubakar; Ayesh, Aladdin Jan 1, 2019 5090
A FACE RECOGNITION AND GRAPHICAL PASSWORD BASED HYBRID TECHNIQUE OF INFORMATION SECURITY. Dec 31, 2018 3106
Experts warn of cyber attacks on smart cities and buildings. Dec 19, 2018 393
Zero-Knowledge Realization of Software-Defined Gateway in Fog Computing. Lin, Te-Yuan; Fuh, Chiou-Shann Report Dec 1, 2018 5176
Bayesian Rules Based Optimal Defense Strategies for Clustered WSNs. Zhou, Weiwei; Yu, Bin Report Dec 1, 2018 9607
Private Blockchain-Based Secure Access Control for Smart Home Systems. Xue, Jingting; Xu, Chunxiang; Zhang, Yuan Report Dec 1, 2018 9431
CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks. Yang, Chao; Guo, Yunfei; Hu, Hongchao; Liu, Wenyan Report Dec 1, 2018 10733
A Cache Privacy Protection Mechanism based on Dynamic Address Mapping in Named Data Networking. Zhu, Yi; Kang, Haohao; Huang, Ruhui Report Dec 1, 2018 6668
Medical Image Watermarking Based on Visual Secret Sharing and Cellular Automata Transform for Copyright Protection. Fan, Tzuo-Yau; Chao, Her-Chang; Chieu, Bin-Chang Report Dec 1, 2018 9725
Security based Partner Selection in Inter-Organizational Workflow Systems. Kandoussi, Asmaa El; Elbakkali, Hanan Report Dec 1, 2018 6704
State of the Art Intrusion Detection System for Cloud Computing. Ahmad, Azuan; Zainudin, Wan Shafiuddin; Kama, Mohd Nazri; Idris, Norbik Bashah; Saudi, Madihah Mohd; Report Dec 1, 2018 11606
Modified Multi-Level Steganography to Enhance Data Security. Elshare, Shadi; El-Emam, Nameer N. Report Dec 1, 2018 10417
Mobility of Internet of Things and Fog Computing: Concerns and Future Directions. Ahanger, Tariq Ahamed; Tariq, Usman; Nusir, Muneer Report Dec 1, 2018 3830
Energy Efficient Secured Cluster based Distributed Fault Diagnosis Protocol for IoT. Ara, Tabassum; Prabhkar, M.; Shah, Pritam Gajkumar Report Dec 1, 2018 5498
Node Activities Learning (NAL)Approach to Build Secure and Privacy-Preserving Routing in Wireless Sensor Networks. Rao, K. Ramesh; Rao, S.N. Tirumala; Reddy, P. Chenna Report Dec 1, 2018 4745
Seven-Step Cybersecurity Checklist. Nov 28, 2018 658
Why cyberdefenses are worth the cost: These tips can help not-for-profits and other organizations minimize the risk of potentially devastating data breaches. Shelhart, Mark Nov 1, 2018 2101
Intrusion Detection System Modeling Based on Learning from Network Traffic Data. Midzic, Admir; Avdagic, Zikrija; Omanovic, Samir Report Nov 1, 2018 8286
A Multi-level Perception Security Model Using Virtualization. Lou, Rui; Jiang, Liehui; Chang, Rui; Wang, Yisen Report Nov 1, 2018 9814
Pharming Out Data: A Proposal for Promoting Innovation and Public Health through a Hybrid Clinical Data Protection Scheme. Gulotta, Lea M. Nov 1, 2018 18405
Advanced approach to information security management system utilizing maturity models in critical infrastructure. You, Youngin; Oh, Junhyoung; Kim, Sooheon; Lee, Kyungho Report Oct 1, 2018 8834
Feature Selection Algorithms in Intrusion Detection System: A Survey. Maza, Sofiane; Touahria, Mohamed Report Oct 1, 2018 9685
Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption. Hu, Shengzhou; Li, Jiguo; Zhang, Yichen Report Oct 1, 2018 9193
Using weighted Support Vector Machine to address the imbalanced classes problem of Intrusion Detection System. Alabdallah, Alaeddin; Awad, Mohammed Report Oct 1, 2018 6808
Enhanced Network Intrusion Detection using Deep Convolutional Neural Networks. Naseer, Sheraz; Saleem, Yasir Report Oct 1, 2018 7928
An Improved Image Scrambling Algorithm Using {[2.sup.n] -1, [2.sup.n], [2.sup.n] +1}. Oyinloye, Damilare Peter; Gbolagade, Kazeem Alagbe Report Oct 1, 2018 3112
Development of Iris Biometric Template Security Using Steganography. Kayode, Saheed Y.; Olaniyi, Abdulsalam S.; Olaolu, Arowolo M.; Babatunde, Akinbowale N. Report Oct 1, 2018 1939
Practical IT security: Implementing a customer-centric approach to preventing and addressing network vulnerabilities. Nicefaro, Melissa Oct 1, 2018 583
Industrial Cyber Threats Assessed. Sep 10, 2018 1022
FTC: FIVE KEY PRINCIPLES TO A SOUND DATA SECURITY PROGRAM. Sep 1, 2018 104
Cancelable Fingerprint Features Using Chaff Points Encapsulation. Al-Tarawneh, Mokhled S. Report Sep 1, 2018 2936
Efficient Trajectory Data Privacy Protection Scheme Based on Laplace's Differential Privacy. Gut, Ke; Yang, Lihao; Liu, Yongzhi; Yin, Bo Report Sep 1, 2018 6803
Energy Efficiency Enhancement of TICK --based Fuzzy Logic for Selecting Forwarding Nodes in WSNs. Ashraf, Muhammad; Ho, Cho Tae Technical report Sep 1, 2018 8406
Disparity-based Error Concealment for Stereoscopic Images with Superpixel Segmentation. Zhang, Yizhang; Tang, Guijin; Liu, Xiaohua; Sun, Changming Technical report Sep 1, 2018 5207
Novel Robust High Dynamic Range Image Watermarking Algorithm Against Tone Mapping. Bai, Yongqiang; Jiang, Gangyi; Jiang, Hao; Yu, Mei; Chen, Fen; Zhu, Zhongjie Technical report Sep 1, 2018 10086
Copy-move Forgery Detection Robust to Various Transformation and Degradation Attacks. Deng, Jiehang; Yang, Jixiang; Weng, Shaowei; Gu, Guosheng; Li, Zheng Technical report Sep 1, 2018 7611
The fast image encryption algorithm based on substitution and diffusion. Zhang, Yong; Jia, Xiaoyang Technical report Sep 1, 2018 10251
HoneyThing: A New Honeypot Design for CPE Devices. Erdem, Omer; Pektas, Abdurrahman; Kara, Mehmet Technical report Sep 1, 2018 5912
Improved Conditional Differential Attacks on Round-Reduced Grain v1. Li, Jun-Zhi; Guan, Jie Technical report Sep 1, 2018 5739
Enhanced Knock Code Authentication with High Security and Improved Convenience. Jang, Yun-Hwan; Park, Yongsu Technical report Sep 1, 2018 6395
A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage. Zhao, Jining; Xu, Chunxiang; Chen, Kefei Technical report Sep 1, 2018 11089
Updated SSDP Scheme for DDoS Attack Defense. Huang, Haiou; Hu, Liang; Chu, Jianfeng Technical report Sep 1, 2018 5605
Cybersecurity Q&A. Finn, David Sep 1, 2018 1514
Survey and Analysis of Regional Characteristics of Unmanaged Stray IoT devices. Nakazawa, Yuki; Sasaki, Ryoichi; Inomata, Atsuo Report Sep 1, 2018 4058
Cloud Computing Service Level Agreement Issues and Challenges: A Bibliographic Review. Khan, Sohail Razi; Gouveia, Luis Borges Report Sep 1, 2018 10230
Application of RC4 Cryptography Method to Support XML Security on Digital Chain of Custody Data Storage. Widatama, Krisna; Prayudi, Yudi; Sugiantoro, Bambang Report Sep 1, 2018 3271
Data Mining Classification Approaches for Malicious Executable File Detection. Najadat, Hassan; Alhawari, Assem; Al_Rushdan, Huthifh Report Sep 1, 2018 2547
Secure Timing Advance Based Context-Aware Handover Protocol for Vehicular Ad-Hoc Heterogeneous Networks. Nyangaresi, Vincent Omollo; Abeka, Silvance O.; Rodgrigues, Anthony Report Sep 1, 2018 8017
Encryption and Tokenization-Based System for Credit Card Information Security. Iwasokun, Gabriel Babatunde; Omomule, Taiwo Gabriel; Akinyede, Raphael Olufemi Report Sep 1, 2018 5239
Identity-Based Encryption Technique with Ranking for Multi-Keywords Search in Cloud (IDERMKS). Turkson, Regina Esi; Liao, Yongjian; Baagyere, Edward Yeallakuor Report Sep 1, 2018 9146
Adaptive LSB Steganography Based on Chaos Theory and Random Distortion. Tutuncu, Kemal; Demirci, Baris Technical report Aug 1, 2018 7682
Defending Non-control-data Attacks using Influence Domain Monitoring. Zhang, Guimin; Li, Qingbao; Chen, Zhifeng; Zhang, Ping Technical report Aug 1, 2018 10311
Constructive Steganography by Tangles. Qian, Zhenxing; Pan, Lin; Huang, Nannan; Zhang, Xinpeng Technical report Aug 1, 2018 4842
A Moving Window Principal Components Analysis Based Anomaly Detection and Mitigation Approach in SDN Network. Wang, Mingxin; Zhou, Huachun; Chen, Jia Technical report Aug 1, 2018 8156
Developing an Intrusion Detection Framework for High-Speed Big Data Networks: A Comprehensive Approach. Siddique, Kamran; Akhtar, Zahid; Khan, Muhammad Ashfaq; Jung, Yong-Hwan; Kim, Yangwoo Technical report Aug 1, 2018 7250
Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System. Wahyudi, Bisyron; Ramli, Kalamullah; Murfi, Hendri Report Aug 1, 2018 7562
Functional Safety Engineers Responsible for Plant Security Need Help to Understand Cyber Security Regulations. Method Cyber Security Provides Specific Training.. Jul 31, 2018 242
Personal Encryption 101: A BEGINNER'S GUIDE TO PROTECTING YOUR MESSAGES, MASKING ONLINE MOVEMENTS, AND STEERING CLEAR OF DIGITAL SNOOPS. Brown, Elizabeth Nolan Jul 1, 2018 2578
THE ENEMY WITHIN. Brief article Jul 1, 2018 218
QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing. Liu, Guoxiu; Yang, Geng; Wang, Haiwei; Dai, Hua; Zhou, Qiang Report Jul 1, 2018 7171
Robust Digital Watermarking for High-definition Video using Steerable Pyramid Transform, Two Dimensional Fast Fourier Transform and Ensemble Position-based Error Correcting. Jin, Xun; Kim, JongWeon Report Jul 1, 2018 5119
Storage Feature-Based Watermarking Algorithm with Coordinate Values Preservation for Vector Line Data. Zhou, Qifei; Ren, Na; Zhu, Changqing; Tong, Deyu Report Jul 1, 2018 5694
Adaptive Gaussian Mechanism Based on Expected Data Utility under Conditional Filtering Noise. Liu, Hai; Wu, Zhenqiang; Peng, Changgen; Tian, Feng; Lu, Laifeng Report Jul 1, 2018 8183
A Comprehensive Survey of Security Related Challenges in Internet of Things. Ezema, E.; Abdullah, A.; Sani, N.F.M. Report Jul 1, 2018 3613
Clone of CAPTCHAs: The Human-Robot Test. Jun 29, 2018 470
A Pairing Free Secure Identity-based Aggregate Signature Scheme under Random Oracle. Abouelkheir, Eman; Tromp, Jolanda G. Report Jun 1, 2018 6208
Method of Early Staged Cyber Attacks Detection in IT and Telecommunication Networks. Japertas, Saulius; Baksys, Tautvydas Report Jun 1, 2018 7299
Application of Local Outlier Factor Algorithm to Detect Anomalies in Computer Network. Auskalnis, Juozas; Paulauskas, Nerijus; Baskys, Algirdas Report Jun 1, 2018 2994
THE FINE LINE BETWEEN IDENTIFIERS CAPABLE OF IDENTIFYING AND "IDENTIFIABLE INFORMATION". Popova, Aleksandra Jun 1, 2018 12200
Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction. Huang, Peng-Cheng; Li, Yung-Hui; Chang, Chin-Chen; Liu, Yanjun Report May 1, 2018 6451
A Robust and Adaptive Trust Management System for Guaranteeing the Availability in the Internet of Things Environments. Wu, Xu Report May 1, 2018 7519
Network Security Situation Assessment Method Based on Markov Game Model. Li, Xi; Lu, Yu; Liu, Sen; Nie, Wei Report May 1, 2018 4654
HACKS CAN WREAK HAVOC, CYBER EXPERTS WARN. Dobrian, Joseph May 1, 2018 2124
How CFOs Can Mitigate the Risk of Ransomware. Mehlman, Marc May 1, 2018 1407
Get a Handle on Network Security: School districts can boost network security using the micro-segmentation capabilities of VMware NSX. May 1, 2018 538
ORGANIZATIONS REPLACE ANTIVIRUS W/ BARKLY SOLUTION. May 1, 2018 437
How to insure against cyber attack at work; How can insurance help with the new data protection regulations? Lynne Noble, of Wilby Ltd, offers some advice. Apr 12, 2018 350
How to Address Medical Device Cyber Attacks. Apr 11, 2018 778
How to protect your data in a connected world. Apr 8, 2018 346
6 Steps to GDPR Implementation. Bauer, Danielle Apr 1, 2018 737
Protecting Personal Data When Traveling. Apr 1, 2018 382
Cybercriminals Switch to Impersonation Attacks. Apr 1, 2018 300
Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies. Thakur, Kutub; Shan, Juan; Pathan, Al-Sakib Khan Report Apr 1, 2018 7654
An Adaptive FLV Steganography Approach Using Simulated Annealing. Bawaneh, Mohammed J.; Obeidat, Atef Ahmed; Al-kofahi, Majd M. Report Apr 1, 2018 6774
Performance Analysis of SAP-NFC Protocol. Al-Fayoumi, Mustafa; Nashwan, Shadi Report Apr 1, 2018 4676
Private and Mobile Inter-Network Routing for Wireless Sensor Networks and Internet of Things. Saberi, Mohsen Report Apr 1, 2018 5932
A Novel and Low Processing Time ECG Security Method Suitable for Sensor Node Platforms. Jusak, Jusak; Mahmoud, Seedahmed S. Report Apr 1, 2018 7335
What Is the Eye in the Sky Actually Looking at and Who is Controlling It? An International Comparative Analysis on How to Fill the Cybersecurity and Privacy Gaps to Strengthen Existing U.S. Drone Laws. Urban, Jennifer Apr 1, 2018 20837
S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks. Almomani, Iman; Saadeh, Maha Report Apr 1, 2018 7528
Secure and Fine-grained Electricity Consumption Aggregation Scheme for Smart Grid. Shen, Gang; Su, Yixin; Zhang, Danhong; Zhang, Huajun; Xiong, Binyu; Zhang, Mingwu Report Apr 1, 2018 7519
Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services. Sija, Baraka D.; Shim, Kyu-Seok; Kim, Myung-Sup Report Apr 1, 2018 8238
A Biometric-based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks. Chen, Ying; Ge, Yangming; Wang, Wenyuan; Yang, Fengyu Report Apr 1, 2018 9052
A Secure Encryption-Based Malware Detection System. Lin, Zhaowen; Xiao, Fei; Sun, Yi; Ma, Yan; Xing, Cong-Cong; Huang, Jun Report Apr 1, 2018 7347
Compression Method for IPSec over 6LoWPAN. Wang, Huqing; Sun, Zhixin Report Apr 1, 2018 4293
A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability. Lin, Guofeng; You, Lirong; Hu, Bing; Hong, Hanshu; Sun, Zhixin Report Apr 1, 2018 10313
A research study: Usage of RC4 stream cipher in SSL configurations of web servers used by Sri Lankan Financial Institutes. Weerasinghe, T.D.B; Disanayake, Chamara Case study Apr 1, 2018 3753
Utilization of Statistical Control Charts for DoS Network Intrusion Detection. Sklavounos, Dimitris; Edoh, Aloysius; Paraskevopoulos, George Report Apr 1, 2018 4874
A New Scheme to Secure Communication and Data, based on the Integration of Cryptography and Steganography. Dehkordi, Massoud Hadian; Asgari, Amin; Moradian, Ali Report Apr 1, 2018 2951
A Naive Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection Attack. Olalere, Morufu; Egigogo, Raji Abdullahi; Joseph, A. Ojeniyi; Idris, Ismaila; Jimoh, Rasheed Gbenga Report Apr 1, 2018 4839
Development of Protective Scheme against Collaborative Black Hole Attacks in Mobile Ad hoc Networks. Farooq, Muhammad Umar; Wang, Xingfu; Sajjad, Moizza; Qaisar, Sara Report Mar 1, 2018 6227
OC RELEASES DATA PROTECTION GUIDELINES. Brief article Feb 1, 2018 198
A New Fine-grain SMS Corpus and Its Corresponding Classifier Using Probabilistic Topic Model. Ma, Jialin; Zhang, Yongjun; Wang, Zhijian; Chen, Bolun Report Feb 1, 2018 7556
Structure and Challenges of a Security Policy on Small and Medium Enterprises. Almeida, Fernando; Carvalho, Ines; Cruz, Fabio Report Feb 1, 2018 7294
New Public Key Encryption with Equality Test Based on non-Abelian Factorization Problems. Zhu, Huijun; Wang, Licheng; Qiu, Shuming; Niu, Xinxin Report Feb 1, 2018 6930
Auto-configurable Security Mechanism for NFV. Kim, HyunJin; Park, PyungKoo; Ryou, Jaecheol Report Feb 1, 2018 3904
A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments. Ra, Gyeong-Jin; Lee, Im-Yeong Report Feb 1, 2018 5047
System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats. Choi, Seul-Ki; Yang, Chung-Huang; Kwak, Jin Report Feb 1, 2018 3649
Secure Multicast using Proxy Re-Encryption in an IoT Environment. Kim, SuHyun; Hwang, YongWoon; Seo, JungTaek Report Feb 1, 2018 3895
A Reliable Secure Storage Cloud and Data Migration Based on Erasure Code. Mugisha, Emmy; Zhang, Gongxuan Report Jan 1, 2018 7413
Android malicious code Classification using Deep Belief Network. Shiqi, Luo; Shengwei, Tian; Long, Yu; Jiong, Yu; Hua, Sun Report Jan 1, 2018 7432
Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network. Li, Wei; Liao, Linfeng; Gu, Dawu; Ge, Chenyu; Gao, Zhiyong; Zhou, Zhihong; Guo, Zheng; Liu, Ya; Liu, Report Jan 1, 2018 9123
Fully Homomorphic Encryption Based On the Parallel Computing. Tan, Delin; Wang, Huajun Report Jan 1, 2018 8591
Host Feasibility Investigation to Improve Robustness in Hybrid DWT+SVD Based Image Watermarking Schemes. Araghi, Tanya Koohpayeh; Manaf, Azizah Abd; Alarood, Ala; Zainol, Azida Binti Report Jan 1, 2018 5874
Image Hashing for Tamper Detection with Multiview Embedding and Perceptual Saliency. Du, Ling; Chen, Zhen; Ke, Yongzhen Report Jan 1, 2018 6405
Digital Image Steganography Using Eight-Directional PVD against RS Analysis and PDH Analysis. Swain, Gandharba Report Jan 1, 2018 5353
An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks. Alouneh, Sahel; Al-Hawari, Feras; Hababeh, Ismail; Ghinea, Gheorghita Jan 1, 2018 5534
Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis. Hu, Hao; Liu, Yuling; Zhang, Hongqi; Zhang, Yuchen Jan 1, 2018 8505
An Approach for Internal Network Security Metric Based on Attack Probability. Shan, Chun; Jiang, Benfu; Xue, Jingfeng; Guan, Fang; Xiao, Na Jan 1, 2018 6394
Double Cache Approach with Wireless Technology for Preserving User Privacy. Sen, Adnan A. Abi; Eassa, Fathy B.; Yamin, Mohammad; Jambi, Kamal Jan 1, 2018 7141
A Security Monitoring Method Based on Autonomic Computing for the Cloud Platform. Zhang, Jingjie; Wu, Qingtao; Zheng, Ruijuan; Zhu, Junlong; Zhang, Mingchuan; Liu, Ruoshui Jan 1, 2018 6079

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters |