| Talos: no more ransomware victims with formal methods |
9 |
| Structural analysis and detection of android botnets using machine learning techniques |
8 |
| A pairing-based cryptographic approach for data security in the cloud |
7 |
| Integrity-verifiable conjunctive keyword searchable encryption in cloud storage |
7 |
| A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework, CURF |
6 |
| Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model |
5 |
| Double-spending prevention for Bitcoin zero-confirmation transactions |
5 |
| Stealing PINs via mobile sensors: actual risk versus user perception |
4 |
| Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts |
4 |
| SpyDetector: An approach for detecting side-channel attacks at runtime |
4 |
| Dynamic searchable symmetric encryption for storing geospatial data in the cloud |
4 |
| Provably secure public-key encryption with conjunctive and subset keyword search |
4 |
| Leveraging cyber threat intelligence for a dynamic risk framework |
3 |
| Hydras and IPFS: a decentralised playground for malware |
3 |
| Scalable non-deterministic clustering-based k-anonymization for rich networks |
3 |
| Anonymous subject identification and privacy information management in video surveillance |
2 |
| A methodology to measure and monitor level of operational effectiveness of a CSOC |
2 |
| Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures |
2 |
| Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes |
2 |
| ZombieCoin 2.0: managing next-generation botnets using Bitcoin |
2 |
| A methodology for ensuring fair allocation of CSOC effort for alert investigation |
2 |
| Analyzing XACML policies using answer set programming |
2 |
| Dynamic malware detection and phylogeny analysis using process mining |
2 |
| Threshold privacy-preserving cloud auditing with multiple uploaders |
2 |
| Secure pattern matching based on bit parallelism: Non-interactive protocols for non-deterministic string matching automata evaluation |
2 |
| Encouraging users to improve password security and memorability |
2 |
| DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation |
2 |
| Design and implementation of Negative Authentication System |
2 |
| Practical homomorphic encryption over the integers for secure computation in the cloud |
2 |
| SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications |
1 |
| Signature schemes with a fuzzy private key |
1 |
| Differential audio analysis: a new side-channel attack on PIN pads |
1 |
| Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications |
1 |
| DOMtegrity: ensuring web page integrity against malicious browser extensions |
1 |
| Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols |
1 |
| On practical privacy-preserving fault-tolerant data aggregation |
1 |
| Keyword-based private searching on cloud data along with keyword association and dissociation using cuckoo filter |
1 |
| Lattice-based deniable ring signatures |
1 |
| When time meets test |
1 |
| Supervised machine learning using encrypted training data |
1 |
| Efficient revocable hierarchical identity-based encryption using cryptographic accumulators |
1 |
| Enhanced Tacit Secrets: System-assigned passwords you can't write down, but don't need to |
1 |
| Multi-device anonymous authentication |
1 |
| Mobile botnets meet social networks: design and analysis of a new type of botnet |
1 |
| You click, I steal: analyzing and detecting click hijacking attacks in web pages |
1 |
| SSPFA: effective stack smashing protection for Android OS |
1 |
| Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications |
1 |
| Privacy-preserving smart metering revisited |
1 |
| Outsourced pattern matching |
1 |
| Using targeted Bayesian network learning for suspect identification in communication networks |
1 |