Acm Transactions On Privacy And Security

Acm Transactions On Privacy And Security

Acm 隐私和安全事务

  • 4区 中科院分区
  • Q2 JCR分区

高引用文章

文章名称 引用次数
Scalable Private Set Intersection Based on OT Extension 14
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version) 11
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps 10
A Close Look at a Daily Dataset of Malware Samples 4
VULCON: A System for Vulnerability Prioritization, Mitigation, and Management 4
The Password Life Cycle 4
Attribute Inference Attacks in Online Social Networks 3
A Video-based Attack for Android Pattern Lock 3
FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries 3
Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records 3
A General Framework for Adversarial Examples with Objectives 2
Database Audit Workload Prioritization via Game Theory 2
Abstract Non-Interference: A Unifying Framework for Weakening Information-flow 2
Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing 2
Introducing the Temporal Dimension to Memory Forensics 2
Server Location Verification (SLV) and Server Location Pinning: Augmenting TLS Authentication 2
Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach 2
Security Evaluation of a Banking Fraud Analysis System 1
Verifiable Graph Processing 1
Enhancing Branch Monitoring for Security Purposes: From Control Flow Integrity to Malware Analysis and Debugging 1
Utilizing Performance Counters for Compromising Public Key Ciphers 1
ANCHOR: Logically Centralized Security for Software-Defined Networks 1
A Usability Study of Four Secure Email Tools Using Paired Participants 1
Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication 1
KIST: Kernel-Informed Socket Transport for Tor 1
Alpha-Beta Privacy 1
Characterizing the Security of the SMS Ecosystem with Public Gateways 0
Kernel Protection Against Just-In-Time Code Reuse 0
ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack 0
Will They Use It or Not? Investigating Software Developers' Intention to Follow Privacy Engineering Methodologies 0
Skype & Type: Keyboard Eavesdropping in Voice-over-IP 0
Resilient Privacy Protection for Location-Based Services through Decentralization 0
Malicious Overtones: Hunting Data Theft in the Frequency Domain with One-class Learning 0
Analytical Models for the Scalability of Dynamic Group-key Agreement Protocols and Secure File Sharing Systems 0
GPLADD: Quantifying Trust in Government and Commercial Systems A Game-Theoretic Approach 0
DADS Decentralized Attestation for Device Swarms 0
Safe and Efficient Implementation of a Security System on ARM using Intra-level Privilege Separation 0
Using Episodic Memory for User Authentication 0
GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes 0
Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler 0
FIMCE: A Fully Isolated Micro-Computing Environment for Multicore Systems 0
Data Usage Control for Distributed Systems 0
Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption 0
Handling Anti-Virtual Machine Techniques in Malicious Software 0