GraphShield: Dynamic Large Graphs for Secure Queries With Forward Privacy | 0 | 0.34 | 2022 |
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation | 1 | 0.35 | 2022 |
Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM | 2 | 0.36 | 2022 |
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet | 0 | 0.34 | 2022 |
ProMT: optimizing integrity tree updates for write-intensive pages in secure NVMs | 4 | 0.40 | 2021 |
Automated Privacy Policy Annotation with Information Highlighting Made Practical Using Deep Representations | 0 | 0.34 | 2021 |
Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey | 5 | 0.42 | 2021 |
SSD-Assisted Ransomware Detection and Data Recovery Techniques | 2 | 0.38 | 2021 |
Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality | 0 | 0.34 | 2021 |
SyncAttack: Double-spending in Bitcoin Without Mining Power | 0 | 0.34 | 2021 |
Exploring the Attack Surface of Blockchain: A Comprehensive Survey | 10 | 0.52 | 2020 |
Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications | 0 | 0.34 | 2020 |
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers | 3 | 0.40 | 2020 |
Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation | 0 | 0.34 | 2020 |
Assessing the Effectiveness of Pulsing Denial of Service Attacks under Realistic Network Synchronization Assumptions | 0 | 0.34 | 2020 |
Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions. | 1 | 0.35 | 2020 |
Examining Adversarial Learning against Graph-based IoT Malware Detection Systems. | 0 | 0.34 | 2019 |
Examining the Security of DDoS Detection Systems in Software Defined Networks. | 1 | 0.35 | 2019 |
BlockTrail: A Scalable Multichain Solution for Blockchain-based Audit Trails | 0 | 0.34 | 2019 |
Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms | 0 | 0.34 | 2019 |
Pricing Data Tampering in Automated Fare Collection with NFC-equipped Smartphones | 1 | 0.37 | 2019 |
Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers | 2 | 0.41 | 2019 |
Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking | 0 | 0.34 | 2019 |
Thriving on chaos: Proactive detection of command and control domains in internet of things‐scale botnets using DRIFT | 1 | 0.36 | 2019 |
Analyzing Endpoints in the Internet of Things Malware. | 0 | 0.34 | 2019 |
Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network. | 0 | 0.34 | 2019 |
Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach. | 0 | 0.34 | 2019 |
Analyzing And Detecting Emerging Internet Of Things Malware: A Graph-Based Approach | 3 | 0.37 | 2019 |
Breaking graph-based IoT malware detection systems using adversarial examples: poster | 0 | 0.34 | 2019 |
Secure and transparent audit logs with . | 0 | 0.34 | 2019 |
Fighting Fake News Propagation with Blockchains | 1 | 0.35 | 2019 |
Two-Stage Iot Device Scheduling With Dynamic Programming For Energy Internet Systems | 0 | 0.34 | 2019 |
Countering Selfish Mining In Blockchains | 1 | 0.37 | 2019 |
IoT malware ecosystem in the wild - a glimpse into analysis and exposures. | 1 | 0.36 | 2019 |
Analyzing endpoints in the internet of things malware: poster | 0 | 0.34 | 2019 |
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering. | 0 | 0.34 | 2019 |
Subgraph-Based Adversarial Examples Against Graph-Based Iot Malware Detection Systems | 2 | 0.35 | 2019 |
Cyber Deception In The Internet Of Battlefield Things: Techniques, Instances, And Assessments | 0 | 0.34 | 2019 |
RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing | 3 | 0.42 | 2019 |
SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery | 5 | 0.51 | 2018 |
Interference-Aware Adaptive Beam Alignment for Hyper-Dense IEEE 802.11ax Internet-of-Things Networks. | 0 | 0.34 | 2018 |
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks. | 4 | 0.41 | 2018 |
Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions. | 0 | 0.34 | 2018 |
Shmcaffe: A Distributed Deep Learning Platform With Shared Memory Buffer For Hpc Architecture | 0 | 0.34 | 2018 |
Defending Internet of Things Against Malicious Domain Names using D-FENS | 0 | 0.34 | 2018 |
Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks. | 1 | 0.35 | 2018 |
POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions. | 0 | 0.34 | 2018 |
XMSS: eXtended Merkle Signature Scheme. | 0 | 0.34 | 2018 |
Poster: Android Malware Detection using Multi-Flows and API Patterns. | 2 | 0.36 | 2017 |
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones | 11 | 0.55 | 2017 |