Asymmetric subversion attacks on signature and identification schemes | 0 | 0.34 | 2022 |
Game of Hide-and-Seek: Exposing Hidden Interfaces in Embedded Web Applications of IoT Devices | 0 | 0.34 | 2022 |
The Design and Implementation of an Efficient Quaternary Network Flow Watermark Technology. | 0 | 0.34 | 2021 |
Demo Abstract: AutoPCT: An Agile Protocol Conformance Automatic Test Platform Based on Editable EFSM | 0 | 0.34 | 2020 |
A Practical Authentication Framework for VANETs. | 0 | 0.34 | 2019 |
An Improved K-means Algorithm for Test Case Optimization | 0 | 0.34 | 2019 |
An Improved Sequence Alignment Method for Fuzzing | 0 | 0.34 | 2019 |
Crash Analysis Mechanisms in Vulnerability Mining Research | 0 | 0.34 | 2019 |
Automated Vulnerability Detection in Embedded Devices. | 0 | 0.34 | 2018 |
Network Control For Large-Scale Container Clusters | 0 | 0.34 | 2018 |
Software Defined Routing System | 0 | 0.34 | 2017 |
A keyed-hashing based self-synchronization mechanism for port address hopping communication. | 1 | 0.36 | 2017 |
Automatic malware classification and new malware detection using machine learning. | 2 | 0.38 | 2017 |
POSTER: BGPCoin: A Trustworthy Blockchain-based Resource Management Solution for BGP Security. | 0 | 0.34 | 2017 |
RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries | 0 | 0.34 | 2015 |
Malware Clustering Based on SNN Density Using System Calls. | 0 | 0.34 | 2015 |
An Energy-Aware Task Scheduling Algorithm for a Heterogeneous Data Center | 0 | 0.34 | 2013 |