-
1
-
-
84897913321
-
A survey of emerging threats in cybersecurity
-
Julian, J.-J.; Nepal, S. A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 2014, 80, 973-993.
-
(2014)
J. Comput. Syst. Sci
, vol.80
, pp. 973-993
-
-
Julian, J.-J.1
Nepal, S.2
-
2
-
-
84919672677
-
ColShield: An effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks
-
Jingle, I.D.J.; Rajsingh, E.B. ColShield: An effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks. Hum.-Centric Comput. Inf. Sci. 2014, 8, doi:10.1186/s13673-014-0008-8.
-
(2014)
Hum.-Centric Comput. Inf. Sci
, vol.8
-
-
Jingle, I.D.J.1
Rajsingh, E.B.2
-
3
-
-
84881544095
-
Dynamical analysis and control strategies on malware propagation model
-
Feng, L.; Liao, X.; Han, Q.; Li, H. Dynamical analysis and control strategies on malware propagation model. Appl. Math. Model. 2013, 37, 8225-8236.
-
(2013)
Appl. Math. Model
, vol.37
, pp. 8225-8236
-
-
Feng, L.1
Liao, X.2
Han, Q.3
Li, H.4
-
4
-
-
84882991772
-
Adaptive cross-device gait recognition using a mobile accelerometer
-
Hoang, T.; Nguyen, T.; Luong, C.; Do, S.; Choi, D. Adaptive cross-device gait recognition using a mobile accelerometer. J. Inf. Process. Syst. 2013, 9, 333-348.
-
(2013)
J. Inf. Process. Syst
, vol.9
, pp. 333-348
-
-
Hoang, T.1
Nguyen, T.2
Luong, C.3
Do, S.4
Choi, D.5
-
5
-
-
84891879473
-
Capturing the interplay between malware and anti-malware in a computer network
-
Misra, A.K.; Verma, M.; Sharma, A. Capturing the interplay between malware and anti-malware in a computer network. Appl. Math. Comput. 2014, 229, 340-349.
-
(2014)
Appl. Math. Comput
, vol.229
, pp. 340-349
-
-
Misra, A.K.1
Verma, M.2
Sharma, A.3
-
6
-
-
84890012703
-
An advanced persistent threat in 3G networks: Attacking the home network from roaming networks
-
Xenakis, C.; Ntantogian, C. An advanced persistent threat in 3G networks: Attacking the home network from roaming networks. Comput. Secur. 2014, 40, 84-94.
-
(2014)
Comput. Secur
, vol.40
, pp. 84-94
-
-
Xenakis, C.1
Ntantogian, C.2
-
7
-
-
84881445333
-
Malicious data leak prevention and purposeful evasion attacks: An approach to Advanced Persistent Threat (APT) management
-
Communications and Photonics Conference (SIECPC), Riyadh, Saudi Arabia, 27-30 April
-
Mustafa, T. Malicious data leak prevention and purposeful evasion attacks: An approach to Advanced Persistent Threat (APT) management. In Proceedings of the Saudi International Electronics, Communications and Photonics Conference (SIECPC), Riyadh, Saudi Arabia, 27-30 April 2013; pp. 1-5.
-
(2013)
Proceedings of the Saudi International Electronics
, pp. 1-5
-
-
Mustafa, T.1
-
8
-
-
84880591959
-
ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences
-
Lu, H.; Wang, X.; Zhao, B.; Wang, F.; Su, J. ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences. Math. Comput. Model. 2013, 58, 1140-1154.
-
(2013)
Math. Comput. Model
, vol.58
, pp. 1140-1154
-
-
Lu, H.1
Wang, X.2
Zhao, B.3
Wang, F.4
Su, J.5
-
9
-
-
84885665087
-
Malware detection by prunng of parallel ensembles using harmony Search
-
Sheen, S.; Anitha, R.; Sirisha, P. Malware detection by prunng of parallel ensembles using harmony Search. Pattern Recognit. Lett. 2013, 34, 1140-1154.
-
(2013)
Pattern Recognit. Lett
, vol.34
, pp. 1140-1154
-
-
Sheen, S.1
Anitha, R.2
Sirisha, P.3
-
10
-
-
84870696413
-
A survey of intrusion detection techniques in Cloud
-
Modi, C.; Patel, D.; Borisaniya, B.; Patel, H.; Patel, A.; Rajarajan, M. A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 2013, 36, 42-57.
-
(2013)
J. Netw. Comput. Appl
, vol.36
, pp. 42-57
-
-
Modi, C.1
Patel, D.2
Borisaniya, B.3
Patel, H.4
Patel, A.5
Rajarajan, M.6
-
11
-
-
84873654731
-
Homomorphic subspace MAC scheme for secure network coding
-
Liu, G.; Wang, X. Homomorphic subspace MAC scheme for secure network coding. ETRI J. 2013, 35, 173-176.
-
(2013)
ETRI J
, vol.35
, pp. 173-176
-
-
Liu, G.1
Wang, X.2
-
12
-
-
84897691229
-
A distributed implementation algorithm for physical layer security based on untrusted relay cooperation and artificial noise
-
Li, X.; Wang, X.; Xu, X.; Jin, L. A distributed implementation algorithm for physical layer security based on untrusted relay cooperation and artificial noise. ETRI J. 2014, 36, 183-186.
-
(2014)
ETRI J
, vol.36
, pp. 183-186
-
-
Li, X.1
Wang, X.2
Xu, X.3
Jin, L.4
-
13
-
-
84874105145
-
Opcode sequences as representation of executables for data-mining-based unknown malware detection
-
Santos, I.; Brezo, F.; Ugarte-Pedrero, X.; Bringas, P.G. Opcode sequences as representation of executables for data-mining-based unknown malware detection. Inf. Sci. 2013, 231, 64-82.
-
(2013)
Inf. Sci
, vol.231
, pp. 64-82
-
-
Santos, I.1
Brezo, F.2
Ugarte-Pedrero, X.3
Bringas, P.G.4
-
14
-
-
84907246293
-
SmSD:A smart secure deletion scheme for SSDs
-
Qin, Y.; Tong, W.; Liu, J.; Zhu, Z. SmSD:A smart secure deletion scheme for SSDs. J. Converg. 2013, 4, 30-35.
-
(2013)
J. Converg
, vol.4
, pp. 30-35
-
-
Qin, Y.1
Tong, W.2
Liu, J.3
Zhu, Z.4
-
15
-
-
84888873413
-
Deriving common malware behavior through graph clustering
-
Younghee, P.; Reeves, D.S.; Stamp, M. Deriving common malware behavior through graph clustering. Comput. Secur. 2012, 39, 419-430.
-
(2012)
Comput. Secur
, vol.39
, pp. 419-430
-
-
Younghee, P.1
Reeves, D.S.2
Stamp, M.3
-
16
-
-
84893457491
-
Analyzing malware by abstracting the frequent itemsets in API call sequences
-
Security and Privacy in Computing and Communications (TrustCom), Victoria, Australia, 16-18 July
-
Yong, Q.; He, J.; Yang, Y.; Ji, L. Analyzing malware by abstracting the frequent itemsets in API call sequences. In Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Victoria, Australia, 16-18 July 2013; pp. 265-270.
-
(2013)
Proceedings of the 12th IEEE International Conference on Trust
, pp. 265-270
-
-
Yong, Q.1
He, J.2
Yang, Y.3
Ji, L.4
-
17
-
-
84908650111
-
An efficient trojan horse classification (ETC), IJCSI
-
Abuzaid, A.M.; Saudi, M.M.; Taib, B.M.; Zul Hilmi, A. An efficient trojan horse classification (ETC), IJCSI. Int. J. Comput. Sci. Issues 2013, 10, 96-103.
-
(2013)
Int. J. Comput. Sci. Issues
, vol.10
, pp. 96-103
-
-
Abuzaid, A.M.1
Saudi, M.M.2
Taib, B.M.3
Zul Hilmi, A.4
-
18
-
-
84899704421
-
Novel active learning methods for enhanced PC malware detection in windows OS
-
Nissim, N.; Moskovitch, R.; Rokach, L.; Elovici, Y. Novel active learning methods for enhanced PC malware detection in windows OS. Expert Syst. Appl. 2014, 41, 5843-5857.
-
(2014)
Expert Syst. Appl
, vol.41
, pp. 5843-5857
-
-
Nissim, N.1
Moskovitch, R.2
Rokach, L.3
Elovici, Y.4
-
19
-
-
84941119796
-
Artificial neuro fuzzy logic system for detecting human emotions
-
Malkawi, M.; Murad, O. Artificial neuro fuzzy logic system for detecting human emotions. Hum.-Centric Comput. Inf. Sci. 2013, doi:10.1186/2192-1962-3-3.
-
(2013)
Hum.-Centric Comput. Inf. Sci
-
-
Malkawi, M.1
Murad, O.2
-
20
-
-
84892146546
-
Simple fuzzy rule based edge detection
-
Verma, O.P.; Jain, V.; Gumber, R. Simple fuzzy rule based edge detection. J. Inf. Process. Syst. 2013, 9, 575-591.
-
(2013)
J. Inf. Process. Syst
, vol.9
, pp. 575-591
-
-
Verma, O.P.1
Jain, V.2
Gumber, R.3
-
21
-
-
84899409344
-
Data and infrastructure security auditing in cloud computing environments
-
Rasheed, H. Data and infrastructure security auditing in cloud computing environments. Int. J. Inf. Manag. 2014, 34, 364-368.
-
(2014)
Int. J. Inf. Manag
, vol.34
, pp. 364-368
-
-
Rasheed, H.1
-
22
-
-
84902656369
-
Classification of security threats in information systems
-
Hasselt, Belgium, 2-5 June
-
Jouini, M.; Rabai, L.B.A.; Aissa, A.B. Classification of security threats in information systems. In Proceedings of the 5th International Conference on Ambient Systems, Networks and Technologies (ANT-2014) Procedia Computer Science, Hasselt, Belgium, 2-5 June 2014; pp. 489-496.
-
(2014)
Proceedings of the 5th International Conference on Ambient Systems, Networks and Technologies (ANT-2014) Procedia Computer Science
, pp. 489-496
-
-
Jouini, M.1
Rabai, L.B.A.2
Aissa, A.B.3
|