1939-0114
Volume 2019, 2019
Compact Implementations of HIGHT Block Cipher on IoT Platforms.

Bohun Kim Junghoon Cho Byungjun Choi Jongsun Park Hwajeong Seo

A Novel Framework to Classify Malware in MIPS Architecture-Based IoT Devices.

Tran Nghi Phu Kien Hoang Dang Dung Ngo Quoc Nguyen Dai Tho Nguyen Ngoc Binh

QoS3: Secure Caching in HTTPS Based on Fine-Grained Trust Delegation.

Abdulrahman Al-Dailami Chang Ruan Zhihong Bao Tao Zhang

A Bayesian Classification Intrusion Detection Method Based on the Fusion of PCA and LDA.

Zhidong Shen Yuhao Zhang Weiying Chen

Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge Processing.

Jianping Zeng Shuang Wu Yanyu Chen Rui Zeng Chengrong Wu

polarRLCE: A New Code-Based Cryptosystem Using Polar Codes.

Jingang Liu Yongge Wang Zongxiang Yi Zhiqiang Lin

An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy.

Lin Li Chin-Chen Chang Hefeng Chen

Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning.

Yuchen Zhang Jing Liu

CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis.

Mee Lan Han Byung Il Kwak Huy Kang Kim

F2P-ABS: A Fast and Secure Attribute-Based Signature for Mobile Platforms.

Guofeng Lin Yunhao Xia Chun Ying Zhixin Sun

Cryptanalysis of the Lightweight Block Cipher BORON.

Huicong Liang Meiqin Wang

Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard.

Aysha Shabbir Maryam Shabbir Muhammad Rizwan Fahad Ahmad

A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks.

Jiaqing Mo Hang Chen

Industrial Control Intrusion Detection Approach Based on Multiclassification GoogLeNet-LSTM Model.

Ankang Chu Yingxu Lai Jing Liu

A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks.

Quanrun Li Ching-Fang Hsu Kim-Kwang Raymond Choo Debiao He

AI-Driven Cyber Security Analytics and Privacy Protection.

Jiageng Chen Chunhua Su Zheng Yan

Construction of New S-Box Using Action of Quotient of the Modular Group for Multimedia Security.

Imran Shahzad Qaiser Mushtaq Abdul Razaq

Novel Meaningful Image Encryption Based on Block Compressive Sensing.

Chen Pan Guodong Ye Xiaoling Huang Junwei Zhou

Active Defense Strategy Selection Method Based on Two-Way Signaling Game.

Xiaohu Liu Hengwei Zhang Yuchen Zhang Lulu Shao Jihong Han

Detection of Trojaning Attack on Neural Networks via Cost of Sample Classification.

Hui Gao Yunfang Chen Wei Zhang

Estimating the Relative Speed of RF Jammers in VANETs.

Dimitrios Kosmanos Antonios Argyriou Leandros A. Maglaras

Session-Based Webshell Detection Using Machine Learning in Web Logs.

Yixin Wu Yuqiang Sun Cheng Huang Peng Jia Luping Liu

Design of Intrusion Detection and Prevention in SCADA System for the Detection of Bias Injection Attacks.

R. B. Benisha S. Raja Ratna

Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping.

Lin Ding Lei Wang Dawu Gu Chenhui Jin Jie Guan

MWPoW: Multiple Winners Proof of Work Protocol, a Decentralisation Strengthened Fast-Confirm Blockchain Protocol.

Yibin Xu Yangyu Huang

Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments.

Marwan Ali Albahar

Physical Layer Security in Nonorthogonal Multiple Access Wireless Network with Jammer Selection.

Langtao Hu Xin Zheng Chunsheng Chen

Enhancing Modbus-RTU Communications for Smart Metering in Building Energy Management Systems.

Claudio Urrea Claudio Morales

Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions.

Ignazio Pedone Antonio Lioy Fulvio Valenza

Analysis of DES Plaintext Recovery Based on BP Neural Network.

Sijie Fan Yaqun Zhao

A Novel Three-Layer QR Code Based on Secret Sharing Scheme and Liner Code.

Bin Yu Zhengxin Fu Sijia Liu

Evaluation of Deep Learning Methods Efficiency for Malicious and Benign System Calls Classification on the AWSCTD.

Dainius Ceponis Nikolaj Goranin

An API Semantics-Aware Malware Detection Method Based on Deep Learning.

Xin Ma Shize Guo Wei Bai Jun Chen Shiming Xia Zhisong Pan

Using XGBoost to Discover Infected Hosts Based on HTTP Traffic.

Weina Niu Ting Li Xiaosong Zhang Teng Hu Tianyu Jiang Heng Wu

SNI: Supervised Anonymization Technique to Publish Social Networks Having Multiple Sensitive Labels.

A. Karimi Rizi Mohammad Naderi Dehkordi N. Nemat bakhsh

An Indistinguishably Secure Function Encryption Scheme.

Ping Zhang Yamin Li Muhua Liu

Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface.

Dong Wang Xiaosong Zhang Ting Chen Jingwei Li

Laplace Input and Output Perturbation for Differentially Private Principal Components Analysis.

Yahong Xu Geng Yang Shuangjie Bai

A Novel Construction of Constrained Verifiable Random Functions.

Muhua Liu Ping Zhang Qingtao Wu

Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images.

Pyung-Han Kim Eun-Jun Yoon Kwan-Woo Ryu Ki-Hyun Jung

SSLDetecter: Detecting SSL Security Vulnerabilities of Android Applications Based on a Novel Automatic Traversal Method.

Junwei Tang Jingjing Li Ruixuan Li Hongmu Han Xiwu Gu Zhiyong Xu

CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs.

Yi Zhao Kaitai Liang Bo Yang Liqun Chen

A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition.

Shuaiwei Zhang Xiaoyuan Yang Lin Chen Weidong Zhong

Optimistic Fair Exchange in Cloud-Assisted Cyber-Physical Systems.

Jun Wang Feixiang Luo Zequan Zhou Xiling Luo Zhen Wang

An Analysis of DDoS Attacks on the Instant Messengers.

Mohammad Faisal Sohail Abbas Haseeb Ur Rahman Muhammad Zahid Khan Arif Ur Rahman

Corrigendum to "Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment".

Rameez Asif William J. Buchanan

VPN Traffic Detection in SSL-Protected Channel.

Muhammad Zain ul Abideen Shahzad Saleem Madiha Ejaz

PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks.

Weiping Wang Feng Zhang Xi Luo Shigeng Zhang

Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs.

Jiaye Pan Yi Zhuang Binglin Sun

A Blockchain-Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem.

Konstantinos Rantos George Drosatos Antonios Kritsas Christos Ilioudis Alexandros Papanikolaou Adam P. Filippidis

Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data.

Hefeng Chen Hsiao-Ling Wu Chin-Chen Chang Long-Sheng Chen

A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms.

Baek Kyung Song Joon Soo Yoo Miyeon Hong Ji Won Yoon

All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis.

Mi-Jung Choi Jiwon Bang Jongwook Kim Hajin Kim Yang-Sae Moon

An Active Controller Selection Scheme for Minimizing Packet-In Processing Latency in SDN.

Haisheng Yu Keqiu Li Heng Qi

Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning.

Francisco Sales de Lima Filho Frederico Augusto Fernandes Silveira Agostinho de Medeiros Brito Júnior Genoveva Vargas-Solar Luiz Felipe Q. Silveira

Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation.

En Zhang Jun-Zhe Zhu Gong-Li Li Jian Chang Yu Li

Multidivisible Online/Offline Cryptography and Its Application to Signcryptions.

Dan Yamamoto Wakaha Ogata

Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis.

Daegeon Kim Huy Kang Kim

LTE Phone Number Catcher: A Practical Attack against Mobile Privacy.

Chuan Yu Shuhui Chen Zhiping Cai

An Object Proxy-Based Dynamic Layer Replacement to Protect IoMT Applications.

Bo Han Yinliang Zhao Changpeng Zhu

Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network.

Yingxu Lai Jingwen Zhang Zenghui Liu

Privacy Protection of Social Networks Based on Classified Attribute Encryption.

Lin Zhang Li Li Eric Medwedeff Haiping Huang Xiong Fu Ruchuan Wang

Power Grid Estimation Using Electric Network Frequency Signals.

Woorim Bang Ji Won Yoon

Sensitivity of Importance Metrics for Critical Digital Services Graph to Service Operators' Self-Assessment Errors.

Mariusz Kamola

Detection of Free-Form Copy-Move Forgery on Digital Images.

Emre Gürbüz Güzin Ulutas Mustafa Ulutas

Automatic Identification of Honeypot Server Using Machine Learning Techniques.

Cheng Huang Jiaxuan Han Xing Zhang Jiayong Liu

A Malware and Variant Detection Method Using Function Call Graph Isomorphism.

Jinrong Bai Qibin Shi Shiguang Mu

Generative Reversible Data Hiding by Image-to-Image Translation via GANs.

Zhuo Zhang Guangyuan Fu Fuqiang Di Changlong Li Jia Liu

Evaluating the Impact of Name Resolution Dependence on the DNS.

Haiyan Xu Zhaoxin Zhang Jianen Yan Xin Ma

A Data-Driven Approach to Cyber Risk Assessment.

Paolo Santini Giuseppe Gottardi Marco Baldi Franco Chiaraluce

Big Data Analytics for Cyber Security.

Pelin Angin Bharat K. Bhargava Rohit Ranchal

A Novel Trust Model Based on Node Recovery Technique for WSN.

Ping Qi Fucheng Wang Shu Hong

Social Security and Privacy for Social IoT Polymorphic Value Set: A Solution to Inference Attacks on Social Networks.

Yunpeng Gao Nan Zhang

Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions.

Keita Emura Goichiro Hanaoka Yutaka Kawai Takahiro Matsuda Kazuma Ohara Kazumasa Omote Yusuke Sakai

A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection.

Yanping Shen Kangfeng Zheng Chunhua Wu Yixian Yang

A Secure and Efficient ECC-Based Anonymous Authentication Protocol.

Feifei Wang Guoai Xu Lize Gu

Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT.

Mingyong Yin Xingshu Chen Qixu Wang Wei Wang Yulong Wang

Improved Malware Detection Model with Apriori Association Rule and Particle Swarm Optimization.

Olawale Surajudeen Adebayo Normaziah Abdul Aziz

Comprehensive Risk Identification Model for SCADA Systems.

Abdelghafar M. Elhady Hazem M. El-Bakry Ahmed Abou Elfetouh

Detecting Shilling Attacks with Automatic Features from Multiple Views.

Yaojun Hao Fuzhi Zhang Jian Wang Qingshan Zhao Jianfang Cao

Linear (t, n) Secret Sharing Scheme with Reduced Number of Polynomials.

Kenan Kingsley Phiri Hyunsung Kim

Application-Level Unsupervised Outlier-Based Intrusion Detection and Prevention.

Omar Iraqi Hanan El Bakkali

Safety and Security Coengineering in Embedded Systems.

Daniel Schneider Jens Braband Erwin Schoitsch Sascha Uhrig Stefan Katzenbeisser

Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags.

Madiha Khalid Umar Mujahid Khokhar Muhammad Najam-ul-Islam

Comment on "Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment".

Zhen Qu Ivan B. Djordjevic

Research on Defensive Strategy of Real-Time Price Attack Based on Multiperson Zero-Determinant.

Zhuoqun Xia Zhenwei Fang Fengfei Zou Jin Wang Arun Kumar Sangaiah

ID-Based Strong Designated Verifier Signature over ℛ-SIS Assumption.

Jie Cai Han Jiang Pingyuan Zhang Zhihua Zheng Hao Wang Guangshi Lü Qiuliang Xu

A Novel Method for Location Privacy Protection in LBS Applications.

Dan Lu Qilong Han Kejia Zhang Haitao Zhang Bisma Gull

Security Requirements Engineering in Safety-Critical Railway Signalling Networks.

Markus Heinrich Tsvetoslava Vateva-Gurova Tolga Arul Stefan Katzenbeisser Neeraj Suri Henk Birkholz Andreas Fuchs Christoph Krauß Maria Zhdanova Don Kuzhiyelil Sergey Tverdyshev Christian Schlehuber

Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN).

Ashwag Albakri Lein Harn Sejun Song

Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users.

Bo Feng Qiang Li Yuede Ji Dong Guo Xiangyu Meng

A Distributed Access Control with Outsourced Computation in Fog Computing.

Qihua Wang Huaqun Wang Yufeng Wang Rui Guo

Recent Advancements in Intrusion Detection Systems for the Internet of Things.

Zeeshan Ali Khan Peter Herrmann

An Approach Enabling Various Queries on Encrypted Industrial Data Stream.

Tao Wang Bo Yang Guoyong Qiu Lina Zhang Yong Yu Yanwei Zhou Juncai Guo

A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things.

Qinglan Zhao Shuntong Yang Dong Zheng Baodong Qin

Efficient Cancelable Iris Template Generation for Wearable Sensors.

Jaeyeol Jeong Ik Rae Jeong

Random Fault Attacks on a Class of Stream Ciphers.

Harry Bartlett Ed Dawson Hassan Qahur Al Mahri Md. Iftekhar Salam Leonie Simpson Kenneth Koon-Ho Wong

A Secure Data Sharing Scheme with Designated Server.

Binrui Zhu Jiameng Sun Jing Qin Jixin Ma

Separable Reversible Data Hiding in Encrypted Images Based on Difference Histogram Modification.

Dawen Xu Shubing Su

A Hyperchaotic Color Image Encryption Algorithm and Security Analysis.

Chenghai Li Fangzheng Zhao Chen Liu Lei Lei Jie Zhang

Fingerprint Protected Password Authentication Protocol.

Chao Yang Junwei Zhang Jingjing Guo Yu Zheng Li Yang Jianfeng Ma

A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment.

Feifei Wang Guoai Xu Chenyu Wang Junhao Peng

Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems.

Thein Than Thwin Sangsuree Vasupongayya

A Novel Device Identification Method Based on Passive Measurement.

Wei Sun Hao Zhang Li-jun Cai Ai-min Yu Jinqiao Shi Jian-Guo Jiang

VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems.

Hisham A. Kholidy Abdelkarim Erradi

Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms.

Jiadong Ren Jiawei Guo Qian Wang Huang Yuan Hao Xiaobing Hu Jingjing

Integrating Traffics with Network Device Logs for Anomaly Detection.

Jiazhong Lu Fengmao Lv Zhongliu Zhuo Xiaosong Zhang Xiaolei Liu Teng Hu Wei Deng

Security Cryptanalysis of NUX for the Internet of Things.

Yu Liu Xiaolei Liu Yanmin Zhao

RMMDI: A Novel Framework for Role Mining Based on the Multi-Domain Information.

Wei Bai Zhisong Pan Shize Guo Zhe Chen

Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach.

Kaifan Huang Pengdeng Li Lu-Xing Yang Xiaofan Yang Yuan Yan Tang

Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network.

Yu Zhan Baocang Wang

CasCP: Efficient and Secure Certificateless Authentication Scheme for Wireless Body Area Networks with Conditional Privacy-Preserving.

Yong Xie Songsong Zhang Xiang Li Yanggui Li Yuan Chai

Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks.

Mengxia Shuai Bin Liu Nenghai Yu Ling Xiong

Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme.

Quanbo Qu Baocang Wang Yuan Ping Zhili Zhang

A Cancelable Template for the Low-Quality Fingerprints from Wearable Devices.

Sanghoon Lee Ik Rae Jeong

SLFAT: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames.

Qian Lu Haipeng Qu Yuzhan Ouyang Jiahui Zhang

A Lightweight BCH Code Corrector of TRNG with Measurable Dependence.

Hojoong Park Yongjin Yeom Ju-Sung Kang

Analyzing Reliability of the Communication for Secure and Highly Available GOOSE-Based Logic Selectivity.

Peyman Jafary Antti Supponen Mikko Salmenperä Sami Repo

A Server-Side JavaScript Security Architecture for Secure Integration of Third-Party Libraries.

Neline van Ginkel Willem De Groef Fabio Massacci Frank Piessens

Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification.

Rui Zhu Li Xu Yali Zeng Xun Yi

Detection of Dummy Trajectories Using Convolutional Neural Networks.

Jiaji Pan Yi-Ning Liu Weiming Zhang

An Enhanced and Resource-Aware RFID Multitag Grouping Protocol.

Hala Abu Dhailah Eyad Taqieddin Abdallah Y. Alma'aitah

The Prediction of Serial Number in OpenSSL's X.509 Certificate.

Jizhi Wang

Erratum to "A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism".

Ye Yuan Liji Wu Yijun Yang Xiangmin Zhang

HeteMSD: A Big Data Analytics Framework for Targeted Cyber-Attacks Detection Using Heterogeneous Multisource Data.

Ankang Ju Yuanbo Guo Ziwei Ye Tao Li Jing Ma

Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends.

Mohamed Amine Ferrag Leandros A. Maglaras Abdelouahid Derhab

Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic.

Leila Khatibzadeh Zarrintaj Bornaee Abbas Ghaemi Bafghi

Secure and Efficient Searchable Public Key Encryption for Resource Constrained Environment Based on Pairings under Prime Order Group.

Yu Zhang Yin Li Yifan Wang

New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing.

E. Munivel A. Kannammal

Anonymous and Efficient Message Authentication Scheme for Smart Grid.

Libing Wu Jing Wang Sherali Zeadally Debiao He

A Practical Authentication Framework for VANETs.

Baosheng Wang Yi Wang Rongmao Chen

Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things.

Xuyun Zhang Yuan Yuan Zhili Zhou Shancang Li Lianyong Qi Deepak Puthal

Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud.

Yujiao Song Hao Wang Xiaochao Wei Lei Wu

Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments.

Ping Wang Bin Li Hongjin Shi Yaosheng Shen Ding Wang

WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense.

Amirreza Niakanlahiji Jafar Haadi Jafarian

Dynamic Resource Provisioning on Fog Landscapes.

Hoang-Nam Pham-Nguyen Quang Tran Minh

EPLC: An Efficient Privacy-Preserving Line-Loss Calculation Scheme for Residential Areas of Smart Grid.

Yinqiao Xiong Peidong Zhu Zhizhu Liu Hui Yin Tiantian Deng

Visual and Textual Analysis for Image Trustworthiness Assessment within Online News.

Federica Lago Quoc-Tin Phan Giulia Boato

MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication.

Tianbo Lu Ting Meng Chao Li Guozhen Dong Huiyang Li Jiao Zhang Xiaoyan Zhang

Usability Evaluation Model for Biometric System considering Privacy Concern Based on MCDM Model.

Junhyoung Oh Ukjin Lee Kyungho Lee

Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing.

Lei He Jianfeng Ma Ruo Mo Dawei Wei

Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks.

Young-Seob Jeong Jiyoung Woo Ah Reum Kang

Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV).

Mahmoud Abu-Zant Adwan Yasin

The Meeting of Acquaintances: A Cost-Efficient Authentication Scheme for Light-Weight Objects with Transient Trust Level and Plurality Approach.

Tran Khanh Dang Khanh T. K. Tran

Machine Learning for Wireless Multimedia Data Security.

Zhaoqing Pan Ching-Nung Yang Victor S. Sheng Naixue Xiong Weizhi Meng

Corrigendum to "Development of the ECAT Preprocessor with the Trust Communication Approach".

Kevser Ovaz Akpinar Ibrahim Özçelik

Corrigendum to "Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing".

Jieren Cheng Mengyang Li Xiangyan Tang Victor S. Sheng Yifu Liu Wei Guo

A Quantum-Based Database Query Scheme for Privacy Preservation in Cloud Environment.

Wenjie Liu Peipei Gao Zhihao Liu Hanwu Chen Maojun Zhang

MalDeep: A Deep Learning Classification Framework against Malware Variants Based on Texture Visualization.

Yuntao Zhao ChunYu Xu Bo Bo Yongxin Feng

Optimizing Computer Worm Detection Using Ensembles.

Nelson Ochieng Waweru Mwangi Ismail Ateya

Dynamic Nonparametric Random Forest Using Covariance.

SeokHwan Choi Jin-Myeong Shin Yoon-Ho Choi

Security Measure for Image Steganography Based on High Dimensional KL Divergence.

Haitao Song Guangming Tang Yifeng Sun Zhanzhan Gao

A Novel (t, n) Secret Sharing Scheme Based upon Euler's Theorem.

Hefeng Chen Chin-Chen Chang

On the Constructions of New Symmetric Ciphers Based on Nonbijective Multivariate Maps of Prescribed Degree.

Vasyl Ustimenko Urszula Romanczuk-Polubiec Aneta Wróblewska Monika Katarzyna Polak Eustrat Zhupa

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities.

Joseph I. Choi Kevin R. B. Butler

Measuring the Sum-of-Squares Indicator of Boolean Functions in Encryption Algorithm for Internet of Things.

Yu Zhou Yongzhuang Wei Fengrong Zhang

SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations.

Mingfu Xue Chengxiang Yuan Zhe Liu Jian Wang

Efficient Extraction of Network Event Types from NetFlows.

Gustav Sourek Filip Zelezný

Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems.

Fute Shang Buhong Wang Fuhu Yan Tengyao Li

SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks.

Meiyu Zhang Qianying Zhang Shijun Zhao Zhiping Shi Yong Guan

A Buffer Overflow Prediction Approach Based on Software Metrics and Machine Learning.

Jiadong Ren Zhangqi Zheng Qian Liu Zhiyao Wei Huaizhi Yan

Blind Image Watermarking Based on Adaptive Data Spreading in n-Level DWT Subbands.

Yong-Seok Lee Young-Ho Seo Dong-Wook Kim

A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment.

Wenting Shen Jing Qin Jixin Ma

On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key.

Édgar Salguero Dorokhin Walter Fuertes Edison Lascano

Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation.

Haiying Ma Zhanjun Wang Zhijin Guan

Secure Information Sharing System for Online Patient Networks.

Hyun-A. Park

Mining the Key Nodes from Software Network Based on Fault Accumulation and Propagation.

Guoyan Huang Qian Wang Xinqian Liu Xiaobing Hao Huaizhi Yan

FORTRESS: An Efficient and Distributed Firewall for Stateful Data Plane SDN.

Maurantonio Caprolu Simone Raponi Roberto Di Pietro

Practical Web Spam Lifelong Machine Learning System with Automatic Adjustment to Current Lifecycle Phase.

Marcin Luckner

Multifeature Named Entity Recognition in Information Security Based on Adversarial Learning.

Han Zhang Yuanbo Guo Tao Li

A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function.

Jin Wook Byun

Virtual Network Embedding Based on Security Level with VNF Placement.

Dhanu Dwiardhika Takuji Tachibana

Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System.

Krzysztof Cabaj Marcin Gregorczyk Wojciech Mazurczyk Piotr Nowakowski Piotr Zórawski

SSPSoC: A Secure SDN-Based Protocol over MPSoC.

Soultana Ellinidou Gaurav Sharma Théo Rigas Tristan Vanspouwen Olivier Markowitch Jean-Michel Dricot

Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image.

Bin Ma Bing Li Xiao-Yu Wang Chunpeng Wang Jian Li Yun-Qing Shi

A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design.

Yasuyuki Kawanishi Hideaki Nishihara Daisuke Souma Hirotaka Yoshida Yoichi Hata

Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment.

Toan-Thinh Truong Minh-Triet Tran Anh Duc Duong

Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective.

Jian Sun Guanhua Huang Arun Kumar Sangaiah Guangyang Zhu Xiaojiang Du

A Cooperative Denoising Algorithm with Interactive Dynamic Adjustment Function for Security of Stacker in Industrial Internet of Things.

Darong Huang Lanyan Ke Bo Mi Guosheng Wei Jian Wang Shaohua Wan

An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning.

Teng Hu Weina Niu Xiaosong Zhang Xiaolei Liu Jiazhong Lu Yuan Liu

Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks.

Dilara Acarali Muttukrishnan Rajarajan Nikos Komninos Bruno Bogaz Zarpelão

Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees.

Wenli Shang Tianyu Gong Chunyu Chen Jing Hou Peng Zeng

A Short Server-Aided Certificateless Aggregate Multisignature Scheme in the Standard Model.

Viet Cuong Trinh

RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications.

Mishall Al-Zubaidie Zhongwei Zhang Ji Zhang

Security, Privacy, and Trust for Cyberphysical-Social Systems.

Laurence T. Yang Wei Wang Gregorio Martínez Pérez Willy Susilo

A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning.

Yuntao Zhao Bo Bo Yongxin Feng ChunYu Xu Bo Yu

A New Group Location Privacy-Preserving Method Based on Distributed Architecture in LBS.

JingJing Wang Yiliang Han Xiaoyuan Yang Tanping Zhou Jiayong Chen

Integrity Audit of Shared Cloud Data with Identity Tracking.

Yunxue Yan Lei Wu Wenyu Xu Hao Wang Zhao Man Liu

Group-Based Susceptible-Infectious-Susceptible Model in Large-Scale Directed Networks.

Xu Wang Bo Song Wei Ni Ren Ping Liu Y. Jay Guo Xinxin Niu Kangfeng Zheng

Tightly Secure Lossy Trapdoor Functions: Constructions and Applications.

Baodong Qin

Efficient Lossless Compression Based Reversible Data Hiding Using Multilayered n-Bit Localization.

Rashid Abbasi Lixiang Xu Farhan Amin Bin Luo

Image Encryption with Double Spiral Scans and Chaotic Maps.

Zhenjun Tang Ye Yang Shijie Xu Chunqiang Yu Xianquan Zhang

Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy.

Daode Zhang Jie Li Bao Li Xianhui Lu Haiyang Xue Dingding Jia Yamin Liu

An Explainable Password Strength Meter Addon via Textual Pattern Recognition.

Ming Xu Weili Han

Security and Privacy for Smart Cyber-Physical Systems.

Liran Ma Yan Huo Chunqiang Hu Wei Li

FPGA Implementation of Digital Images Watermarking System Based on Discrete Haar Wavelet Transform.

Mohamed Ali Hajjaji Mohamed Gafsi Abdessalem Ben Abdelali Abdellatif Mtibaa

Mathematical Models for Malware Propagation.

Ángel Martín del Rey Lu-Xing Yang Vasileios Karyotis

Single-Round Pattern Matching Key Generation Using Physically Unclonable Function.

Yuichi Komano Kazuo Ohta Kazuo Sakiyama Mitsugu Iwamoto Ingrid Verbauwhede

Differentially Private Release of the Distribution of Clustering Coefficients across Communities.

Xiaoye Li Jing Yang Zhenlong Sun Jianpei Zhang

Identifying Known and Unknown Mobile Application Traffic Using a Multilevel Classifier.

Shuang Zhao Shuhui Chen Yipin Sun Zhiping Cai Jinshu Su

A Cloud Service Trust Evaluation Model Based on Combining Weights and Gray Correlation Analysis.

Yubiao Wang Junhao Wen Xibin Wang Bamei Tao Wei Zhou