Items where Subject is "46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460403 Data security and protection"
Up a level |
- Fields of Research (57479)
- 46 INFORMATION AND COMPUTING SCIENCES (714)
- 4604 Cybersecurity and privacy (72)
- 460403 Data security and protection (19)
- 4604 Cybersecurity and privacy (72)
- 46 INFORMATION AND COMPUTING SCIENCES (714)
Article
Ahmad, Jameel, Zia, Muhammad Umer, Naqvi, Ijaz Haider, Chattha, Jawwad Nasar, Butt, Faran Awais, Huang, Tao, and Xiang, Wei (2024) Machine learning and blockchain technologies for cybersecurity in connected vehicles. WIREs Data Mining and Knowledge Discovery, 14. e1515.
Dong, Xuening, Amirsoleimani, Amirali, Rahimi Azghadi, Mostafa, and Genov, Roman (2024) WALLAX: A memristor-based Gaussian random number generator. Neurocomputing, 566. 126933.
Kerrison, Steve, Jusak, Jusak, and Huang, Tao (2023) Blockchain-Enabled IoT for Rural Healthcare: Hybrid-Channel Communication with Digital Twinning. Electronics, 12 (9).
Lei, Songze, Shan, Aokui, Liu, Bo, Zhao, Yanxiao, and Xiang, Wei (2023) Lightweight and efficient dual-path fusion network for iris segmentation. Scientific Reports, 13. 14034.
Lu, Zhigang, Asghar, Hassan Jameel, Kaafar, Mohamed Ali, Webb, Darren, and Dickinson, Peter (2022) A Differentially Private Framework for Deep Learning With Convexified Loss Functions. IEEE Transactions on Information Forensics and Security, 17. pp. 2151-2165.
Jusak, Jusak, Mahmoud, Seedahmed S., Laurens, Roy, Alsulami, Musleh, and Fang, Qiang (2022) A new approach for secure cloud-based Electronic Health Record and its experimental testbed. IEEE Access, 10. pp. 1082-1095.
Miao, Yuantian, Chen, Chao, Pan, Lei, Han, Qing-Long, Zhang, Jun, and Xiang, Yang (2021) Machine learning–based cyber attacks targeting on controlled information: a survey. ACM Computing Surveys, 54 (7). 139. pp. 1-36.
Jusak, Jusak, and Mahmoud, Seedahmed S. (2018) A novel and low processing time ECG security method suitable for sensor node platforms. International Journal of Communication Networks and Information Security, 10 (1). 24. pp. 213-222.
Torten, Ron, Reaiche, Carmen, and Boyle, Stephen (2018) The impact of security awarness on information technology professionals’ behavior. Computers & Security, 79. pp. 68-79.
Conference Item
Hamidi, Amirreza, and Ghodosi, Hossein (2023) Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem. In: Lecture Notes in Computer Science (13809) pp. 117-132. From: SecITC 2022: 15th International Conference on Innovative Security Solutions for Information Technology and Communications, 8-9 December 2022, Virtual.
Hamidi, Amirreza, and Ghodosi, Hossein (2023) Fair Distributed Oblivious Polynomial Evaluation via Bitcoin Deposits: Compute-as-a-Service. In: Lecture Notes in Computer Science (14324) pp. 73-86. From: NordSEC 2023: Nordic Conference on Secure IT Systems, 16-17 November 2023, Oslo, Norway.
Hamidi, Amirreza, and Ghodosi, Hossein (2023) Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography. In: Lecture Notes in Computer Science (14252) pp. 235-246. From: ICICS 2023: 25th International Conference on Information and Communications Security, 18-20 November 2023, Tianjin, China.
Hamidi, Amirreza, and Ghodosi, Hossein (2023) Unconditionally Fast Secure Multi-party Computation with Multi-depths Gates Using Pre-computed Information. In: Lecture Notes in Networks and Systems (448) pp. 329-340. From: ICICT 2022: 7th International Congress on Information and Communication Technology, 21-24 February 2022, London, UK.
Zhang, Bonan, Li, Jingjin, Chen, Chao, Lee, Kyungmi, and Lee, Ickjai (2022) A Practical Botnet Traffic Detection System using GNN. In: Lecture Notes in Computer Science (13172) pp. 66-78. From: CSS 2021: Cyberspace Safety and Security, 9-11 November 2021, Virtual.
Hamidi, Amirreza, and Ghodosi, Hossein (2022) Verifiable DOPE from Somewhat Homomorphic Encryption, and the Extension to DOT. In: Lecture Notes in Computer Science (13580) pp. 105-120. From: SciSec 2022: 4th International Conference on Science of Cyber Security, 10-12 August 2022, Matsue, Japan.
Liu, Liu, Chen, Chao, Zhang, Jun, De Vel, Olivier, and Xiang, Yang (2020) Doc2vec-based insider threat detection through behaviour analysis of multi-source security logs. In: Proceedings of the IEEE 19th International Conference on Trust, Security and Privacy in Computing. pp. 301-309. From: TrustCom 2020: IEEE 19th International Conference on Trust, Security and Privacy in Computing, 29 December 2020 - 1 January 2021, Guangzhou, China.
Liu, Zian, Chen, Chao, Liu, Shigang, Liu, Dongxi, and Wang, Yu (2019) Exploit in smart devices: a case study. In: Communications in Computer and Information Science (1095) pp. 152-164. From: SocialSec 2019: 5th International Symposium on Security and Privacy in Social Networks and Big Data, 14-17 July 2019, Copenhagen, Denmark.
Laurens, Roy, Jusak, Jusak, and Zou, Cliff (2018) Invariant diversity as a proactive fraud detection mechanism for online merchants. In: Proceedings of the IEEE Global Communications Conference. From: GLOBECOM 2017: IEEE Global Communications Conference, 4-8 December 2017, Singapore.
Book
Huang, Tao, Yan, Shihao, Zhang, Guanglin, Sun, Li, Yuen, Tsz Hon, Park, YoHan, and Lee, Changhoon (2023) Security and Privacy for Modern Wireless Communication Systems. MDPI, Basel, Switzerland.