Items where Subject is "46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460407 System and network security"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: H | K | L | T | Z
Number of items at this level: 10.

H

Huang, Tao, Yan, Shihao, Zhang, Guanglin, Sun, Li, Yuen, Tsz Hon, Park, YoHan, and Lee, Changhoon (2023) Security and Privacy for Modern Wireless Communication Systems. MDPI, Basel, Switzerland.

K

Kerrison, Steve, Jusak, Jusak, and Huang, Tao (2023) Blockchain-Enabled IoT for Rural Healthcare: Hybrid-Channel Communication with Digital Twinning. Electronics, 12 (9).

L

Li, Xiaonan, Ghodosi, Hossein, Chen, Chao, Sankupellay, Mangalam, and Lee, Ickjai (2022) Improving Network-Based Anomaly Detection in Smart Home Environment. Sensors, 22 (15). 5626.

Liu, Zhengyang, Zhang, Xiaoyu, Chen, Chenyang, Lin, Shen, and Li, Jingjin (2022) Membership Inference Attacks Against Robust Graph Neural Network. In: Cyberspace Safety and Security, CSS 2022 (13547) pp. 259-273. From: Cyberspace Safety and Security: 14th International Symposium, CSS 2022, 16–18 October 2022, Xi’an, China.

Liu, Liu, Chen, Chao, Zhang, Jun, De Vel, Olivier, and Xiang, Yang (2019) Insider threat identification using the simultaneous neural learning of multi-source logs. IEEE Access, 7. pp. 183162-183176.

Liu, Liu, Chen, Chao, Zhang, Jun, De Vel, Olivier, and Xiang, Yang (2019) Unsupervised insider detection through neural feature learning and model optimisation. In: Lecture Notes in Computer Science (11928) pp. 18-36. From: NSS 2019: 13th International Conference on Network and System Security, 15-18 December 2019, Sapporo, Japan.

Laurens, Roy, Rezaeighaleh, Hossein, Zou, Cliff C., and Jusak, Jusak (2019) Using Disposable Domain Names to Detect Online Card Transaction Fraud. In: Proceedings of the IEEE International Conference on Communications. From: ICC 2019: IEEE International Conference on Communications, 20-24 May 2019, Shanghai, China.

T

Torten, Ron, Reaiche, Carmen, and Boyle, Stephen (2018) The impact of security awarness on information technology professionals’ behavior. Computers & Security, 79. pp. 68-79.

Z

Zhang, Bonan, Li, Jingjin, Ward, Lindsay, Zhang, Ying, Chen, Chao, Zhang, Jun, and Wang, Ding (2023) Deep Graph Embedding for IoT Botnet Traffic Detection. Security and Communication Networks, 2023. 9796912.

Zhang, Xiaoyu, Chen, Chao, Xie, Yi, Chen, Xiaofeng, Zhang, Jun, and Xiang, Yang (2022) A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network. Computer Standards and Interfaces, 83. 103672.

This list was generated on Tue Apr 23 22:44:08 2024 AEST.