


default search action
EAI Endorsed Transactions on Security and Safety, Volume 5
Volume 5, Number 15, October 2018
- Fanhao Meng, Rongheng Lin, Zhuoran Wang, Hua Zou, Shiqi Zhou:
A Multi-connection Encryption Algorithm Applied in Secure Channel Service System. e1 - Tommy Chin, Kaiqi Xiong, Mohamed Rahouti:
Kernel-Space Intrusion Detection Using Software-Defined Networking. e2 - Neila Rjaibi, Latifa Ben Arfa Rabai:
How Stakeholders Perceived Security Risks? A New Predictive Functional Level Model and its Application to E-Learning. e3 - V. Kamalakannan, S. Tamilselvan:
FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things. e4 - Tim Niklas Witte
:
Mouse Underlaying: Global Key and Mouse Listener Based on an Almost Invisible Window with Local Listeners and Sophisticated Focus. e5
Volume 5, Number 16, December 2018
- Leandros Maglaras, Mohamed Amine Ferrag
, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis:
Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures. e1 - Aziz Mohaisen
, Omar Alrawi, Jeman Park, Joongheon Kim, DaeHun Nyang, Manar Mohaisen:
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering. e2 - Maryem Ait El Hadj
, Ahmed Khoumsi, Yahya Benkaouz, Mohammed Erradi:
Formal Approach to Detect and Resolve Anomalies while Clustering ABAC Policies. e3 - Tiago Antônio Rizzetti, Bolívar Menezes da Silva, Alexandre Silva Rodrigues, Rafael Gressler Milbradt, Luciane Neves Canha:
A secure and lightweight multicast communication system for Smart Grids. e4 - Wenyu Qu, Wei Huo, Lingyu Wang:
Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications. e5
Volume 5, Number 17, January 2019
- Li Wang, Dinghao Wu:
Bridging the Gap Between Security Tools and SDN Controllers. e1 - Muhammad Jafer, M. Arif Khan
, Sabih ur Rehman
, Tanveer A. Zia
:
Secure Communication in VANET Broadcasting. e2 - Yue Li, Haining Wang, Kun Sun:
BluePass: A Mobile Device Assisted Password Manager. e3 - Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini
, Petr Hanácek:
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. e4 - Nawaf Alhebaishi, Lingyu Wang, Anoop Singhal:
Threat Modeling for Cloud Infrastructures. e5
Volume 5, Number 18, January 2019
- Mina Khalili, Mengyuan Zhang
, Daniel Borbor, Lingyu Wang, Nicandro Scarabeo, Michel-Ange Zamor:
Monitoring and Improving Managed Security Services inside a Security Operation Center. e1 - Xianmang He, Yuan Hong, Yindong Chen:
Exploring the Privacy Bound for Differential Privacy: From Theory to Practice. e2 - Yang Song, Chen Wu, Sencun Zhu, Haining Wang:
A Machine Learning Based Approach for Mobile App Rating Manipulation Detection. e3 - Debasis Gountia:
Towards Scalability Trade-off and Security Issues in State-of-the-art Blockchain. e4 - Chonghua Wang, Libo Yin, Jun Li, Xuehong Chen, Rongchao Yin, Xiaochun Yun, Yang Jiao, Zhiyu Hao:
HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware. e5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.