Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "security application"
more than 1000 matches, exporting first 1000 hits only!
@book{DBLP:books/ws/Brooks24, author = {Tyson T. Brooks}, title = {Cloud to Edgeware - Wireless Grid Applications, Architecture and Security for the Internet of Things}, publisher = {WorldScientific}, year = {2024}, url = {https://doi.org/10.1142/9354}, doi = {10.1142/9354}, isbn = {9789814630801}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/ws/Brooks24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MohsenRLKWM24, author = {Fadi Mohsen and Usman Rauf and Victor Lavric and Alexander Kokushkin and Zhiyuan Wei and Adalynn Martinez}, title = {On Identification of Intrusive Applications: {A} Step Toward Heuristics-Based Adaptive Security Policy}, journal = {{IEEE} Access}, volume = {12}, pages = {37586--37599}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3373202}, doi = {10.1109/ACCESS.2024.3373202}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MohsenRLKWM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bspc/NadhanJ24, author = {Archana S. Nadhan and Israel Jeena Jacob}, title = {Enhancing healthcare security in the digital era: Safeguarding medical images with lightweight cryptographic techniques in IoT healthcare applications}, journal = {Biomed. Signal Process. Control.}, volume = {88}, number = {Part {B}}, pages = {105511}, year = {2024}, url = {https://doi.org/10.1016/j.bspc.2023.105511}, doi = {10.1016/J.BSPC.2023.105511}, timestamp = {Mon, 01 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bspc/NadhanJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/WenhuaHJISAAK24, author = {Zhang Wenhua and Mohammad Kamrul Hasan and Norleyza Binti Jailani and Shayla Islam and Nurhizam Safie and Hussain Mobarak Albarakati and Abeer Aljohani and Muhammad Attique Khan}, title = {A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications}, journal = {Comput. Hum. Behav.}, volume = {153}, pages = {108134}, year = {2024}, url = {https://doi.org/10.1016/j.chb.2024.108134}, doi = {10.1016/J.CHB.2024.108134}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chb/WenhuaHJISAAK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhouZC24, author = {Chunning Zhou and Wentao Zhang and Weiwei Cao}, title = {A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, {NOEKEON} and {ASCON}}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {274--291}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac173}, doi = {10.1093/COMJNL/BXAC173}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhouZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/KangKK24, author = {Giluk Kang and Jahoon Koo and Young{-}Gab Kim}, title = {Security and Privacy Requirements for the Metaverse: {A} Metaverse Applications Perspective}, journal = {{IEEE} Commun. Mag.}, volume = {62}, number = {1}, pages = {148--154}, year = {2024}, url = {https://doi.org/10.1109/MCOM.014.2200620}, doi = {10.1109/MCOM.014.2200620}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cm/KangKK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CaraveoCacepVZ24, author = {Miguel Antonio Caraveo{-}Cacep and Rub{\'{e}}n V{\'{a}}zquez{-}Medina and Antonio Hern{\'{a}}ndez Zavala}, title = {A review on security implementations in soft-processors for IoT applications}, journal = {Comput. Secur.}, volume = {139}, pages = {103677}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103677}, doi = {10.1016/J.COSE.2023.103677}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CaraveoCacepVZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eait/Su24, author = {Jun{-}Ming Su}, title = {WebHOLE: Developing a web-based hands-on learning environment to assist beginners in learning web application security}, journal = {Educ. Inf. Technol.}, volume = {29}, number = {6}, pages = {6579--6610}, year = {2024}, url = {https://doi.org/10.1007/s10639-023-12090-z}, doi = {10.1007/S10639-023-12090-Z}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eait/Su24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/HabbalAA24, author = {Adib Habbal and Mohamed Khalif Ali and Mustafa Ali Abuzaraida}, title = {Artificial Intelligence Trust, Risk and Security Management {(AI} TRiSM): Frameworks, applications, challenges and future research directions}, journal = {Expert Syst. Appl.}, volume = {240}, pages = {122442}, year = {2024}, url = {https://doi.org/10.1016/j.eswa.2023.122442}, doi = {10.1016/J.ESWA.2023.122442}, timestamp = {Sun, 26 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/HabbalAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/NagHDSCKSA24, author = {Anindya Nag and Md. Mehedi Hassan and Ayontika Das and Anurag Sinha and Nisarga Chand and Anwesha Kar and Vandana Sharma and Ahmed Alkhayyat}, title = {Exploring the applications and security threats of Internet of Thing in the cloud computing paradigm: {A} comprehensive study on the cloud of things}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {35}, number = {4}, year = {2024}, url = {https://doi.org/10.1002/ett.4897}, doi = {10.1002/ETT.4897}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/NagHDSCKSA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/AlrubayyiANAJ24, author = {Hadeel Alrubayyi and Moudy Sharaf Alshareef and Zunaira Nadeem and Ahmed M. Abdelmoniem and Mona Jaber}, title = {Security Threats and Promising Solutions Arising from the Intersection of {AI} and IoT: {A} Study of IoMT and IoET Applications}, journal = {Future Internet}, volume = {16}, number = {3}, pages = {85}, year = {2024}, url = {https://doi.org/10.3390/fi16030085}, doi = {10.3390/FI16030085}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/AlrubayyiANAJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-blc/SharmaSAS24, author = {Rajendra Kumar Sharma and Ritumoni Sarma and Neha Arora and Vidya Sagar}, title = {Multisecret-sharing scheme with two-level security and its applications in blockchain}, journal = {{IET} Blockchain}, volume = {4}, number = {1}, pages = {30--42}, year = {2024}, url = {https://doi.org/10.1049/blc2.12042}, doi = {10.1049/BLC2.12042}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-blc/SharmaSAS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/SivakumarJVS24, author = {A. Sivakumar and Jency Rubia J and Hima Vijayan and C. Sivakumaran}, title = {Detection of Botnet using deep learning algorithm: application of machine learning in cyber-security}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {16}, number = {2}, pages = {213--222}, year = {2024}, url = {https://doi.org/10.1504/IJESDF.2024.137030}, doi = {10.1504/IJESDF.2024.137030}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/SivakumarJVS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijim/MartinezCepedaMTOA24, author = {Ver{\'{o}}nica Isabel Mart{\'{\i}}nez{-}Cepeda and Mar{\'{\i}}a Jos{\'{e}} P{\'{a}}rraga Moreira and Vinicio Leonardo Borja Tapia and Luis Armando Ortiz{-}Delgado and Diego Ricardo Salazar Armijos}, title = {{ESPE} Security: Mobile and Web Application to Manage Community Emergency Alerts}, journal = {Int. J. Interact. Mob. Technol.}, volume = {18}, number = {5}, pages = {77--90}, year = {2024}, url = {https://doi.org/10.3991/ijim.v18i05.46781}, doi = {10.3991/IJIM.V18I05.46781}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijim/MartinezCepedaMTOA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijin/HangXZGL24, author = {Feilu Hang and Linjiang Xie and Zhenhong Zhang and Wei Guo and Hanruo Li}, title = {Research on the application of network security defence in database security services based on deep learning integrated with big data analytics}, journal = {Int. J. Intell. Networks}, volume = {5}, pages = {101--109}, year = {2024}, url = {https://doi.org/10.1016/j.ijin.2024.02.006}, doi = {10.1016/J.IJIN.2024.02.006}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijin/HangXZGL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwin/QaziKHA24, author = {Farheen Qazi and Sadiq Ali Khan and Fozia Hanif and Dur{-}e{-}Shawar Agha}, title = {Efficient Routing Algorithm Towards the Security of Vehicular Ad-Hoc Network and Its Applications}, journal = {Int. J. Wirel. Inf. Networks}, volume = {31}, number = {1}, pages = {12--28}, year = {2024}, url = {https://doi.org/10.1007/s10776-023-00613-x}, doi = {10.1007/S10776-023-00613-X}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijwin/QaziKHA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/SafdarSAH24, author = {Muhammad Umair Safdar and Tariq Shah and Asif Ali and Tanveer ul Haq}, title = {Construction of algebraic complex 9-bit lookup tables using non-chain-ring and its applications in data security}, journal = {Integr.}, volume = {94}, pages = {102095}, year = {2024}, url = {https://doi.org/10.1016/j.vlsi.2023.102095}, doi = {10.1016/J.VLSI.2023.102095}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/integration/SafdarSAH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/KalhoroSKAA24, author = {Shadab Kalhoro and Farhan Bashir Shaikh and Anam Kalhoro and Junaid Ur Rehman Abbasi and Ramesh Kumar Ayyasamy}, title = {An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {1}, pages = {17--35}, year = {2024}, url = {https://doi.org/10.22042/isecure.2023.354872.829}, doi = {10.22042/ISECURE.2023.354872.829}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/KalhoroSKAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/FowdurH24, author = {Tulsi Pawan Fowdur and Shua{\"{\i}}b Hosenally}, title = {A real-time machine learning application for browser extension security monitoring}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {1}, pages = {16--41}, year = {2024}, url = {https://doi.org/10.1080/19393555.2022.2128944}, doi = {10.1080/19393555.2022.2128944}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/FowdurH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AdilSKFJ24, author = {Muhammad Adil and Houbing Song and Muhammad Khurram Khan and Ahmed Farouk and Zhanpeng Jin}, title = {5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions}, journal = {J. Netw. Comput. Appl.}, volume = {223}, pages = {103828}, year = {2024}, url = {https://doi.org/10.1016/j.jnca.2024.103828}, doi = {10.1016/J.JNCA.2024.103828}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AdilSKFJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/NguyenNG24, author = {Tri Nguyen and Huong Nguyen and Tuan Nguyen Gia}, title = {Exploring the integration of edge computing and blockchain IoT: Principles, architectures, security, and applications}, journal = {J. Netw. Comput. Appl.}, volume = {226}, pages = {103884}, year = {2024}, url = {https://doi.org/10.1016/j.jnca.2024.103884}, doi = {10.1016/J.JNCA.2024.103884}, timestamp = {Mon, 27 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/NguyenNG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/ChehidaRGM24, author = {Salim Chehida and {\'{E}}ric Rutten and Guillaume Giraud and St{\'{e}}phane Mocanu}, title = {A model-based approach for self-adaptive security in {CPS:} Application to smart grids}, journal = {J. Syst. Archit.}, volume = {150}, pages = {103118}, year = {2024}, url = {https://doi.org/10.1016/j.sysarc.2024.103118}, doi = {10.1016/J.SYSARC.2024.103118}, timestamp = {Sun, 19 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/ChehidaRGM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/JeremiahAXP24, author = {Sekione Reward Jeremiah and Abir El Azzaoui and Neal N. Xiong and Jong Hyuk Park}, title = {A comprehensive survey of digital twins: Applications, technologies and security challenges}, journal = {J. Syst. Archit.}, volume = {151}, pages = {103120}, year = {2024}, url = {https://doi.org/10.1016/j.sysarc.2024.103120}, doi = {10.1016/J.SYSARC.2024.103120}, timestamp = {Sun, 19 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/JeremiahAXP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/KareemD24, author = {Husam Kareem and Dmitriy Dunaev}, title = {A novel low hardware configurable ring oscillator {(CRO)} {PUF} for lightweight security applications}, journal = {Microprocess. Microsystems}, volume = {104}, pages = {104989}, year = {2024}, url = {https://doi.org/10.1016/j.micpro.2023.104989}, doi = {10.1016/J.MICPRO.2023.104989}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mam/KareemD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/MathurPG24, author = {Garima Mathur and Anjana Pandey and Sachin Goyal}, title = {A review on blockchain for {DNA} sequence: security issues, application in {DNA} classification, challenges and future trends}, journal = {Multim. Tools Appl.}, volume = {83}, number = {2}, pages = {5813--5835}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-15857-1}, doi = {10.1007/S11042-023-15857-1}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/MathurPG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/SekarputriFHK24, author = {Janitra Ariena Sekarputri and Widia Resti Fitriani and Achmad Nizar Hidayanto and Sherah Kurnia}, title = {The roles of privacy, security, and dissatisfaction in affecting switching intention on messenger applications}, journal = {Multim. Tools Appl.}, volume = {83}, number = {15}, pages = {45625--45651}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-17466-4}, doi = {10.1007/S11042-023-17466-4}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/SekarputriFHK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/X24, title = {Applications of advanced artificial intelligence in multimedia and information security}, journal = {Multim. Tools Appl.}, volume = {83}, number = {1}, pages = {3019}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-17843-z}, doi = {10.1007/S11042-023-17843-Z}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/X24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ojcs/GuoLMALAW24, author = {Mengzhao Guo and Zhi Lin and Ruiqian Ma and Kang An and Dong Li and Naofal Al{-}Dhahir and Jiangzhou Wang}, title = {Inspiring Physical Layer Security With {RIS:} Principles, Applications, and Challenges}, journal = {{IEEE} Open J. Commun. Soc.}, volume = {5}, pages = {2903--2925}, year = {2024}, url = {https://doi.org/10.1109/OJCOMS.2024.3392359}, doi = {10.1109/OJCOMS.2024.3392359}, timestamp = {Sun, 19 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ojcs/GuoLMALAW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saem/Sun24, author = {Dengpan Sun}, title = {Application of decision system design based on improved association rules in rural social security}, journal = {Int. J. Syst. Assur. Eng. Manag.}, volume = {15}, number = {3}, pages = {1273--1284}, year = {2024}, url = {https://doi.org/10.1007/s13198-023-02213-7}, doi = {10.1007/S13198-023-02213-7}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/saem/Sun24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DashSS24, author = {Priyabrata Dash and Monalisa Sarma and Debasis Samanta}, title = {Privacy preserving unique identity generation from multimodal biometric data for privacy and security applications}, journal = {Secur. Priv.}, volume = {7}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/spy2.375}, doi = {10.1002/SPY2.375}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DashSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumarS24, author = {Pawan Kumar and Sukhdip Singh}, title = {Enhancing android application security: {A} novel approach using DroidXGB for malware detection based on permission analysis}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.361}, doi = {10.1002/SPY2.361}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KumarS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MakinaLR24, author = {Hela Makina and Asma Ben Letaifa and Abderrezak Rachedi}, title = {Survey on security and privacy in Internet of Things-based eHealth applications: Challenges, architectures, and future directions}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.346}, doi = {10.1002/SPY2.346}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MakinaLR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scpe/Alharbe24, author = {Nawaf Alharbe}, title = {Ontological Augmentation and Analytical Paradigms for Elevating Security in Healthcare Web Applications}, journal = {Scalable Comput. Pract. Exp.}, volume = {25}, number = {1}, pages = {157--165}, year = {2024}, url = {https://doi.org/10.12694/scpe.v25i1.2108}, doi = {10.12694/SCPE.V25I1.2108}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scpe/Alharbe24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scpe/LiuLTZW24, author = {Xiangying Liu and Zhiqiang Li and Zhuwei Tang and Xiang Zhang and Hongxia Wang}, title = {Application of Artificial Intelligence Technology in Electromechanical Information Security Situation Awareness System}, journal = {Scalable Comput. Pract. Exp.}, volume = {25}, number = {1}, pages = {127--136}, year = {2024}, url = {https://doi.org/10.12694/scpe.v25i1.2280}, doi = {10.12694/SCPE.V25I1.2280}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scpe/LiuLTZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/NovikovaFDS24, author = {Evgenia Novikova and Elena Fedorchenko and Alexandr Danilov and Igor Saenko}, title = {Dataset Generation Methodology: Towards Application of Machine Learning in Industrial Water Treatment Security}, journal = {{SN} Comput. Sci.}, volume = {5}, number = {4}, pages = {373}, year = {2024}, url = {https://doi.org/10.1007/s42979-024-02704-9}, doi = {10.1007/S42979-024-02704-9}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/NovikovaFDS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/KrishnaS24, author = {Hosakota Vamshi Krishna and Krovi Raja Sekhar}, title = {Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard}, journal = {Soft Comput.}, volume = {28}, number = {3}, pages = {2671--2681}, year = {2024}, url = {https://doi.org/10.1007/s00500-023-09585-9}, doi = {10.1007/S00500-023-09585-9}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/KrishnaS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/TajudeenAPAA24, author = {M. Mubeen Tajudeen and M. Syed Ali and R. Perumal and Hamed H. Alsulami and Bashir Ahmad}, title = {Observer-based security control for Markov jump systems under hybrid cyber-attacks and its application via event-triggered scheme}, journal = {Soft Comput.}, volume = {28}, number = {6}, pages = {5155--5171}, year = {2024}, url = {https://doi.org/10.1007/s00500-023-09234-1}, doi = {10.1007/S00500-023-09234-1}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/TajudeenAPAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tai/LiangCP24, author = {Hongjing Liang and Zhenyu Chang and Yingnan Pan}, title = {Dual-Event-Triggered Intelligence Security Control for Multiagent Systems Against DoS Attacks With Applications in Mobile Robot Systems}, journal = {{IEEE} Trans. Artif. Intell.}, volume = {5}, number = {2}, pages = {916--924}, year = {2024}, url = {https://doi.org/10.1109/TAI.2023.3275938}, doi = {10.1109/TAI.2023.3275938}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tai/LiangCP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/AgrahariASKGV24, author = {Ashutosh Agrahari and Ruchi Agarwal and Pawan Singh and Abhishek Singh Kilak and Deepak Gupta and Ankit Vidyarthi}, title = {Marvelous Hand: An IoT-Enabled Artificial Intelligence-Based Human-Centric Biosensor Design for Consumer Personal Security Application}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {70}, number = {1}, pages = {1063--1070}, year = {2024}, url = {https://doi.org/10.1109/TCE.2023.3320768}, doi = {10.1109/TCE.2023.3320768}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/AgrahariASKGV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcns/AghajanPM24, author = {Adel Aghajan and Keith Paarporn and Jason R. Marden}, title = {Extension Theorems for General Lotto Games With Applications to Network Security}, journal = {{IEEE} Trans. Control. Netw. Syst.}, volume = {11}, number = {1}, pages = {185--196}, year = {2024}, url = {https://doi.org/10.1109/TCNS.2023.3272823}, doi = {10.1109/TCNS.2023.3272823}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcns/AghajanPM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/VaishASS24, author = {Prashant Vaish and Niharika Anand and Vishal Krishna Singh and Gaurav Sharma}, title = {Applications hosting over cloud-assisted {IOT:} a productivity model and method defining accessibility of data security}, journal = {J. Supercomput.}, volume = {80}, number = {4}, pages = {5540--5564}, year = {2024}, url = {https://doi.org/10.1007/s11227-023-05668-4}, doi = {10.1007/S11227-023-05668-4}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tjs/VaishASS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/PeldszusBJ24, author = {Sven Peldszus and Jens B{\"{u}}rger and Jan J{\"{u}}rjens}, title = {UMLsecRT: Reactive Security Monitoring of Java Applications With Round-Trip Engineering}, journal = {{IEEE} Trans. Software Eng.}, volume = {50}, number = {1}, pages = {16--47}, year = {2024}, url = {https://doi.org/10.1109/TSE.2023.3326366}, doi = {10.1109/TSE.2023.3326366}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tse/PeldszusBJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/WangS24, author = {Fangzhou Wang and A. Lee Swindlehurst}, title = {Applications of Absorptive Reconfigurable Intelligent Surfaces in Interference Mitigation and Physical Layer Security}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {23}, number = {5}, pages = {3918--3931}, year = {2024}, url = {https://doi.org/10.1109/TWC.2023.3312693}, doi = {10.1109/TWC.2023.3312693}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/WangS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/WangS24, author = {Fangzhou Wang and A. Lee Swindlehurst}, title = {Applications of Absorptive Reconfigurable Intelligent Surfaces in Interference Mitigation and Physical Layer Security}, journal = {{ACM} Trans. Web}, volume = {23}, number = {5}, pages = {3918--3931}, year = {2024}, url = {https://doi.org/10.1109/TWC.2023.3312693}, doi = {10.1109/TWC.2023.3312693}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tweb/WangS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/KumarS24a, author = {Pawan Kumar and Sukhdip Singh}, title = {An Efficient Security Testing for Android Application Based on Behavior and Activities Using Improved {PCA} and {DNN-KNN} Classifier}, journal = {Wirel. Pers. Commun.}, volume = {135}, number = {2}, pages = {1285--1314}, year = {2024}, url = {https://doi.org/10.1007/s11277-024-11128-w}, doi = {10.1007/S11277-024-11128-W}, timestamp = {Wed, 22 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/KumarS24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/MadhounHJMA24, author = {Nour El Madhoun and Badis Hammi and Saad El Jaouhari and Djamel Mesbah and Elsi Ahmadieh}, editor = {Leonard Barolli}, title = {Addressing Security Challenges in Copyright Management Applications: The Blockchain Perspective}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 6}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {204}, pages = {169--182}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57942-4\_18}, doi = {10.1007/978-3-031-57942-4\_18}, timestamp = {Mon, 15 Apr 2024 14:21:46 +0200}, biburl = {https://dblp.org/rec/conf/aina/MadhounHJMA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/PhaenthongN24, author = {Ratiros Phaenthong and Sudsanguan Ngamsuriyaroj}, editor = {Leonard Barolli}, title = {Analyzing Security and Privacy Risks in Android Video Game Applications}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 6}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {204}, pages = {307--319}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57942-4\_30}, doi = {10.1007/978-3-031-57942-4\_30}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aina/PhaenthongN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/AhmedA24, author = {Sabrina Ahmed and Mohammed Zamshed Ali}, title = {Application-Specific Security in IoT Network}, booktitle = {21st {IEEE} Consumer Communications {\&} Networking Conference, {CCNC} 2024, Las Vegas, NV, USA, January 6-9, 2024}, pages = {636--637}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/CCNC51664.2024.10454649}, doi = {10.1109/CCNC51664.2024.10454649}, timestamp = {Tue, 26 Mar 2024 22:14:36 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/AhmedA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/KhooKRM24, author = {Yi Xuan Khoo and Rachael M. Kang and Tera L. Reynolds and Helena M. Mentis}, editor = {Florian 'Floyd' Mueller and Penny Kyburz and Julie R. Williamson and Corina Sas and Max L. Wilson and Phoebe O. Toups Dugas and Irina Shklovski}, title = {"That's Kind of Sus(picious)": The Comprehensiveness of Mental Health Application Users' Privacy and Security Concerns}, booktitle = {Proceedings of the {CHI} Conference on Human Factors in Computing Systems, {CHI} 2024, Honolulu, HI, USA, May 11-16, 2024}, pages = {789:1--789:16}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3613904.3642705}, doi = {10.1145/3613904.3642705}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/KhooKRM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpits/VoievodinR24, author = {Yevhenii Voievodin and Inna Rozlomii}, editor = {Volodymyr Sokolov and Vasyl Ustimenko and Tamara Radivilova and Mariya Nazarkevych}, title = {Application Security Optimization in Container Orchestration Systems Through Strategic Scheduler Decisions (short paper)}, booktitle = {Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems {(CPITS} 2024), Kyiv, Ukraine, February 28, 2024 (online)}, series = {{CEUR} Workshop Proceedings}, volume = {3654}, pages = {471--478}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3654/short16.pdf}, timestamp = {Thu, 11 Apr 2024 17:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cpits/VoievodinR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ehealth2/MaulKRW24, author = {Lukas Maul and Ines Kramer and Lena Rettinger and Franz Werner}, editor = {Dieter Hayn and Bernhard Pfeifer and G{\"{u}}nter Schreier and Martin Baumgartner}, title = {Should We Better Stick to Pen and Paper? An Empirical Investigation on Functionality, Privacy and Data-Security of Physiotherapy Telehealth Applications}, booktitle = {dHealth 2024 - Proceedings of the 18th Health Informatics Meets Digital Health Conference, Vienna, Austria, May 7-8, 2024}, series = {Studies in Health Technology and Informatics}, volume = {313}, pages = {93--100}, publisher = {{IOS} Press}, year = {2024}, url = {https://doi.org/10.3233/SHTI240018}, doi = {10.3233/SHTI240018}, timestamp = {Thu, 16 May 2024 14:30:22 +0200}, biburl = {https://dblp.org/rec/conf/ehealth2/MaulKRW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlagicBKMS24, author = {Gorjan Alagic and Chen Bai and Jonathan Katz and Christian Majenz and Patrick Struck}, editor = {Marc Joye and Gregor Leander}, title = {Post-quantum Security of Tweakable Even-Mansour, and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14651}, pages = {310--338}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58716-0\_11}, doi = {10.1007/978-3-031-58716-0\_11}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlagicBKMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Schage24, author = {Sven Sch{\"{a}}ge}, editor = {Marc Joye and Gregor Leander}, title = {New Limits of Provable Security and Applications to ElGamal Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14654}, pages = {255--285}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58737-5\_10}, doi = {10.1007/978-3-031-58737-5\_10}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Schage24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/KimKP24, author = {Sumin Kim and Minsek Ko and Chinju Paul}, editor = {Tung X. Bui}, title = {The Application of Rhetorical Theory in Designing Effective Information Security Messages for Different Leadership Styles}, booktitle = {57th Hawaii International Conference on System Sciences, {HICSS} 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024}, pages = {4794--4803}, publisher = {ScholarSpace}, year = {2024}, url = {https://hdl.handle.net/10125/106959}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/KimKP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/WongsunaN24, author = {Vatcharavaree Wongsuna and Sudsanguan Ngamsuriyaroj}, title = {Security Analysis of Android Applications for Hotel and Flight Booking Applications}, booktitle = {26th International Conference on Advanced Communications Technology, {ICACT} 2024, Pyeong Chang, Republic of Korea, February 4-7, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/ICACT60172.2024.10472010}, doi = {10.23919/ICACT60172.2024.10472010}, timestamp = {Wed, 10 Apr 2024 17:19:24 +0200}, biburl = {https://dblp.org/rec/conf/icact/WongsunaN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ShahSS24a, author = {Trishla Shah and Raghav V. Sampangi and Angela A. Siegel}, title = {Mobile Application Security Risk Score: {A} sensitive user input-based approach}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--10}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433828}, doi = {10.1109/ICAIC60265.2024.10433828}, timestamp = {Tue, 05 Mar 2024 21:04:39 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ShahSS24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/GuoDLZXH24, author = {Hanyang Guo and Hong{-}Ning Dai and Xiapu Luo and Zibin Zheng and Gengyang Xu and Fengliang He}, title = {An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy Perspectives}, booktitle = {Proceedings of the 46th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2024, Lisbon, Portugal, April 14-20, 2024}, pages = {159:1--159:13}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3597503.3639082}, doi = {10.1145/3597503.3639082}, timestamp = {Wed, 22 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/GuoDLZXH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vlsid/MekaMV24, author = {Juneet Kumar Meka and Satya AmarKant Marupureddy and Ranga Vemuri}, title = {Pattern Based Synthetic Benchmark Generation for Hardware Security Applications}, booktitle = {37th International Conference on {VLSI} Design and 23rd International Conference on Embedded Systems, {VLSID} 2024, Kolkata, India, January 6-10, 2024}, pages = {461--466}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/VLSID60093.2024.00083}, doi = {10.1109/VLSID60093.2024.00083}, timestamp = {Mon, 08 Apr 2024 20:48:39 +0200}, biburl = {https://dblp.org/rec/conf/vlsid/MekaMV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/PolinskyD0E24, author = {Isaac Polinsky and Pubali Datta and Adam Bates and William Enck}, editor = {Tat{-}Seng Chua and Chong{-}Wah Ngo and Ravi Kumar and Hady W. Lauw and Roy Ka{-}Wei Lee}, title = {{GRASP:} Hardening Serverless Applications through Graph Reachability Analysis of Security Policies}, booktitle = {Proceedings of the {ACM} on Web Conference 2024, {WWW} 2024, Singapore, May 13-17, 2024}, pages = {1644--1655}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3589334.3645436}, doi = {10.1145/3589334.3645436}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/PolinskyD0E24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/24/JavedQ24, author = {Ibrahim Tariq Javed and Kashif Naseer Qureshi}, editor = {Kashif Naseer Qureshi and Thomas Newe and Gwanggil Jeon and Abdellah Chehri}, title = {Role of Blockchain for IoE Infrastructures and Applications}, booktitle = {Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing}, pages = {127--139}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-45162-1\_8}, doi = {10.1007/978-3-031-45162-1\_8}, timestamp = {Thu, 04 Jan 2024 17:09:15 +0100}, biburl = {https://dblp.org/rec/books/sp/24/JavedQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cesar/2023, editor = {Gurvan Le Guernic}, title = {Proceedings of the 30th Computer {\&} Electronics Security Application Rendezvous Conference (C{\&}ESAR 2023) co-located with the 8th European Cyber Week {(ECW} 2023), Rennes, France, November 21-22, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3610}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3610}, urn = {urn:nbn:de:0074-3610-9}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cesar/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisa/2023, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-99-9614-8}, doi = {10.1007/978-981-99-9614-8}, isbn = {978-981-99-9613-1}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2023, editor = {Howon Kim and Jonghee M. Youn}, title = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-99-8024-6}, doi = {10.1007/978-981-99-8024-6}, isbn = {978-981-99-8023-9}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-11126, author = {Hangsheng Zhang and Jiqiang Liu and Jinsong Dong}, title = {{CARE:} Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications}, journal = {CoRR}, volume = {abs/2401.11126}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.11126}, doi = {10.48550/ARXIV.2401.11126}, eprinttype = {arXiv}, eprint = {2401.11126}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-11126.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-12358, author = {Elena Baninemeh and Slinger Jansen and Katsiaryna Labunets}, title = {A Security Risk Assessment Method for Distributed Ledger Technology {(DLT)} based Applications: Three Industry Case Studies}, journal = {CoRR}, volume = {abs/2401.12358}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.12358}, doi = {10.48550/ARXIV.2401.12358}, eprinttype = {arXiv}, eprint = {2401.12358}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-12358.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-03591, author = {Tiago M. Fern{\'{a}}ndez{-}Caram{\'{e}}s and Paula Fraga{-}Lamas and Manuel Su{\'{a}}rez{-}Albela and Luis Castedo}, title = {Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications}, journal = {CoRR}, volume = {abs/2402.03591}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.03591}, doi = {10.48550/ARXIV.2402.03591}, eprinttype = {arXiv}, eprint = {2402.03591}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-03591.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-13815, author = {Hanyang Guo and Hong{-}Ning Dai and Xiapu Luo and Zibin Zheng and Gengyang Xu and Fengliang He}, title = {An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy Perspectives}, journal = {CoRR}, volume = {abs/2402.13815}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.13815}, doi = {10.48550/ARXIV.2402.13815}, eprinttype = {arXiv}, eprint = {2402.13815}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-13815.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-09219, author = {Matteo Esposito and Valentina Falaschi and Davide Falessi}, title = {An Extensive Comparison of Static Application Security Testing Tools}, journal = {CoRR}, volume = {abs/2403.09219}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.09219}, doi = {10.48550/ARXIV.2403.09219}, eprinttype = {arXiv}, eprint = {2403.09219}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-09219.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-16304, author = {Omar Alrawi and Miuyin Yong Wong and Athanasios Avgetidis and Kevin Valakuzhy and Boladji Vinny Adjibi and Konstantinos Karakatsanis and Mustaque Ahamad and Douglas M. Blough and Fabian Monrose and Manos Antonakakis}, title = {SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned}, journal = {CoRR}, volume = {abs/2403.16304}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.16304}, doi = {10.48550/ARXIV.2403.16304}, eprinttype = {arXiv}, eprint = {2403.16304}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-16304.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-17787, author = {Fouad Trad and Ali Chehab}, title = {Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models Versus Fine-Tuned Vision Transformers in Image-Based Security Applications}, journal = {CoRR}, volume = {abs/2403.17787}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.17787}, doi = {10.48550/ARXIV.2403.17787}, eprinttype = {arXiv}, eprint = {2403.17787}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-17787.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-11388, author = {Akinsola Ahmed and Ejiofor Oluomachi and Akinde Abdullah and Njoku Tochukwu}, title = {Enhancing Data Privacy In Wireless Sensor Networks: Investigating Techniques And Protocols To Protect Privacy Of Data Transmitted Over Wireless Sensor Networks In Critical Applications Of Healthcare And National Security}, journal = {CoRR}, volume = {abs/2404.11388}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.11388}, doi = {10.48550/ARXIV.2404.11388}, eprinttype = {arXiv}, eprint = {2404.11388}, timestamp = {Wed, 22 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-11388.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-17955, author = {Jia Zeng and Dan Han and Yaling Zhu and Yangzhong Wang and Fangchen Weng}, title = {A Survey of Third-Party Library Security Research in Application Software}, journal = {CoRR}, volume = {abs/2404.17955}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.17955}, doi = {10.48550/ARXIV.2404.17955}, eprinttype = {arXiv}, eprint = {2404.17955}, timestamp = {Mon, 27 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-17955.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-18186, author = {Kaixuan Li and Yue Xue and Sen Chen and Han Liu and Kairan Sun and Ming Hu and Haijun Wang and Yang Liu and Yixiang Chen}, title = {Static Application Security Testing {(SAST)} Tools for Smart Contracts: How Far Are We?}, journal = {CoRR}, volume = {abs/2404.18186}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.18186}, doi = {10.48550/ARXIV.2404.18186}, eprinttype = {arXiv}, eprint = {2404.18186}, timestamp = {Mon, 27 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-18186.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Spell23, author = {Gregory Spell}, title = {Deep Learning for Applications in Inverse Modeling, Legislator Analysis, and Computer Vision for Security}, school = {Duke University, Durham, NC, {USA}}, year = {2023}, url = {https://hdl.handle.net/10161/27647}, timestamp = {Sat, 01 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Spell23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Tawose23, author = {Olamide Timothy Tawose}, title = {Harnessing the Power of Distributed Computing: Advancements in Scientific Applications, Homomorphic Encryption, and Federated Learning Security}, school = {University of Nevada, Reno, {USA}}, year = {2023}, url = {http://hdl.handle.net/11714/10520}, timestamp = {Sun, 29 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Tawose23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Frey23, author = {Matthias Frey}, title = {Distributed function approximation over noisy channels: with reliability and security guarantees for applications in wireless networks}, school = {Technical University of Berlin, Germany}, year = {2023}, url = {https://d-nb.info/127907745X}, urn = {urn:nbn:de:101:1-2023012500591671650836}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Frey23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Mues23, author = {Malte Mues}, title = {The integration of multi-color taint-analysis with dynamic symbolic execution for Java web application security analysis}, school = {Technical University of Dortmund, Germany}, year = {2023}, url = {http://hdl.handle.net/2003/41851}, urn = {urn:nbn:de:101:1-2023063012441907332002}, doi = {10.17877/DE290R-23694}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/dnb/Mues23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/sg/Liu23, author = {Ye Liu}, title = {On security and reliability of smart contracts: the applications of dynamic specification mining on solidity}, school = {Nanyang Technological University, Singapore}, year = {2023}, url = {https://doi.org/10.32657/10356/168560}, doi = {10.32657/10356/168560}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/sg/Liu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/tr/Ozogur23, author = {Gokhan Ozogur}, title = {Makine {\"{o}}{\u{g}}renmesi yakla{\c{s}}{\i}m{\i} ile android uygulamalar{\i}n{\i}n g{\"{u}}venlik analizi (Security analysis of android applications with machine learning approach)}, school = {{\.{I}}stanbul University-Cerrahpa{\c{s}}a, Turkey}, year = {2023}, url = {https://tez.yok.gov.tr/UlusalTezMerkezi/tezDetay.jsp?id=e0-mwM4YzBrbNY2zMMJkoA\&no=D4KsoZm9Lv4k3ZMnqLqyGw}, timestamp = {Sun, 03 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/tr/Ozogur23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/Moller23, author = {Dietmar P. F. M{\"{o}}ller}, title = {Guide to Cybersecurity in Digital Transformation - Trends, Methods, Technologies, Applications and Best Practices}, series = {Advances in Information Security}, volume = {103}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-26845-8}, doi = {10.1007/978-3-031-26845-8}, isbn = {978-3-031-26844-1}, timestamp = {Sun, 14 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Moller23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlGhailiGJAAIBKHOKR23, author = {Abbas M. Al{-}Ghaili and Saraswathy Shamini Gunasekaran and Norziana Jamil and Zaid Abdi Alkareem Alyasseri and Naif Mohammed Al{-}Hada and Zul{-}Azri Bin Ibrahim and Asmidar Abu Bakar and Hairoladenan Kasim and Eghbal Hosseini and Ridha Omar and Rafiziana Md. Kasmani and Rina Azlin Razali}, title = {A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications}, journal = {{IEEE} Access}, volume = {11}, pages = {101924--101948}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3312682}, doi = {10.1109/ACCESS.2023.3312682}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AlGhailiGJAAIBKHOKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BurhanAARAFA23, author = {Muhammad Burhan and Hina Alam and Ahmad Arsalan and Rana Asif Rehman and Muhammad Anwar and Muhammad Faheem and Muhammad Waqar Ashraf}, title = {A Comprehensive Survey on the Cooperation of Fog Computing Paradigm-Based IoT Applications: Layered Architecture, Real-Time Security Issues, and Solutions}, journal = {{IEEE} Access}, volume = {11}, pages = {73303--73329}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3294479}, doi = {10.1109/ACCESS.2023.3294479}, timestamp = {Fri, 28 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BurhanAARAFA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/EkolleOK23, author = {Zie Eya Ekolle and Hideki Ochiai and Ryuji Kohno}, title = {Collabo: {A} Collaborative Machine Learning Model and Its Application to the Security of Heterogeneous Medical Data in an IoT Network}, journal = {{IEEE} Access}, volume = {11}, pages = {142663--142675}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3341837}, doi = {10.1109/ACCESS.2023.3341837}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/EkolleOK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GabaKAJBKSSAA23, author = {Shivani Gaba and Haneef Khan and Khalid J. Almalki and Abdoh M. A. Jabbari and Ishan Budhiraja and Vimal Kumar and Akansha Singh and Krishna Kant Singh and Sameh S. Askar and Mohamed Abouhawwash}, title = {Holochain: An Agent-Centric Distributed Hash Table Security in Smart IoT Applications}, journal = {{IEEE} Access}, volume = {11}, pages = {81205--81223}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3300220}, doi = {10.1109/ACCESS.2023.3300220}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GabaKAJBKSSAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MehrzadDMSA23, author = {Alireza Mehrzad and Milad Darmiani and Yashar Mousavi and Miadreza Shafie{-}Khah and Mohammad Reza Aghamohammadi}, title = {A Review on Data-Driven Security Assessment of Power Systems: Trends and Applications of Artificial Intelligence}, journal = {{IEEE} Access}, volume = {11}, pages = {78671--78685}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3299208}, doi = {10.1109/ACCESS.2023.3299208}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MehrzadDMSA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RafieiRI23, author = {Mehdi Rafiei and Jenni Raitoharju and Alexandros Iosifidis}, title = {Computer Vision on X-Ray Data in Industrial Production and Security Applications: {A} Comprehensive Survey}, journal = {{IEEE} Access}, volume = {11}, pages = {2445--2477}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3234187}, doi = {10.1109/ACCESS.2023.3234187}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RafieiRI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZookerWFK23, author = {David Zooker and Yoav Weizman and Alexander Fish and Osnat Keren}, title = {Silicon Proven 1.29 {\(\mu\)}m {\texttimes} 1.8 {\(\mu\)}m 65nm Sub-Vt Optical Sensor for Hardware Security Applications}, journal = {{IEEE} Access}, volume = {11}, pages = {136269--136278}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3338001}, doi = {10.1109/ACCESS.2023.3338001}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZookerWFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/air/YadavKS23, author = {Ashok Yadav and Atul Kumar and Vrijendra Singh}, title = {Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security}, journal = {Artif. Intell. Rev.}, volume = {56}, number = {11}, pages = {12407--12438}, year = {2023}, url = {https://doi.org/10.1007/s10462-023-10454-y}, doi = {10.1007/S10462-023-10454-Y}, timestamp = {Mon, 02 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/air/YadavKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/array/YaoLLJXL23, author = {Aiting Yao and Gang Li and Xuejun Li and Frank Jiang and Jia Xu and Xiao Liu}, title = {Differential privacy in edge computing-based smart city Applications:Security issues, solutions and future directions}, journal = {Array}, volume = {19}, pages = {100293}, year = {2023}, url = {https://doi.org/10.1016/j.array.2023.100293}, doi = {10.1016/J.ARRAY.2023.100293}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/array/YaoLLJXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cejcs/ZhangJJH23, author = {Yajuan Zhang and Ru Jing and Xiang Ji and Nan Hu}, title = {Application of wireless sensor network technology based on artificial intelligence in security monitoring system}, journal = {Open Comput. Sci.}, volume = {13}, number = {1}, year = {2023}, url = {https://doi.org/10.1515/comp-2022-0280}, doi = {10.1515/COMP-2022-0280}, timestamp = {Mon, 16 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cejcs/ZhangJJH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cleiej/SyamsuddinDA23, author = {Irfan Syamsuddin and Alimin Daude and David Al{-}Dabass}, title = {The Application of Ternary {AHP} in Adopting Security Certifications into Vocational Cyber Security Course}, journal = {{CLEI} Electron. J.}, volume = {26}, number = {2}, year = {2023}, url = {https://doi.org/10.19153/cleiej.26.2.8}, doi = {10.19153/CLEIEJ.26.2.8}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cleiej/SyamsuddinDA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cogcom/FaundezZanuyM23, author = {Marcos Fa{\'{u}}ndez{-}Zanuy and Jir{\'{\i}} Mekyska}, title = {Analysis of Gender Differences in Online Handwriting Signals for Enhancing e-Health and e-Security Applications}, journal = {Cogn. Comput.}, volume = {15}, number = {1}, pages = {208--219}, year = {2023}, url = {https://doi.org/10.1007/s12559-023-10116-9}, doi = {10.1007/S12559-023-10116-9}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cogcom/FaundezZanuyM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/CoelhoNVSN23, author = {Kristtopher Kayo Coelho and Michele Nogueira and Alex Borges Vieira and Edelberto F. Silva and Jos{\'{e}} Augusto Miranda Nacif}, title = {A survey on federated learning for security and privacy in healthcare applications}, journal = {Comput. Commun.}, volume = {207}, pages = {113--127}, year = {2023}, url = {https://doi.org/10.1016/j.comcom.2023.05.012}, doi = {10.1016/J.COMCOM.2023.05.012}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/CoelhoNVSN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/XuLY23, author = {Feihong Xu and Shubo Liu and Xu Yang}, title = {An efficient privacy-preserving authentication scheme with enhanced security for IoMT applications}, journal = {Comput. Commun.}, volume = {208}, pages = {171--178}, year = {2023}, url = {https://doi.org/10.1016/j.comcom.2023.06.012}, doi = {10.1016/J.COMCOM.2023.06.012}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/XuLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiCAGPZ23, author = {Jingjin Li and Chao Chen and Mostafa Rahimi Azghadi and Hossein Ghodosi and Lei Pan and Jun Zhang}, title = {Security and privacy problems in voice assistant applications: {A} survey}, journal = {Comput. Secur.}, volume = {134}, pages = {103448}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103448}, doi = {10.1016/J.COSE.2023.103448}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiCAGPZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WenK23, author = {Shao{-}Fang Wen and Basel Katt}, title = {A quantitative security evaluation and analysis model for web applications based on {OWASP} application security verification standard}, journal = {Comput. Secur.}, volume = {135}, pages = {103532}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103532}, doi = {10.1016/J.COSE.2023.103532}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WenK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/AbdulghaffarEY23, author = {Khaled Abdulghaffar and Nebrase Elmrabit and Mehdi Yousefi}, title = {Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners}, journal = {Comput.}, volume = {12}, number = {11}, pages = {235}, year = {2023}, url = {https://doi.org/10.3390/computers12110235}, doi = {10.3390/COMPUTERS12110235}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computers/AbdulghaffarEY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/Nedyalkov23a, author = {Ivan Nedyalkov}, title = {Application of {GNS3} to Study the Security of Data Exchange between Power Electronic Devices and Control Center}, journal = {Comput.}, volume = {12}, number = {5}, pages = {101}, year = {2023}, url = {https://doi.org/10.3390/computers12050101}, doi = {10.3390/COMPUTERS12050101}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computers/Nedyalkov23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/RamaiahCR23, author = {Mangayarkarasi Ramaiah and Vanmathi Chandrasekaran and Vinayakumar Ravi}, title = {A robust malware traffic classifier to combat security breaches in industry 4.0 applications}, journal = {Concurr. Comput. Pract. Exp.}, volume = {35}, number = {23}, year = {2023}, url = {https://doi.org/10.1002/cpe.7772}, doi = {10.1002/CPE.7772}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/RamaiahCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csr/VermaCA23, author = {Himanshu Verma and Naveen Chauhan and Lalit Kumar Awasthi}, title = {A Comprehensive review of '\emph{Internet of Healthcare Things}': Networking aspects, technologies, services, applications, challenges, and security concerns}, journal = {Comput. Sci. Rev.}, volume = {50}, pages = {100591}, year = {2023}, url = {https://doi.org/10.1016/j.cosrev.2023.100591}, doi = {10.1016/J.COSREV.2023.100591}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csr/VermaCA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/ShafaiKEEA23, author = {Walid El Shafai and Fatma Khallaf and El{-}Sayed M. El{-}Rabaie and Fathi E. Abd El{-}Samie and Iman M. Almomani}, title = {A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications}, journal = {Comput. Syst. Sci. Eng.}, volume = {46}, number = {3}, pages = {3599--3618}, year = {2023}, url = {https://doi.org/10.32604/csse.2023.037655}, doi = {10.32604/CSSE.2023.037655}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csse/ShafaiKEEA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/YangLLHJLS23, author = {Aimin Yang and Chaomeng Lu and Jie Li and Xiangdong Huang and Tianhao Ji and Xichang Li and Yichao Sheng}, title = {Application of meta-learning in cyberspace security: a survey}, journal = {Digit. Commun. Networks}, volume = {9}, number = {1}, pages = {67--78}, year = {2023}, url = {https://doi.org/10.1016/j.dcan.2022.03.007}, doi = {10.1016/J.DCAN.2022.03.007}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcan/YangLLHJLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/YangMZHHZHW23, author = {Aimin Yang and Zezhong Ma and Chunying Zhang and Yang Han and Zhibin Hu and Wei Zhang and Xiangdong Huang and Yafeng Wu}, title = {Review on application progress of federated learning model and security hazard protection}, journal = {Digit. Commun. Networks}, volume = {9}, number = {1}, pages = {146--158}, year = {2023}, url = {https://doi.org/10.1016/j.dcan.2022.11.006}, doi = {10.1016/J.DCAN.2022.11.006}, timestamp = {Mon, 20 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcan/YangMZHHZHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eis/LinXHZ23, author = {Wenjun Lin and Ming Xu and Jingyi He and Wen{-}Jun Zhang}, title = {Privacy, security and resilience in mobile healthcare applications}, journal = {Enterp. Inf. Syst.}, volume = {17}, number = {3}, year = {2023}, url = {https://doi.org/10.1080/17517575.2021.1939896}, doi = {10.1080/17517575.2021.1939896}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eis/LinXHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/KangLWML23, author = {Hongzhaoning Kang and Gang Liu and Quan Wang and Lei Meng and Jing Liu}, title = {Theory and Application of Zero Trust Security: {A} Brief Survey}, journal = {Entropy}, volume = {25}, number = {12}, pages = {1595}, year = {2023}, url = {https://doi.org/10.3390/e25121595}, doi = {10.3390/E25121595}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/KangLWML23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/es/SunHL23, author = {Jingyun Sun and Shaobin Huang and Rongsheng Li}, title = {An unsupervised policy relevance scoring method: Taking Chinese social security policies as the application case}, journal = {Expert Syst. J. Knowl. Eng.}, volume = {40}, number = {2}, year = {2023}, url = {https://doi.org/10.1111/exsy.13149}, doi = {10.1111/EXSY.13149}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/es/SunHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/AbasDT23, author = {Sherhan Upahm Abas and Fecir Duran and Adem Tekerek}, title = {A Raspberry Pi based blockchain application on IoT security}, journal = {Expert Syst. Appl.}, volume = {229}, number = {Part {A}}, pages = {120486}, year = {2023}, url = {https://doi.org/10.1016/j.eswa.2023.120486}, doi = {10.1016/J.ESWA.2023.120486}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/AbasDT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/BihariSK23, author = {Rakhi Bihari and Jeevaraj Selvaraj and Ajay Kumar}, title = {Geometric approach for ranking generalized trapezoidal fuzzy numbers and its application in selecting security guard service company}, journal = {Expert Syst. Appl.}, volume = {234}, pages = {121052}, year = {2023}, url = {https://doi.org/10.1016/j.eswa.2023.121052}, doi = {10.1016/J.ESWA.2023.121052}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/BihariSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/MingHZ23, author = {Hao Ming and Hanping Hu and Jun Zheng}, title = {Design and application of a structure-varying coupled chaotic system with high security}, journal = {Expert Syst. Appl.}, volume = {226}, pages = {120158}, year = {2023}, url = {https://doi.org/10.1016/j.eswa.2023.120158}, doi = {10.1016/J.ESWA.2023.120158}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/MingHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiLWYMZH23, author = {Hao Li and Chengcheng Li and Jian Wang and Aimin Yang and Zezhong Ma and Zunqian Zhang and Dianbo Hua}, title = {Review on security of federated learning and its application in healthcare}, journal = {Future Gener. Comput. Syst.}, volume = {144}, pages = {271--290}, year = {2023}, url = {https://doi.org/10.1016/j.future.2023.02.021}, doi = {10.1016/J.FUTURE.2023.02.021}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LiLWYMZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/RahmanHKIDBK23, author = {Anichur Rahman and Kamrul Hasan and Dipanjali Kundu and Md. Jahidul Islam and Tanoy Debnath and Shahab S. Band and Neeraj Kumar}, title = {On the ICN-IoT with federated learning integration of communication: Concepts, security-privacy issues, applications, and future perspectives}, journal = {Future Gener. Comput. Syst.}, volume = {138}, pages = {61--88}, year = {2023}, url = {https://doi.org/10.1016/j.future.2022.08.004}, doi = {10.1016/J.FUTURE.2022.08.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/RahmanHKIDBK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/YangBXLL23, author = {Aimin Yang and Yunjie Bai and Tao Xue and Yifan Li and Jie Li}, title = {A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security}, journal = {Future Gener. Comput. Syst.}, volume = {145}, pages = {293--302}, year = {2023}, url = {https://doi.org/10.1016/j.future.2023.03.035}, doi = {10.1016/J.FUTURE.2023.03.035}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/YangBXLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/PoletoNCFOF23, author = {Thiago Poleto and Thyago Celso Cavalcante Nepomuceno and Victor Diogho Heuer de Carvalho and Ligiane Cristina Braga de Oliveira Friaes and Rodrigo Cleiton Paiva de Oliveira and Ciro Jos{\'{e}} Jardim de Figueiredo}, title = {Information Security Applications in Smart Cities: {A} Bibliometric Analysis of Emerging Research}, journal = {Future Internet}, volume = {15}, number = {12}, pages = {393}, year = {2023}, url = {https://doi.org/10.3390/fi15120393}, doi = {10.3390/FI15120393}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/PoletoNCFOF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/SzaboB23, author = {Zolt{\'{a}}n Szab{\'{o}} and Vilmos Bilicki}, title = {A New Approach to Web Application Security: Utilizing {GPT} Language Models for Source Code Inspection}, journal = {Future Internet}, volume = {15}, number = {10}, pages = {326}, year = {2023}, url = {https://doi.org/10.3390/fi15100326}, doi = {10.3390/FI15100326}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/SzaboB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/UtomoRHH23, author = {Sapdo Utomo and Adarsh Rouniyar and Hsiu{-}Chun Hsu and Pao{-}Ann Hsiung}, title = {Federated Adversarial Training Strategies for Achieving Privacy and Security in Sustainable Smart City Applications}, journal = {Future Internet}, volume = {15}, number = {11}, pages = {371}, year = {2023}, url = {https://doi.org/10.3390/fi15110371}, doi = {10.3390/FI15110371}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/UtomoRHH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/grid/RajuRSL23, author = {K. Raju and N. Ramshankar and J. Anvar Shathik and R. Lavanya}, title = {Blockchain Assisted Cloud Security and Privacy Preservation using Hybridized Encryption and Deep Learning Mechanism in IoT-Healthcare Application}, journal = {J. Grid Comput.}, volume = {21}, number = {3}, pages = {45}, year = {2023}, url = {https://doi.org/10.1007/s10723-023-09678-7}, doi = {10.1007/S10723-023-09678-7}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/grid/RajuRSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/grid/Yi23, author = {Haibo Yi}, title = {Machine Learning Method with Applications in Hardware Security of Post-Quantum Cryptography}, journal = {J. Grid Comput.}, volume = {21}, number = {2}, pages = {19}, year = {2023}, url = {https://doi.org/10.1007/s10723-023-09643-4}, doi = {10.1007/S10723-023-09643-4}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/grid/Yi23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KrishnanCLBK23, author = {Padmanabhan Krishnan and Cristina Cifuentes and Li Li and Tegawend{\'{e}} F. Bissyand{\'{e}} and Jacques Klein}, title = {Why Is Static Application Security Testing Hard to Learn?}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {5}, pages = {68--72}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3287206}, doi = {10.1109/MSEC.2023.3287206}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/KrishnanCLBK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-blc/WangSDWZ23, author = {Liangmin Wang and Victor S. Sheng and Boris D{\"{u}}dder and Haiqin Wu and Huijuan Zhu}, title = {Security and privacy issues in blockchain and its applications}, journal = {{IET} Blockchain}, volume = {3}, number = {4}, pages = {169--171}, year = {2023}, url = {https://doi.org/10.1049/blc2.12051}, doi = {10.1049/BLC2.12051}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-blc/WangSDWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/Zhou23, author = {Guangping Zhou}, title = {Security technology for data transmission to the internet of things devices under the application of blockchain technology}, journal = {Int. J. Grid Util. Comput.}, volume = {14}, number = {2/3}, pages = {122--135}, year = {2023}, url = {https://doi.org/10.1504/IJGUC.2023.10056297}, doi = {10.1504/IJGUC.2023.10056297}, timestamp = {Wed, 31 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/Zhou23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SalankarAP23, author = {Pritam S. Salankar and Vinay Avasthi and Ashutosh Pasricha}, title = {Lightweight authentication scheme based on modified {EAP} security for CoAP protocol-based IoMT applications}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {1/2}, pages = {176--198}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2022.10044087}, doi = {10.1504/IJICS.2022.10044087}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SalankarAP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AlidoostiNN23, author = {Mitra Alidoosti and Alireza Nowroozi and Ahmad Nickabadi}, title = {Business-layer client-side racer: dynamic security testing of the web application against client-side race condition in the business layer}, journal = {Int. J. Inf. Sec.}, volume = {22}, number = {4}, pages = {1029--1054}, year = {2023}, url = {https://doi.org/10.1007/s10207-023-00671-5}, doi = {10.1007/S10207-023-00671-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AlidoostiNN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LovrencicS23, author = {Rudolf Lovrencic and Dejan Skvorc}, title = {Multi-cloud applications: data and code fragmentation for improved security}, journal = {Int. J. Inf. Sec.}, volume = {22}, number = {3}, pages = {713--721}, year = {2023}, url = {https://doi.org/10.1007/s10207-022-00658-8}, doi = {10.1007/S10207-022-00658-8}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/LovrencicS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmi/OffermannRZ23, author = {Julia Offermann and Anna Rohowsky and Martina Ziefle}, title = {Emotions of scepticism, trust, and security within the acceptance of telemedical applications}, journal = {Int. J. Medical Informatics}, volume = {177}, pages = {105116}, year = {2023}, url = {https://doi.org/10.1016/j.ijmedinf.2023.105116}, doi = {10.1016/J.IJMEDINF.2023.105116}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmi/OffermannRZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/ChuiGLANAC23, author = {Kwok Tai Chui and Brij B. Gupta and Jiaqi Liu and Varsha Arya and Nadia Nedjah and Ammar Almomani and Priyanka Chaurasia}, title = {A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions}, journal = {Inf.}, volume = {14}, number = {7}, pages = {388}, year = {2023}, url = {https://doi.org/10.3390/info14070388}, doi = {10.3390/INFO14070388}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/ChuiGLANAC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/VuTAKGE23, author = {Viet Q. Vu and Minh{-}Quang Tran and Mohammed Amer and Mahesh Khatiwada and Sherif S. M. Ghoneim and Mahmoud Elsisi}, title = {A Practical Hybrid IoT Architecture with Deep Learning Technique for Healthcare and Security Applications}, journal = {Inf.}, volume = {14}, number = {7}, pages = {379}, year = {2023}, url = {https://doi.org/10.3390/info14070379}, doi = {10.3390/INFO14070379}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/VuTAKGE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/NayakS23, author = {Padmalaya Nayak and G. Swapna}, title = {Security issues in IoT applications using certificateless aggregate signcryption schemes: An overview}, journal = {Internet Things}, volume = {21}, pages = {100641}, year = {2023}, url = {https://doi.org/10.1016/j.iot.2022.100641}, doi = {10.1016/J.IOT.2022.100641}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iot/NayakS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ChengM23, author = {Leixiao Cheng and Fei Meng}, title = {Certificateless Public Key Authenticated Searchable Encryption With Enhanced Security Model in IIoT Applications}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {2}, pages = {1391--1400}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3207229}, doi = {10.1109/JIOT.2022.3207229}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ChengM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WenWDZQY23, author = {Baodong Wen and Yujue Wang and Yong Ding and Haibin Zheng and Bo Qin and Changsong Yang}, title = {Security and privacy protection technologies in securing blockchain applications}, journal = {Inf. Sci.}, volume = {645}, pages = {119322}, year = {2023}, url = {https://doi.org/10.1016/j.ins.2023.119322}, doi = {10.1016/J.INS.2023.119322}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/WenWDZQY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isrob/MohsanOLAK23, author = {Syed Agha Hassnain Mohsan and Nawaf Qasem Hamood Othman and Yanlong Li and Mohammed H. Alsharif and Muhammad Asghar Khan}, title = {Unmanned aerial vehicles (UAVs): practical aspects, applications, open challenges, security issues, and future trends}, journal = {Intell. Serv. Robotics}, volume = {16}, number = {1}, pages = {109--137}, year = {2023}, url = {https://doi.org/10.1007/s11370-022-00452-4}, doi = {10.1007/S11370-022-00452-4}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isrob/MohsanOLAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DashPSS23, author = {Priyabrata Dash and Fagul Pandey and Monalisa Sarma and Debasis Samanta}, title = {Efficient private key generation from iris data for privacy and security applications}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103506}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103506}, doi = {10.1016/J.JISA.2023.103506}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DashPSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/AlkhabetI23, author = {Mohammed Majeed Alkhabet and Mahamod Ismail}, title = {Security algorithms for distributed storage system for E-health application over wireless body area network}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {14}, number = {12}, pages = {15781--15792}, year = {2023}, url = {https://doi.org/10.1007/s12652-020-02733-1}, doi = {10.1007/S12652-020-02733-1}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/AlkhabetI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/BhartiBS23, author = {Vandana Bharti and Bhaskar Biswas and Kaushal Kumar Shukla}, title = {{MDO:} a novel murmuration-flight based dispersive optimization algorithm and its application to image security}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {14}, number = {5}, pages = {4809--4826}, year = {2023}, url = {https://doi.org/10.1007/s12652-023-04537-5}, doi = {10.1007/S12652-023-04537-5}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/BhartiBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/ChenLZHCZ23, author = {Hongsong Chen and Shi Lei and Yiying Zhang and Xintong Han and Yongrui Cao and Yongpeng Zhang}, title = {Blockchain-based internet of things security architecture and applications}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {14}, number = {12}, pages = {16703--16714}, year = {2023}, url = {https://doi.org/10.1007/s12652-023-04675-w}, doi = {10.1007/S12652-023-04675-W}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/ChenLZHCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/RaoD23, author = {Patruni Muralidhara Rao and Bakkiam David Deebak}, title = {Security and privacy issues in smart cities/industries: technologies, applications, and challenges}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {14}, number = {8}, pages = {10517--10553}, year = {2023}, url = {https://doi.org/10.1007/s12652-022-03707-1}, doi = {10.1007/S12652-022-03707-1}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/RaoD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcmse/LiuLMJGGJ23, author = {Zehui Liu and Rui Li and Dongjuan Ma and Weizhe Jing and Min Guo and Weixing Gao and Yun Ju}, title = {Research on reliable transmission and application security architecture of power IoT based on energy interconnection}, journal = {J. Comput. Methods Sci. Eng.}, volume = {23}, number = {4}, pages = {2141--2152}, year = {2023}, url = {https://doi.org/10.3233/JCM-226748}, doi = {10.3233/JCM-226748}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcmse/LiuLMJGGJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcmse/ZhangLL23, author = {Jie Zhang and Yukun Lu and Sen Lin}, title = {The application of UAVs in marathon public security risk early warning}, journal = {J. Comput. Methods Sci. Eng.}, volume = {23}, number = {5}, pages = {2753--2764}, year = {2023}, url = {https://doi.org/10.3233/JCM-226891}, doi = {10.3233/JCM-226891}, timestamp = {Mon, 09 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcmse/ZhangLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfi/WangJABKA23, author = {Bo Wang and Hadi Jahanshahi and Burak Aricioglu and Baris Boru and Sezgin Ka{\c{c}}ar and Naif D. Alotaibi}, title = {A variable-order fractional neural network: Dynamical properties, data security application, and synchronization using a novel control algorithm with a finite-time estimator}, journal = {J. Frankl. Inst.}, volume = {360}, number = {17}, pages = {13648--13670}, year = {2023}, url = {https://doi.org/10.1016/j.jfranklin.2022.04.036}, doi = {10.1016/J.JFRANKLIN.2022.04.036}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jfi/WangJABKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jgim/WangXZ23, author = {Yawen Wang and Weixian Xue and Anqi Zhang}, title = {Application of Big Data Technology in Enterprise Information Security Management and Risk Assessment}, journal = {J. Glob. Inf. Manag.}, volume = {31}, number = {3}, pages = {1--16}, year = {2023}, url = {https://doi.org/10.4018/jgim.324465}, doi = {10.4018/JGIM.324465}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jgim/WangXZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/DineshSRS23, author = {E. Dinesh and M. Sivakumar and R. Rajalakshmi and P. Sivakumar}, title = {Trust based access control with hybrid cryptographic algorithm based data security on cloud for e-learning application}, journal = {J. Intell. Fuzzy Syst.}, volume = {45}, number = {5}, pages = {7563--7573}, year = {2023}, url = {https://doi.org/10.3233/jifs-224287}, doi = {10.3233/JIFS-224287}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/DineshSRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/GargKAM23, author = {Harish Garg and Cengiz Kahraman and Zeeshan Ali and Tahir Mahmood}, title = {Interaction hamy mean operators for complex pythagorean fuzzy information and their applications to security threats in computers}, journal = {J. Intell. Fuzzy Syst.}, volume = {44}, number = {3}, pages = {4459--4479}, year = {2023}, url = {https://doi.org/10.3233/JIFS-220947}, doi = {10.3233/JIFS-220947}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/GargKAM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/NavaneethanJ23, author = {M. Navaneethan and S. Janakiraman}, title = {An optimized deep learning model to ensure data integrity and security in IoT based e-commerce block chain application}, journal = {J. Intell. Fuzzy Syst.}, volume = {44}, number = {5}, pages = {8697--8709}, year = {2023}, url = {https://doi.org/10.3233/JIFS-220743}, doi = {10.3233/JIFS-220743}, timestamp = {Sat, 03 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/NavaneethanJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/Qiao23, author = {Wenbao Qiao}, title = {A novel {MADM} technique based on projection methods under q-rung orthopair fuzzy setting and its application to computer network security evaluation}, journal = {J. Intell. Fuzzy Syst.}, volume = {45}, number = {1}, pages = {1029--1038}, year = {2023}, url = {https://doi.org/10.3233/JIFS-231351}, doi = {10.3233/JIFS-231351}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/Qiao23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/QahtanSZOZA23, author = {Sarah Qahtan and Khaironi Yatim Sharif and Hazura Zulzalil and Mohd Hafeez Osman and A. A. Zaidan and Hassan A. AlSattar}, title = {Review of healthcare industry 4.0 application-based blockchain in terms of security and privacy development attributes: Comprehensive taxonomy, open issues and challenges and recommended solution}, journal = {J. Netw. Comput. Appl.}, volume = {209}, pages = {103529}, year = {2023}, url = {https://doi.org/10.1016/j.jnca.2022.103529}, doi = {10.1016/J.JNCA.2022.103529}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/QahtanSZOZA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocnet/CuginiSGSMCP22, author = {Filippo Cugini and Davide Scano and Alessio Giorgetti and Andrea Sgambelluri and Lorenzo De Marinis and Piero Castoldi and Francesco Paolucci}, title = {Telemetry and AI-based security {P4} applications for optical networks [Invited]}, journal = {{JOCN}}, volume = {15}, number = {1}, pages = {A1--A10}, year = {2023}, url = {https://doi.org/10.1364/jocn.470118}, doi = {10.1364/JOCN.470118}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocnet/CuginiSGSMCP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/FangLZCL23, author = {Shuya Fang and Qingquan Liu and Fengrui Zhang and Ningyan Chen and Xin Li}, title = {Application of Internet of Things and Blockchain in Information Security and Privacy Protection of Global Organizations}, journal = {J. Organ. End User Comput.}, volume = {35}, number = {3}, pages = {1--16}, year = {2023}, url = {https://doi.org/10.4018/joeuc.323192}, doi = {10.4018/JOEUC.323192}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joeuc/FangLZCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrie/MariottiBLMN23, author = {Francesco Mariotti and Andrea Bondavalli and Paolo Lollini and Leonardo Montecchi and Simone Nardi}, title = {An extension of the {ADVISE} Meta modeling framework and its application for an early-stage security analysis of a public transport supervision system}, journal = {J. Reliab. Intell. Environ.}, volume = {9}, number = {3}, pages = {263--281}, year = {2023}, url = {https://doi.org/10.1007/s40860-023-00209-5}, doi = {10.1007/S40860-023-00209-5}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jrie/MariottiBLMN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/FerragMB23, author = {Mohamed Amine Ferrag and Leandros A. Maglaras and Mohamed Benbouzid}, title = {Blockchain and Artificial Intelligence as Enablers of Cyber Security in the Era of IoT and IIoT Applications}, journal = {J. Sens. Actuator Networks}, volume = {12}, number = {3}, pages = {40}, year = {2023}, url = {https://doi.org/10.3390/jsan12030040}, doi = {10.3390/JSAN12030040}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsan/FerragMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/SchneiderS23, author = {Simon Schneider and Riccardo Scandariato}, title = {Automatic extraction of security-rich dataflow diagrams for microservice applications written in Java}, journal = {J. Syst. Softw.}, volume = {202}, pages = {111722}, year = {2023}, url = {https://doi.org/10.1016/j.jss.2023.111722}, doi = {10.1016/J.JSS.2023.111722}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/SchneiderS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jstsp/XiaoDCL23, author = {Yuquan Xiao and Qinghe Du and Wenchi Cheng and Nan Lu}, title = {Secure Communication Guarantees for Diverse Extended-Reality Applications: {A} Unified Statistical Security Model}, journal = {{IEEE} J. Sel. Top. Signal Process.}, volume = {17}, number = {5}, pages = {1007--1021}, year = {2023}, url = {https://doi.org/10.1109/JSTSP.2023.3304117}, doi = {10.1109/JSTSP.2023.3304117}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jstsp/XiaoDCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/ChenWX23, author = {Jie Chen and Dandan Wu and Ruiyun Xie}, title = {Artificial intelligence algorithms for cyberspace security applications: a technological and status review}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {24}, number = {8}, pages = {1117--1142}, year = {2023}, url = {https://doi.org/10.1631/FITEE.2200314}, doi = {10.1631/FITEE.2200314}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jzusc/ChenWX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhangXZL23, author = {Yingpeng Zhang and Hongyue Xiang and Shijie Zhang and Lingfeng Liu}, title = {Construction of high-dimensional cyclic symmetric chaotic map with one-dimensional chaotic map and its security application}, journal = {Multim. Tools Appl.}, volume = {82}, number = {12}, pages = {17715--17740}, year = {2023}, url = {https://doi.org/10.1007/s11042-022-14044-y}, doi = {10.1007/S11042-022-14044-Y}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ZhangXZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/NayakAPM23, author = {Janmenjoy Nayak and David Al{-}Dabass and Danilo Pelusi and Manohar Mishra}, title = {Special issue on machine learning for security and privacy: advancing the state-of-the-art applications}, journal = {Neural Comput. Appl.}, volume = {35}, number = {7}, pages = {4809--4812}, year = {2023}, url = {https://doi.org/10.1007/s00521-022-08183-4}, doi = {10.1007/S00521-022-08183-4}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nca/NayakAPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ngc/AnbalaganRR23, author = {Vivek Yoganand Anbalagan and S. Rajasekaran and T. D. Rajeeve}, title = {A Novel ORLLTMLP-Based Attack Detection and Blockchain-Aware Security Framework Using {LCTFA} in Smart City Applications}, journal = {New Gener. Comput.}, volume = {41}, number = {2}, pages = {315--342}, year = {2023}, url = {https://doi.org/10.1007/s00354-023-00210-9}, doi = {10.1007/S00354-023-00210-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ngc/AnbalaganRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npl/SaranyaN23, author = {A. Saranya and R. Naresh}, title = {Efficient Mobile Security for {E} Health Care Application in Cloud for Secure Payment Using Key Distribution}, journal = {Neural Process. Lett.}, volume = {55}, number = {1}, pages = {141--152}, year = {2023}, url = {https://doi.org/10.1007/s11063-021-10482-1}, doi = {10.1007/S11063-021-10482-1}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/npl/SaranyaN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ojcs/NaeemAKHY23, author = {Faisal Naeem and Mansoor Ali and Georges Kaddoum and Chongwen Huang and Chau Yuen}, title = {Security and Privacy for Reconfigurable Intelligent Surface in 6G: {A} Review of Prospective Applications and Challenges}, journal = {{IEEE} Open J. Commun. Soc.}, volume = {4}, pages = {1196--1217}, year = {2023}, url = {https://doi.org/10.1109/OJCOMS.2023.3273507}, doi = {10.1109/OJCOMS.2023.3273507}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ojcs/NaeemAKHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/StrunzAWKVG23, author = {Kai Strunz and Khaled Almunem and Christoph Wulkow and Maren Kuschke and Marta Valescudero and Xavier Guillaud}, title = {Enabling 100{\%} Renewable Power Systems Through Power Electronic Grid-Forming Converter and Control: System Integration for Security, Stability, and Application to Europe}, journal = {Proc. {IEEE}}, volume = {111}, number = {7}, pages = {891--915}, year = {2023}, url = {https://doi.org/10.1109/JPROC.2022.3193374}, doi = {10.1109/JPROC.2022.3193374}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/StrunzAWKVG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/SudhaJ23, author = {K. Swapna Sudha and N. Jeyanthi}, title = {Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications}, journal = {Peer Peer Netw. Appl.}, volume = {16}, number = {5}, pages = {2367--2379}, year = {2023}, url = {https://doi.org/10.1007/s12083-023-01527-4}, doi = {10.1007/S12083-023-01527-4}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/SudhaJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/quantum/CojocaruGKSW23, author = {Alexandru Cojocaru and Juan A. Garay and Aggelos Kiayias and Fang Song and Petros Wallden}, title = {Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's Post-Quantum Security}, journal = {Quantum}, volume = {7}, pages = {944}, year = {2023}, url = {https://doi.org/10.22331/q-2023-03-09-944}, doi = {10.22331/Q-2023-03-09-944}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/quantum/CojocaruGKSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Yu23, author = {Haiping Yu}, title = {Application of blockchain technology in the data processing security system of financial enterprises}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.230}, doi = {10.1002/SPY2.230}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Yu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/0013KJM023, author = {Muhammad Bilal and Atif Khan and Salman Jan and Shahrulniza Musa and Shaukat Ali}, title = {Roman Urdu Hate Speech Detection Using Transformer-Based Model for Cyber Security Applications}, journal = {Sensors}, volume = {23}, number = {8}, pages = {3909}, year = {2023}, url = {https://doi.org/10.3390/s23083909}, doi = {10.3390/S23083909}, timestamp = {Wed, 28 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/0013KJM023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/CutoloBBBBBCCCCCPEFGIIIJLLMMMPQ23, author = {Antonello Cutolo and Romeo Bernini and Gaia Maria Berruti and Giovanni Breglio and Francesco Antonio Bruno and Salvatore Buontempo and Ester Catalano and Marco Consales and Agnese Coscetta and Andrea Cusano and Maria Alessandra Cutolo and Pasquale Di Palma and Flavio Esposito and Francesco Fienga and Michele Giordano and Antonio Iele and Agostino Iadicicco and Andrea Irace and Mohammed Janneh and Armando Laudati and Marco Leone and Luca Maresca and Vincenzo Romano Marrazzo and Aldo Minardo and Marco Pisco and Giuseppe Quero and Michele Riccio and Anubhav Srivastava and Patrizio Vaiano and Luigi Zeni and Stefania Campopiano}, title = {Innovative Photonic Sensors for Safety and Security, Part {II:} Aerospace and Submarine Applications}, journal = {Sensors}, volume = {23}, number = {5}, pages = {2417}, year = {2023}, url = {https://doi.org/10.3390/s23052417}, doi = {10.3390/S23052417}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/CutoloBBBBBCCCCCPEFGIIIJLLMMMPQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/McmurrayS23, author = {Samuel Mcmurray and Ali Hassan Sodhro}, title = {A Study on ML-Based Software Defect Detection for Security Traceability in Smart Healthcare Applications}, journal = {Sensors}, volume = {23}, number = {7}, pages = {3470}, year = {2023}, url = {https://doi.org/10.3390/s23073470}, doi = {10.3390/S23073470}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/McmurrayS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/MusaKAA23, author = {Hussam Saeed Musa and Moez Krichen and Adem Alpaslan Altun and Meryem Ammi}, title = {Survey on Blockchain-Based Data Storage Security for Android Mobile Applications}, journal = {Sensors}, volume = {23}, number = {21}, pages = {8749}, year = {2023}, url = {https://doi.org/10.3390/s23218749}, doi = {10.3390/S23218749}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/MusaKAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/PomenkovaM23, author = {Jitka Pomenkov{\'{a}} and Tobias Malach}, title = {Optimized Classifier Learning for Face Recognition Performance Boost in Security and Surveillance Applications}, journal = {Sensors}, volume = {23}, number = {15}, pages = {7012}, year = {2023}, url = {https://doi.org/10.3390/s23157012}, doi = {10.3390/S23157012}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/PomenkovaM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/KumarKM23, author = {Nitesh Kumar and Gaurav S. Kasbekar and D. Manjunath}, title = {Application of Data Collected by Endpoint Detection and Response Systems for Implementation of a Network Security System based on Zero Trust Principles and the EigenTrust Algorithm}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {50}, number = {4}, pages = {5--7}, year = {2023}, url = {https://doi.org/10.1145/3595244.3595247}, doi = {10.1145/3595244.3595247}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmetrics/KumarKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/MaZWDXYZ23, author = {Kui Ma and Yanwei Zhou and Ying Wang and Chunsheng Dong and Zhe Xia and Bo Yang and Mingwu Zhang}, title = {An Efficient Certificateless Signature Scheme With Provably Security and Its Applications}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {4}, pages = {5636--5647}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2023.3269597}, doi = {10.1109/JSYST.2023.3269597}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/MaZWDXYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/Ahammad23, author = {Ishtiaq Ahammad}, title = {Fog Computing Complete Review: Concepts, Trends, Architectures, Technologies, Simulators, Security Issues, Applications, and Open Research Fields}, journal = {{SN} Comput. Sci.}, volume = {4}, number = {6}, pages = {765}, year = {2023}, url = {https://doi.org/10.1007/s42979-023-02235-9}, doi = {10.1007/S42979-023-02235-9}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sncs/Ahammad23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/RajputMTAZR23, author = {Ahmed Raza Rajput and Isma Masood and Almas Tabassam and Muhammad Shamrooz Aslam and Shaoyu Zhang and Mehreen Aslam Rajput}, title = {Patient's data privacy and security in mHealth applications: a Charles proxy-based recommendation}, journal = {Soft Comput.}, volume = {27}, number = {23}, pages = {18165--18180}, year = {2023}, url = {https://doi.org/10.1007/s00500-023-09265-8}, doi = {10.1007/S00500-023-09265-8}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/RajputMTAZR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/ReddyPUNR23, author = {V. Padmanabha Reddy and R. Murali Prasad and Pamula Udayaraju and Bhattu HariPrasad Naik and Ch. Raja}, title = {Efficient medical image security and transmission using modified {LZW} compression and {ECDH-AES} for telemedicine applications}, journal = {Soft Comput.}, volume = {27}, number = {13}, pages = {9151--9168}, year = {2023}, url = {https://doi.org/10.1007/s00500-023-08499-w}, doi = {10.1007/S00500-023-08499-W}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/ReddyPUNR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/softx/PaganoRCVM23, author = {Francesco Pagano and Andrea Romdhana and Davide Caputo and Luca Verderame and Alessio Merlo}, title = {SEBASTiAn: {A} static and extensible black-box application security testing tool for iOS and Android applications}, journal = {SoftwareX}, volume = {23}, pages = {101448}, year = {2023}, url = {https://doi.org/10.1016/j.softx.2023.101448}, doi = {10.1016/J.SOFTX.2023.101448}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/softx/PaganoRCVM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/KerimkhulleDTATMATZS23, author = {Seyit Kerimkhulle and Zhulduz Dildebayeva and Akylbek Tokhmetov and Akzhibek Amirova and Jamalbek Tussupov and Ulzhan Makhazhanova and Alibek Adalbek and Roman Taberkhan and Alma Zakirova and Alua Salykbayeva}, title = {Fuzzy Logic and Its Application in the Assessment of Information Security Risk of Industrial Internet of Things}, journal = {Symmetry}, volume = {15}, number = {10}, pages = {1958}, year = {2023}, url = {https://doi.org/10.3390/sym15101958}, doi = {10.3390/SYM15101958}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/KerimkhulleDTATMATZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcps/SarieddineSTAA23, author = {Khaled Sarieddine and Mohammad Ali Sayed and Sadegh Torabi and Ribal Atallah and Chadi Assi}, title = {Investigating the Security of {EV} Charging Mobile Applications as an Attack Surface}, journal = {{ACM} Trans. Cyber Phys. Syst.}, volume = {7}, number = {4}, pages = {26:1--26:28}, year = {2023}, url = {https://doi.org/10.1145/3609508}, doi = {10.1145/3609508}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcps/SarieddineSTAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tfs/ShiCSWZPK23, author = {Kaibo Shi and Xiao Cai and Kun She and Shiping Wen and Shouming Zhong and PooGyeon Park and Oh{-}Min Kwon}, title = {Stability Analysis and Security-Based Event-Triggered Mechanism Design for {T-S} Fuzzy {NCS} With Traffic Congestion via DoS Attack and Its Application}, journal = {{IEEE} Trans. Fuzzy Syst.}, volume = {31}, number = {10}, pages = {3639--3651}, year = {2023}, url = {https://doi.org/10.1109/TFUZZ.2023.3262686}, doi = {10.1109/TFUZZ.2023.3262686}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tfs/ShiCSWZPK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DanielBR23, author = {Lesly{-}Ann Daniel and S{\'{e}}bastien Bardin and Tamara Rezk}, title = {Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {2}, pages = {11:1--11:42}, year = {2023}, url = {https://doi.org/10.1145/3563037}, doi = {10.1145/3563037}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/DanielBR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ScopellitiPNABPM23, author = {Gianluca Scopelliti and Sepideh Pouyanrad and Job Noorman and Fritz Alder and Christoph Baumann and Frank Piessens and Jan Tobias M{\"{u}}hlberg}, title = {End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {39:1--39:46}, year = {2023}, url = {https://doi.org/10.1145/3592607}, doi = {10.1145/3592607}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ScopellitiPNABPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/AdilJLAFS23, author = {Muhammad Adil and Mian Ahmad Jan and Yongxin Liu and Hussein Abulkasim and Ahmed Farouk and Houbing Song}, title = {A Systematic Survey: Security Threats to UAV-Aided IoT Applications, Taxonomy, Current Challenges and Requirements With Future Research Directions}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {2}, pages = {1437--1455}, year = {2023}, url = {https://doi.org/10.1109/TITS.2022.3220043}, doi = {10.1109/TITS.2022.3220043}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/AdilJLAFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/Kavousifard23, author = {Abdollah Kavousifard}, title = {Editorial Special Issue on Application of Advanced Intelligent Methods in Vehicle to Smart Grid Communications: Security, Reliability, and Resiliency}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {1}, pages = {891--892}, year = {2023}, url = {https://doi.org/10.1109/TITS.2022.3230580}, doi = {10.1109/TITS.2022.3230580}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/Kavousifard23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/WangF23, title = {Retraction Note: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism}, journal = {J. Supercomput.}, volume = {79}, number = {5}, pages = {5843}, year = {2023}, url = {https://doi.org/10.1007/s11227-022-04862-0}, doi = {10.1007/S11227-022-04862-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/WangF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/WazidG23, author = {Mohammad Wazid and Prosanta Gope}, title = {{BACKM-EHA:} {A} Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications}, journal = {{ACM} Trans. Internet Techn.}, volume = {23}, number = {3}, pages = {39:1--39:28}, year = {2023}, url = {https://doi.org/10.1145/3511898}, doi = {10.1145/3511898}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/WazidG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/WangDDY23, author = {Xueli Wang and Derui Ding and Hongli Dong and Xiao{-}jian Yi}, title = {PI-Based Security Control Against Joint Sensor and Controller Attacks and Applications in Load Frequency Control}, journal = {{IEEE} Trans. Syst. Man Cybern. Syst.}, volume = {53}, number = {2}, pages = {970--980}, year = {2023}, url = {https://doi.org/10.1109/TSMC.2022.3190005}, doi = {10.1109/TSMC.2022.3190005}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/WangDDY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/BagchiMBDPLY23, author = {Prithwi Bagchi and Raj Maheshwari and Basudeb Bera and Ashok Kumar Das and Youngho Park and Pascal Lorenz and David K. Y. Yau}, title = {Public Blockchain-Envisioned Security Scheme Using Post Quantum Lattice-Based Aggregate Signature for Internet of Drones Applications}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {8}, pages = {10393--10408}, year = {2023}, url = {https://doi.org/10.1109/TVT.2023.3260579}, doi = {10.1109/TVT.2023.3260579}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/BagchiMBDPLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/OrlandoBPBB23, author = {Danilo Orlando and Stefania Bartoletti and Ivan Palam{\`{a}} and Giuseppe Bianchi and Nicola Blefari{-}Melazzi}, title = {Innovative Attack Detection Solutions for Wireless Networks With Application to Location Security}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {22}, number = {1}, pages = {205--219}, year = {2023}, url = {https://doi.org/10.1109/TWC.2022.3192225}, doi = {10.1109/TWC.2022.3192225}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/twc/OrlandoBPBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/FathimaBA23, author = {Nasreen Fathima and Reshma Banu and G. F. Ali Ahammed}, title = {Integrated Signing Procedure Based Data Transfer Security and Authentication Framework for Internet of Things Applications}, journal = {Wirel. Pers. Commun.}, volume = {130}, number = {1}, pages = {401--420}, year = {2023}, url = {https://doi.org/10.1007/s11277-023-10291-w}, doi = {10.1007/S11277-023-10291-W}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/FathimaBA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/GaikwadA23, author = {V. D. Gaikwad and S. Ananthakumaran}, title = {A Review: Security and Privacy for Health Care Application in Wireless Body Area Networks}, journal = {Wirel. Pers. Commun.}, volume = {130}, number = {1}, pages = {673--691}, year = {2023}, url = {https://doi.org/10.1007/s11277-023-10305-7}, doi = {10.1007/S11277-023-10305-7}, timestamp = {Thu, 04 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/GaikwadA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/TamilarasiJ23, title = {Retraction Note: Medical Data Security for Healthcare Applications Using Hybrid Lightweight Encryption and Swarm Optimization Algorithm}, journal = {Wirel. Pers. Commun.}, volume = {128}, number = {1}, pages = {733}, year = {2023}, url = {https://doi.org/10.1007/s11277-022-10120-6}, doi = {10.1007/S11277-022-10120-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/TamilarasiJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acmturc/LuL23, author = {Xiaozhen Lu and Zhibo Liu}, title = {Safety Guide-Based Deep Reinforcement Learning for Network Security Applications}, booktitle = {Proceedings of the {ACM} Turing Award Celebration Conference - China 2023, {ACM} {TURC} 2023, Wuhan, China, July 28-30, 2023}, pages = {136--137}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3603165.3607439}, doi = {10.1145/3603165.3607439}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acmturc/LuL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africon/MarteyAE23, author = {Abraham S. Martey and Ahmed Ali and Ebenezer Esenogho}, title = {AI-Based Palm Print Recognition System for High-security Applications}, booktitle = {{IEEE} {AFRICON} 2023, Nairobi, Kenya, September 20-22, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AFRICON55910.2023.10293345}, doi = {10.1109/AFRICON55910.2023.10293345}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africon/MarteyAE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiiot/MohamedA23, author = {Nader Mohamed and Jameela Al{-}Jaroodi}, title = {Security Applications of Edge Intelligence}, booktitle = {2023 {IEEE} World {AI} IoT Congress (AIIoT), Seattle, WA, USA, June 7-10, 2023}, pages = {508--512}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AIIoT58121.2023.10174600}, doi = {10.1109/AIIOT58121.2023.10174600}, timestamp = {Thu, 20 Jul 2023 09:02:39 +0200}, biburl = {https://dblp.org/rec/conf/aiiot/MohamedA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiiot/ThakurHTKA23, author = {Hasnain Nizam Thakur and Abdullah Al Hayajneh and Kutub Thakur and Abu Kamruzzaman and Md Liakat Ali}, title = {A Comprehensive Review of Wireless Security Protocols and Encryption Applications}, booktitle = {2023 {IEEE} World {AI} IoT Congress (AIIoT), Seattle, WA, USA, June 7-10, 2023}, pages = {373--379}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AIIoT58121.2023.10174571}, doi = {10.1109/AIIOT58121.2023.10174571}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aiiot/ThakurHTKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsys/Androutsopoulos23, author = {Georgios C. Androutsopoulos and Giorgos Kappes and Stergios V. Anastasiadis}, title = {Quantifying the Security Profile of Linux Applications}, booktitle = {Proceedings of the 14th {ACM} {SIGOPS} Asia-Pacific Workshop on Systems, APSys 2023, Seoul, Republic of Korea, August 24-25, 2023}, pages = {80--86}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3609510.3609814}, doi = {10.1145/3609510.3609814}, timestamp = {Thu, 28 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apsys/Androutsopoulos23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KhovratovichBM23, author = {Dmitry Khovratovich and Mario Marhuenda Beltr{\'{a}}n and Bart Mennink}, editor = {Jian Guo and Ron Steinfeld}, title = {Generic Security of the {SAFE} {API} and Its Applications}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {VIII}}, series = {Lecture Notes in Computer Science}, volume = {14445}, pages = {301--327}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8742-9\_10}, doi = {10.1007/978-981-99-8742-9\_10}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/KhovratovichBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcca/YouJKN23, author = {Shengwei You and Aditya Joshi and Andrey Kuehlkamp and Jarek Nabrzyski}, editor = {Moayad Aloqaily and Safa Otoum and Ouns Bouachir and Yaser Jararweh and Ismaeel Al Ridhawi and Khalid Al{-}Begain and Mohammad A. Alsmirat}, title = {Mining User Behavior in Decentralized Applications for Blockchain Trust and Security Analytics}, booktitle = {Fifth International Conference on Blockchain Computing and Applications, {BCCA} 2023, Kuwait, Kuwait, October 24-26, 2023}, pages = {60--67}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BCCA58897.2023.10338860}, doi = {10.1109/BCCA58897.2023.10338860}, timestamp = {Thu, 18 Jan 2024 12:09:19 +0100}, biburl = {https://dblp.org/rec/conf/bcca/YouJKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdcloud/WangL23, author = {Huan Wang and Xiaoyang Lai}, title = {Quantum Information Technology for Network Security: An Application-Focused Overview}, booktitle = {{IEEE} Intl Conf on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom, 2023, Wuhan, China, December 21-24, 2023}, pages = {881--886}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00148}, doi = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM59178.2023.00148}, timestamp = {Thu, 18 Apr 2024 16:12:26 +0200}, biburl = {https://dblp.org/rec/conf/bdcloud/WangL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdmip/LaiZL23, author = {Ji Lai and Shijun Zhang and Shuo Li}, title = {Research on the Application of Blockchain Technology in the Construction of User Privacy Information Security Model}, booktitle = {Proceedings of the International Conference on Big Data Mining and Information Processing, {BDMIP} 2023, Xiamen City, China, China, November 17-19, 2023}, pages = {72--76}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3645279.3645292}, doi = {10.1145/3645279.3645292}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bdmip/LaiZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdmip/XuZL23, author = {Xiangsen Xu and Shijun Zhang and Ji Lai}, title = {Application of Internet Big Data in Network Security Situation Assessment}, booktitle = {Proceedings of the International Conference on Big Data Mining and Information Processing, {BDMIP} 2023, Xiamen City, China, China, November 17-19, 2023}, pages = {77--81}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3645279.3645293}, doi = {10.1145/3645279.3645293}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bdmip/XuZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataservice/BatsisMP23, author = {Georgios Batsis and Ioannis Mademlis and Georgios Th. Papadopoulos}, title = {Illicit item detection in X-ray images for security applications}, booktitle = {{IEEE} Ninth International Conference on Big Data Computing Service and Applications, BigDataService 2023, Athens, Greece, July 17-20, 2023}, pages = {63--70}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BigDataService58306.2023.00016}, doi = {10.1109/BIGDATASERVICE58306.2023.00016}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdataservice/BatsisMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/brains/SurmontWC23, author = {Jasper Surmont and Weihong Wang and Tom Van Cutsem}, title = {Static Application Security Testing of Consensus-Critical Code in the Cosmos Network}, booktitle = {5th Conference on Blockchain Research {\&} Applications for Innovative Networks and Services, {BRAINS} 2023, Paris, France, October 11-13, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BRAINS59668.2023.10316912}, doi = {10.1109/BRAINS59668.2023.10316912}, timestamp = {Tue, 05 Dec 2023 20:47:36 +0100}, biburl = {https://dblp.org/rec/conf/brains/SurmontWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caibda/YuZYL23, author = {Ying Yu and Kangping Zhao and Zhiyang Yu and Zhiyu Lang}, editor = {Gheorghe Grigoras and Pascal Lorenz}, title = {Research on the Application of Domestic Autonomous Cryptography Algorithms in the Field of Ecological Environment Information Security}, booktitle = {Advances in Artificial Intelligence, Big Data and Algorithms - Proceedings of the 3rd International Conference on Artificial Intelligence, Big Data and Algorithms {(CAIBDA} 2023) - 16-18 June 2023, Zhengzhou, China}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {373}, pages = {949--955}, publisher = {{IOS} Press}, year = {2023}, url = {https://doi.org/10.3233/FAIA230906}, doi = {10.3233/FAIA230906}, timestamp = {Wed, 06 Dec 2023 14:36:43 +0100}, biburl = {https://dblp.org/rec/conf/caibda/YuZYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShiSYZ023, author = {Qingkai Shi and Junyang Shao and Yapeng Ye and Mingwei Zheng and Xiangyu Zhang}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Lifting Network Protocol Implementation to Precise Format Specification with Security Applications}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {1287--1301}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3616614}, doi = {10.1145/3576915.3616614}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShiSYZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cecnet/LiuWNLZLW23, author = {Qing Liu and Yu Wu and Jing Nie and Yi Li and Xiaohu Zheng and Kang Liu and Ping Wang}, editor = {Antonio J. Tall{\'{o}}n{-}Ballesteros and Estefan{\'{\i}}a Cort{\'{e}}s{-}Ancos and Diego A. L{\'{o}}pez Garc{\'{\i}}a}, title = {Simplified Monocular Ranging Anomalous Behaviour Detection Model for Security Monitoring Applications}, booktitle = {Electronics, Communications and Networks - Proceedings of the 13th International Conference (CECNet 2023), Macao, China, 17-20 November 2023}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {381}, pages = {664--671}, publisher = {{IOS} Press}, year = {2023}, url = {https://doi.org/10.3233/FAIA231251}, doi = {10.3233/FAIA231251}, timestamp = {Wed, 31 Jan 2024 15:27:35 +0100}, biburl = {https://dblp.org/rec/conf/cecnet/LiuWNLZLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cipae/HeMRZ23, author = {Chengquan He and Tong Mu and Weiping Ren and Bohua Zhao}, title = {LPIXray: {A} Large-scale Logistics Prohibited Item X-ray Dataset for the Application of Deep Learning in Security Inspection}, booktitle = {International Conference on Computers, Information Processing and Advanced Education, {CIPAE} 2023, Ottawa, ON, Canada, August 26-28, 2023}, pages = {481--485}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CIPAE60493.2023.00097}, doi = {10.1109/CIPAE60493.2023.00097}, timestamp = {Thu, 25 Jan 2024 09:25:30 +0100}, biburl = {https://dblp.org/rec/conf/cipae/HeMRZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/XuCCZY23, author = {Shiyuan Xu and Yibo Cao and Xue Chen and Yanmin Zhao and Siu{-}Ming Yiu}, editor = {Chunpeng Ge and Moti Yung}, title = {Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications}, booktitle = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14526}, pages = {274--298}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0942-7\_14}, doi = {10.1007/978-981-97-0942-7\_14}, timestamp = {Mon, 11 Mar 2024 15:20:47 +0100}, biburl = {https://dblp.org/rec/conf/cisc/XuCCZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnml/Li23, author = {Hui Li}, title = {Application of artificial intelligence in the construction of computer big data security technology platform}, booktitle = {Proceedings of the 2023 International Conference on Communication Network and Machine Learning, {CNML} 2023, Zhengzhou, China, October 27-28, 2023}, pages = {191--195}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3640912.3640950}, doi = {10.1145/3640912.3640950}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnml/Li23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnml/Wang23, author = {Xinbo Wang}, title = {Application of Deep Learning Based on Artificial Intelligence in Security Monitoring System}, booktitle = {Proceedings of the 2023 International Conference on Communication Network and Machine Learning, {CNML} 2023, Zhengzhou, China, October 27-28, 2023}, pages = {211--214}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3640912.3640954}, doi = {10.1145/3640912.3640954}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnml/Wang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnml/Zhang23a, author = {Ruihang Zhang}, title = {Enhancing IoT Security-Exploring the Application of Blockchain}, booktitle = {Proceedings of the 2023 International Conference on Communication Network and Machine Learning, {CNML} 2023, Zhengzhou, China, October 27-28, 2023}, pages = {259--263}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3640912.3640963}, doi = {10.1145/3640912.3640963}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnml/Zhang23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colins/KyrychenkoSS23, author = {Iryna Kyrychenko and Olha Shyshlo and Nadiia Shanidze}, editor = {Olga Cherednichenko and Lyubomyr Chyrun and Victoria Vysotska}, title = {Minimizing Security Risks and Improving System Reliability in Blockchain Applications: {\cyrchar\cyra} Testing Method Analysis}, booktitle = {Proceedings of the 7th International Conference on Computational Linguistics and Intelligent Systems. Volume {III:} Intelligent Systems Workshop, Kharkiv, Ukraine, April 20-21, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3403}, pages = {423--433}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3403/paper33.pdf}, timestamp = {Tue, 27 Jun 2023 15:53:41 +0200}, biburl = {https://dblp.org/rec/conf/colins/KyrychenkoSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comad/SureshanD23, author = {Shruti Sureshan and Debasis Das}, title = {Few-Shot Learning based Anomaly Detection in Security Applications}, booktitle = {Proceedings of the 6th Joint International Conference on Data Science {\&} Management of Data (10th {ACM} {IKDD} {CODS} and 28th COMAD), Mumbai, India, January 4-7, 2023}, pages = {295--296}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3570991.3571040}, doi = {10.1145/3570991.3571040}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/comad/SureshanD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/PotterSM23, author = {Connor J. Potter and Neetesh Saxena and Soumyadev Maity}, title = {Clarity: Analysing Security in Web Applications}, booktitle = {15th International Conference on COMmunication Systems {\&} NETworkS, {COMSNETS} 2023, Bangalore, India, January 3-8, 2023}, pages = {522--528}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/COMSNETS56262.2023.10041289}, doi = {10.1109/COMSNETS56262.2023.10041289}, timestamp = {Fri, 24 Feb 2023 15:04:53 +0100}, biburl = {https://dblp.org/rec/conf/comsnets/PotterSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscs/AbateCCAFV23, author = {Andrea Francesco Abate and Aniello Castiglione and Lucia Cimmino and Davide De Angelis and Sara Flauto and Alberto Volpe}, editor = {Ioan Dumitrache and Adina Magda Florea and Mihnea Alexandru Moisescu and Alexandru Dumitrascu and Florin Pop}, title = {On the (in)Security and Weaknesses of Commonly Used Applications on Large-Scale Distributed Systems}, booktitle = {24th International Conference on Control Systems and Computer Science, {CSCS} 2023, Bucharest, Romania, May 24-26, 2023}, pages = {572--579}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSCS59211.2023.00096}, doi = {10.1109/CSCS59211.2023.00096}, timestamp = {Fri, 25 Aug 2023 07:55:14 +0200}, biburl = {https://dblp.org/rec/conf/cscs/AbateCCAFV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscs/SovianyGD23, author = {Sorin Soviany and Cristina Gheorghe and Minodora Dumitrache}, editor = {Ioan Dumitrache and Adina Magda Florea and Mihnea Alexandru Moisescu and Alexandru Dumitrascu and Florin Pop}, title = {A Multimodal Biometric System for the e-Health applications security}, booktitle = {24th International Conference on Control Systems and Computer Science, {CSCS} 2023, Bucharest, Romania, May 24-26, 2023}, pages = {586--593}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSCS59211.2023.00098}, doi = {10.1109/CSCS59211.2023.00098}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscs/SovianyGD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BatyWHFT23, author = {Matthieu Baty and Pierre Wilke and Guillaume Hiet and Arnaud Fontaine and Alix Trieu}, title = {A Generic Framework to Develop and Verify Security Mechanisms at the Microarchitectural Level: Application to Control-Flow Integrity}, booktitle = {36th {IEEE} Computer Security Foundations Symposium, {CSF} 2023, Dubrovnik, Croatia, July 10-14, 2023}, pages = {372--387}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSF57540.2023.00029}, doi = {10.1109/CSF57540.2023.00029}, timestamp = {Tue, 05 Sep 2023 20:33:27 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BatyWHFT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/HatzivasilisIKCSPMLBR23, author = {George Hatzivasilis and Sotiris Ioannidis and Grigoris Kalogiannis and Manolis Chatzimpyrros and George Spanoudakis and Guillermo Jim{\'{e}}nez Prieto and Araceli Rojas Morgan and Miguel Juaniz Lopez and Cataldo Basile and Jos{\'{e}} Francisco Ruiz}, title = {Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The {FISHY} approach for the secure autonomous driving domain}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2023, Venice, Italy, July 31 - Aug. 2, 2023}, pages = {464--469}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSR57506.2023.10224971}, doi = {10.1109/CSR57506.2023.10224971}, timestamp = {Wed, 06 Sep 2023 08:09:39 +0200}, biburl = {https://dblp.org/rec/conf/csr2/HatzivasilisIKCSPMLBR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/SuraniBWKRVD23, author = {Aishwarya Surani and Amani Bawaked and Matthew Wheeler and Braden Kelsey and Nikki Roberts and David Vincent and Sanchari Das}, editor = {Vijayalakshmi Atluri and Anna Lisa Ferrara}, title = {Security and Privacy of Digital Mental Health: An Analysis of Web Services and Mobile Applications}, booktitle = {Data and Applications Security and Privacy {XXXVII} - 37th Annual {IFIP} {WG} 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13942}, pages = {319--338}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37586-6\_19}, doi = {10.1007/978-3-031-37586-6\_19}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/SuraniBWKRVD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dessert/SklyarK23, author = {Vladimir V. Sklyar and Vyacheslav Kharchenko}, title = {Application of Business Analysis Techniques for Safety-Critical and Security-Critical Requirements Engineering}, booktitle = {13th International Conference on Dependable Systems, Services and Technologies, {DESSERT} 2023, Athens, Greece, October 13-15, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DESSERT61349.2023.10416481}, doi = {10.1109/DESSERT61349.2023.10416481}, timestamp = {Sat, 24 Feb 2024 20:42:46 +0100}, biburl = {https://dblp.org/rec/conf/dessert/SklyarK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dev/ChibooraCBG23, author = {Trevor Henry Chiboora and Lenah Chacha and Theoneste Byagutangaza and Assane Gueye}, editor = {Melissa Densmore and Monojit Choudhury and Josiah Chavula}, title = {Evaluating Mobile Banking Application Security Posture Using the OWASP's {MASVS} Framework}, booktitle = {Proceedings of the 6th {ACM} {SIGCAS/SIGCHI} Conference on Computing and Sustainable Societies, {COMPASS} 2023, Cape Town, South Africa, August 16-19, 2023}, pages = {99--106}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3588001.3609367}, doi = {10.1145/3588001.3609367}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dev/ChibooraCBG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dft/GuhaB23, author = {Krishnendu Guha and Gouriprasad Bhattacharyya}, editor = {Luca Cassano and Mihalis Psarakis and Marcello Traiola and Alberto Bosio}, title = {A Self Aware Security Approach for Real Time Neural Network Applications from Row Hammer Attacks in Multi {FPGA} Multi User Environment}, booktitle = {{IEEE} International Symposium on Defect and Fault Tolerance in {VLSI} and Nanotechnology Systems, {DFT} 2023, Juan-Les-Pins, France, October 3-5, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DFT59622.2023.10313547}, doi = {10.1109/DFT59622.2023.10313547}, timestamp = {Tue, 21 Nov 2023 12:38:06 +0100}, biburl = {https://dblp.org/rec/conf/dft/GuhaB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drcn/KyriakakisI23, author = {Thomas Kyriakakis and Sotiris Ioannidis}, title = {A Moving Target Defense Security Solution for IoT Applications}, booktitle = {19th International Conference on the Design of Reliable Communication Networks, {DRCN} 2023, Vilanova i la Geltru, Spain, April 17-20, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DRCN57075.2023.10108190}, doi = {10.1109/DRCN57075.2023.10108190}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drcn/KyriakakisI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/LongXJZDG23, author = {Yu Long and Xiayu Xiang and Xiao Jing and Angxiao Zhao and Lei Du and Zhaoquan Gu}, title = {{MDATA} Model Based Cyber Security Knowledge Representation and Application}, booktitle = {8th International Conference on Data Science in Cyberspace, {DSC} 2023, Hefei, China, August 18-20, 2023}, pages = {483--490}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC59305.2023.00076}, doi = {10.1109/DSC59305.2023.00076}, timestamp = {Fri, 09 Feb 2024 20:38:47 +0100}, biburl = {https://dblp.org/rec/conf/dsc/LongXJZDG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai2/DeacSuteuTPPD23, author = {Dorin Vasile Deac{-}Suteu and Aurel Mihail Titu and Maria Popa and Alina Bianca Pop and Diana Dragomir}, title = {Provision of {IT} security access to integrated applications for Local and Regional Utility Service providers approach}, booktitle = {15th International Conference on Electronics, Computers and Artificial Intelligence, {ECAI} 2023, Bucharest, Romania, June 29-30, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ECAI58194.2023.10193926}, doi = {10.1109/ECAI58194.2023.10193926}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecai2/DeacSuteuTPPD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/efmi-stc/BaltzerB23, author = {Caroline Baltzer and Stefano Bonacina}, editor = {Mauro Giacomini and Lacramioara Stoicu{-}Tivadar and Gabriella Balestra and Arriel Benis and Stefano Bonacina and Alessio Bottrighi and Thomas M. Deserno and Parisis Gallos and Lenka Lhotsk{\'{a}} and Sara Marceglia and Alejandro C. Pazos Sierra and Samanta Rosati and Lucia Sacchi}, title = {Enhancing Women's Health: An Assessment of Data Privacy and Security of Menopause FemTech Applications}, booktitle = {Telehealth Ecosystems in Practice - Proceedings of the {EFMI} Special Topic Conference 2023, {EFMI-STC} 2023, Turin, Italy, 25 - 27 October 2023}, series = {Studies in Health Technology and Informatics}, volume = {309}, pages = {155--159}, publisher = {{IOS} Press}, year = {2023}, url = {https://doi.org/10.3233/SHTI230765}, doi = {10.3233/SHTI230765}, timestamp = {Wed, 22 May 2024 08:25:52 +0200}, biburl = {https://dblp.org/rec/conf/efmi-stc/BaltzerB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eitce/TangDWC23, author = {Xueyan Tang and Yuying Du and Zhengyang Wang and Shawn Chong}, title = {{EIP} Security Analysis: Application Program Standards, Attack Events, and Security Vulnerabilities}, booktitle = {Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, {EITCE} 2023, Xiamen, China, October 20-22, 2023}, pages = {1239--1244}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3650400.3650609}, doi = {10.1145/3650400.3650609}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eitce/TangDWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etfa/HosseiniSK23, author = {Ali Mohammad Hosseini and Thilo Sauter and Wolfgang Kastner}, title = {Formal Verification of Safety and Security Properties in Industry 4.0 Applications}, booktitle = {28th {IEEE} International Conference on Emerging Technologies and Factory Automation, {ETFA} 2023, Sinaia, Romania, September 12-15, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ETFA54631.2023.10275690}, doi = {10.1109/ETFA54631.2023.10275690}, timestamp = {Mon, 23 Oct 2023 09:15:55 +0200}, biburl = {https://dblp.org/rec/conf/etfa/HosseiniSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ets/ZhangTF23, author = {Tao Zhang and Mark M. Tehranipoor and Farimah Farahmandi}, title = {BitFREE: On Significant Speedup and Security Applications of {FPGA} Bitstream Format Reverse Engineering}, booktitle = {{IEEE} European Test Symposium, {ETS} 2023, Venezia, Italy, May 22-26, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ETS56758.2023.10174155}, doi = {10.1109/ETS56758.2023.10174155}, timestamp = {Fri, 14 Jul 2023 22:01:39 +0200}, biburl = {https://dblp.org/rec/conf/ets/ZhangTF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/NadeemVCPDBV23, author = {Azqa Nadeem and Dani{\"{e}}l Vos and Clinton Cao and Luca Pajola and Simon Dieck and Robert Baumgartner and Sicco Verwer}, title = {SoK: Explainable Machine Learning for Computer Security Applications}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {221--240}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00022}, doi = {10.1109/EUROSP57164.2023.00022}, timestamp = {Mon, 07 Aug 2023 15:56:23 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/NadeemVCPDBV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurousec/KishnaniNDD23, author = {Urvashi Kishnani and Naheem Noah and Sanchari Das and Rinku Dewri}, title = {Assessing Security, Privacy, User Interaction, and Accessibility Features in Popular E-Payment Applications}, booktitle = {Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC 2023, Copenhagen, Denmark, October 16-17, 2023}, pages = {143--157}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3617072.3617102}, doi = {10.1145/3617072.3617102}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurousec/KishnaniNDD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoapps/HassanSVPM13, author = {Mujtaba Hassan and Arish Sateesan and Jo Vliegen and Stjepan Picek and Nele Mentens}, editor = {Jo{\~{a}}o Correia and Stephen L. Smith and Raneem Qaddoura}, title = {Evolving Non-cryptographic Hash Functions Using Genetic Programming for High-speed Lookups in Network Security Applications}, booktitle = {Applications of Evolutionary Computation - 26th European Conference, EvoApplications 2023, Held as Part of EvoStar 2023, Brno, Czech Republic, April 12-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13989}, pages = {302--318}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30229-9\_20}, doi = {10.1007/978-3-031-30229-9\_20}, timestamp = {Tue, 29 Aug 2023 15:18:02 +0200}, biburl = {https://dblp.org/rec/conf/evoapps/HassanSVPM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficta/VeerasamyNKSSM23, author = {B. Veerasamy and D. Nageswari and S. N. Kumar and Anil Shirgire and Ramachandran Sitharthan and A. Jasmine Gnana Malar}, editor = {Vikrant Bhateja and Fiona Carroll and Jo{\~{a}}o Manuel R. S. Tavares and Sandeep Singh Sengar and Peter Peer}, title = {An Optimized Cyber Security Framework for Network Applications}, booktitle = {Intelligent Data Engineering and Analytics - Proceedings of the 11th International Conference on Frontiers of Intelligent Computing: Theory and Applications {(FICTA} 2023), Cardiff, UK, 11-12 April 2023}, series = {Smart Innovation, Systems and Technologies}, volume = {371}, pages = {511--518}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-6706-3\_45}, doi = {10.1007/978-981-99-6706-3\_45}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ficta/VeerasamyNKSSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fruct/WenK23, author = {Shao{-}Fang Wen and Basel Katt}, title = {A Metamodel for Web Application Security Evaluation}, booktitle = {34th Conference of Open Innovations Association, {FRUCT} 2023, Riga, Latvia, November 15-17, 2023}, pages = {172--182}, publisher = {{IEEE}}, year = {2023}, url = {https://ieeexplore.ieee.org/document/10328176}, timestamp = {Mon, 11 Dec 2023 15:49:00 +0100}, biburl = {https://dblp.org/rec/conf/fruct/WenK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/OgawaAEHC23, author = {Michael{-}Brian Ogawa and Brent Auernheimer and Barbara Endicott{-}Popovsky and Randy J. Hinrichs and Martha E. Crosby}, editor = {Dylan D. Schmorrow and Cali M. Fidopiastis}, title = {Privacy and Security Perceptions in Augmented Cognition Applications}, booktitle = {Augmented Cognition - 17th International Conference, {AC} 2023, Held as Part of the 25th {HCI} International Conference, {HCII} 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14019}, pages = {429--440}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35017-7\_27}, doi = {10.1007/978-3-031-35017-7\_27}, timestamp = {Thu, 13 Jul 2023 10:09:59 +0200}, biburl = {https://dblp.org/rec/conf/hci/OgawaAEHC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/RaharjaNMS23, author = {Jaka Raharja and Achmad Nurmandi and Misran and Dimas Subekti}, editor = {Abbas Moallem}, title = {Analysis of Information Quality and Data Security in the {KPU} (General Elections Commission) {SIDALIH} (Voter Data Information System) Application}, booktitle = {{HCI} for Cybersecurity, Privacy and Trust - 5th International Conference, {HCI-CPT} 2023, Held as Part of the 25th {HCI} International Conference, {HCII} 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14045}, pages = {90--100}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35822-7\_7}, doi = {10.1007/978-3-031-35822-7\_7}, timestamp = {Thu, 13 Jul 2023 13:58:21 +0200}, biburl = {https://dblp.org/rec/conf/hci/RaharjaNMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaai/BaniyaNBHJ23, author = {Pashupati Baniya and Parma Nand and Bharat Bhushan and Alaa Ali Hameed and Akhtar Jamil}, title = {Blockchain Based Security Framework for Internet of Medical Things (IoMT) Applications}, booktitle = {Proceedings of the 2023 7th International Conference on Advances in Artificial Intelligence, {ICAAI} 2023, Istanbul, Turkiye, October 13-15, 2023}, pages = {73--78}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3633598.3633611}, doi = {10.1145/3633598.3633611}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaai/BaniyaNBHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icai2/DonosoCCDE23, author = {Diego Donoso and Gino Cornejo and Carlos Calahorrano and Santiago Donoso and Erika Escobar}, editor = {Hector Florez and Marcelo Le{\'{o}}n}, title = {Under the Spotlight! Facial Recognition Applications in Prison Security: Bayesian Modeling and {ISO27001} Standard Implementation}, booktitle = {Applied Informatics - 6th International Conference, {ICAI} 2023, Guayaquil, Ecuador, October 26-28, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1874}, pages = {419--432}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-46813-1\_28}, doi = {10.1007/978-3-031-46813-1\_28}, timestamp = {Wed, 21 Feb 2024 17:11:18 +0100}, biburl = {https://dblp.org/rec/conf/icai2/DonosoCCDE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaice/LiZLCLH23, author = {Junhao Li and Jiacheng Zhou and Lei Li and Baowei Cheng and Shengfei Li and Wenhao He}, title = {Robust Detection for Adversarial Attacks - Based on a Graph Neural Network for Web Application Security Protection System}, booktitle = {Proceedings of the 4th International Conference on Artificial Intelligence and Computer Engineering, {ICAICE} 2023, Dalian, China, November 17-19, 2023}, pages = {927--932}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3652628.3652782}, doi = {10.1145/3652628.3652782}, timestamp = {Fri, 24 May 2024 11:47:23 +0200}, biburl = {https://dblp.org/rec/conf/icaice/LiZLCLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/XueOR23, author = {Li Xue and Katia Obraczka and Zouheir Rezki}, title = {Cross-Layer Device Fingerprinting and Its Applications to Network Security}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2023, Rome, Italy, May 28 - June 1, 2023}, pages = {5253--5258}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICC45041.2023.10279603}, doi = {10.1109/ICC45041.2023.10279603}, timestamp = {Thu, 02 Nov 2023 17:09:41 +0100}, biburl = {https://dblp.org/rec/conf/icc/XueOR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/YakanFAA23, author = {Hadi Yakan and Ilhem Fajjari and Nadjib Aitsaadi and C{\'{e}}dric Adjih}, title = {A Novel {AI} Security Application Function of 5G Core Network for {V2X} {C-ITS} Facilities Layer}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2023, Rome, Italy, May 28 - June 1, 2023}, pages = {6211--6217}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICC45041.2023.10279621}, doi = {10.1109/ICC45041.2023.10279621}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/YakanFAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/LiuLCXXB23, author = {Zhibo Liu and Xiaozhen Lu and Yuhan Chen and Yilin Xiao and Liang Xiao and Yanling Bu}, title = {Deep Reinforcement Learning for Network Security Applications With {A} Safety Guide}, booktitle = {{IEEE/CIC} International Conference on Communications in China, {ICCC} 2023, Dalian, China, August 10-12, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCC57788.2023.10233612}, doi = {10.1109/ICCC57788.2023.10233612}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccchina/LiuLCXXB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/CK23, author = {Naveen Rahite C and Manoj Senthil K}, title = {An In-Depth Review of Blowfish Encryption Algorithm: Security, Performance, and Application}, booktitle = {14th International Conference on Computing Communication and Networking Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCCNT56998.2023.10307323}, doi = {10.1109/ICCCNT56998.2023.10307323}, timestamp = {Thu, 30 Nov 2023 16:40:53 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/CK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/ChattopadhyayS23, author = {Amartyanil Chattopadhyay and Divya Sripada}, title = {Security Analysis and Threat Modelling of Mobile Banking Applications}, booktitle = {14th International Conference on Computing Communication and Networking Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCCNT56998.2023.10307577}, doi = {10.1109/ICCCNT56998.2023.10307577}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/ChattopadhyayS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icceic/XiangHXWSS23, author = {Hang Xiang and Jiujiang Han and Ming Xian and Huimei Wang and Yi Sun and Peng Sun}, title = {Research on the Application of Reinforcement Learning in Network Security}, booktitle = {4th International Conference on Computer Engineering and Intelligent Control, {ICCEIC} 2023, Guangzhou, China, October 20-22, 2023}, pages = {31--34}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCEIC60201.2023.10426719}, doi = {10.1109/ICCEIC60201.2023.10426719}, timestamp = {Thu, 29 Feb 2024 09:23:26 +0100}, biburl = {https://dblp.org/rec/conf/icceic/XiangHXWSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccel/Kumar0JI23, author = {Randhir Kumar and Prabhat Kumar and Alireza Jolfaei and A. K. M. Najmul Islam}, title = {An Integrated Framework for Enhancing Security and Privacy in IoT-Based Business Intelligence Applications}, booktitle = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2023, Las Vegas, NV, USA, January 6-8, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCE56470.2023.10043450}, doi = {10.1109/ICCE56470.2023.10043450}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccel/Kumar0JI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsie/Wang23, author = {Zhen Wang}, title = {The Application and Practice of Computer Network Security Technology in Electronic Information Engineering}, booktitle = {Proceedings of the 8th International Conference on Cyber Security and Information Engineering, {ICCSIE} 2023, Putrajaya, Malaysia, September 22-24, 2023}, pages = {73--77}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3617184.3618035}, doi = {10.1145/3617184.3618035}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsie/Wang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsie/YeWWWYT23, author = {Xin Ye and Shimin Wang and Han Wang and Qinwei Wei and Ting Yang and Yu Tao}, title = {Application of Knowledge Graph in Financial Information Security Strategy}, booktitle = {Proceedings of the 8th International Conference on Cyber Security and Information Engineering, {ICCSIE} 2023, Putrajaya, Malaysia, September 22-24, 2023}, pages = {188--192}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3617184.3630130}, doi = {10.1145/3617184.3630130}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsie/YeWWWYT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccvit/HongLLYOHW23, author = {Sheng Hong and Yizhong Lai and Yuzhou Li and Yang You and Shuai Ou and Fei Han and Tiejun Wu}, title = {A Reference Model for Information Security Applications of Generative Adversarial Network Variants}, booktitle = {Proceedings of the 2023 International Conference on Computer, Vision and Intelligent Technology, {ICCVIT} 2023, Chenzhou, China, August 25-28, 2023}, pages = {7:1--7:8}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627341.3630381}, doi = {10.1145/3627341.3630381}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccvit/HongLLYOHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/DasBDCGB23, author = {Debashis Das and Sourav Banerjee and Kousik Dasgupta and Pushpita Chatterjee and Uttam Ghosh and Utpal Biswas}, title = {Blockchain Enabled {SDN} Framework for Security Management in 5G Applications}, booktitle = {24th International Conference on Distributed Computing and Networking, {ICDCN} 2023, Kharagpur, India, January 4-7, 2023}, pages = {414--419}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3571306.3571445}, doi = {10.1145/3571306.3571445}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcn/DasBDCGB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/Zhao23, author = {Kaifa Zhao}, title = {Demystifying Privacy and Security Issues in Potentially Harmful Mobile Applications}, booktitle = {43rd {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2023, Hong Kong, July 18-21, 2023}, pages = {963--964}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICDCS57875.2023.00102}, doi = {10.1109/ICDCS57875.2023.00102}, timestamp = {Tue, 24 Oct 2023 14:47:33 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/Zhao23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/NashC23, author = {Aleck Nash and Kim{-}Kwang Raymond Choo}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {31--53}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_3}, doi = {10.1007/978-3-031-56583-0\_3}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/NashC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfnds/RakhimberdievTA23, author = {Kuvonchbek Bakhtiyorovich Rakhimberdiev and Asiya Tureniyazova and Ali Arziev and Hurlixa Sarsenbaeva and Dauletmurat Bimuratov}, title = {Application of Cryptographic Algorithms in Ensuring and Improving the Security of Bank Transactions in the Digital Economy}, booktitle = {Proceedings of the 7th International Conference on Future Networks and Distributed Systems, {ICFNDS} 2023, Dubai, United Arab Emirates, December 21-22, 2023}, pages = {503--510}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3644713.3644787}, doi = {10.1145/3644713.3644787}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfnds/RakhimberdievTA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icimmi/SinghK23, author = {Rinki Singh and Deepika Kukreja}, editor = {Dinesh Goyal and Anil Kumar and Dharm Singh and Marcin Paprzycki and Pooja Jain and B. B. Gupta and Uday Pratap Singh}, title = {Blockchain for IoT Security {\&} Privacy: Applications, Challenges and Future Directions}, booktitle = {Proceedings of the 5th International Conference on Information Management {\&} Machine Intelligence, Jaipur, India, November 23-25, 2023}, pages = {57:1--57:5}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3647444.3647883}, doi = {10.1145/3647444.3647883}, timestamp = {Fri, 17 May 2024 16:58:38 +0200}, biburl = {https://dblp.org/rec/conf/icimmi/SinghK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icise/BinYH23, author = {Dongmei Bin and Chunyan Yang and Songming Han}, title = {Application Design of Data Security Pool System Based on Network Security Data Link Technology}, booktitle = {8th International Conference on Information Systems Engineering, {ICISE} 2023, Dalian, China, June 23-25, 2023}, pages = {419--423}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICISE60366.2023.00095}, doi = {10.1109/ICISE60366.2023.00095}, timestamp = {Thu, 23 Nov 2023 21:16:33 +0100}, biburl = {https://dblp.org/rec/conf/icise/BinYH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/AkbarRSKT23, author = {Khandakar Ashrafi Akbar and Fariha Ishrat Rahman and Anoop Singhal and Latifur Khan and Bhavani Thuraisingham}, editor = {Vallipuram Muthukkumarasamy and Sithu D. Sudarsan and Rudrapatna K. Shyamasundar}, title = {The Design and Application of a Unified Ontology for Cyber Security}, booktitle = {Information Systems Security - 19th International Conference, {ICISS} 2023, Raipur, India, December 16-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {23--41}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-49099-6\_2}, doi = {10.1007/978-3-031-49099-6\_2}, timestamp = {Thu, 04 Jan 2024 08:13:46 +0100}, biburl = {https://dblp.org/rec/conf/iciss/AkbarRSKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitjo/AlkhanafsehS23, author = {Mohammad Y. Alkhanafseh and Ola M. Surakhi}, title = {A Dynamic Locality Sensitive Hashing Algorithm for Efficient Security Applications}, booktitle = {International Conference on Information Technology, {ICIT} 2023, Amman, Jordan, August 9-10, 2023}, pages = {524--530}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICIT58056.2023.10226046}, doi = {10.1109/ICIT58056.2023.10226046}, timestamp = {Wed, 06 Sep 2023 16:07:28 +0200}, biburl = {https://dblp.org/rec/conf/icitjo/AlkhanafsehS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmlca/CaoFLWY23, author = {Ruifeng Cao and Zhichun Fang and Shaowa Lin and Jian Wu and Ting Yuan}, title = {The Application of Intelligent Computing and Machine Learning in the Security Guarantee and Information Security Scheme Design}, booktitle = {4th International Conference on Machine Learning and Computer Application, {ICMLCA} 2023, Hangzhou, China, October 27-29, 2023}, pages = {396--400}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3650215.3650285}, doi = {10.1145/3650215.3650285}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmlca/CaoFLWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmtel/WangFCZ23, author = {Yixin Wang and Weiqing Fang and Liang Chen and Wei Zhu}, editor = {Bing Wang and Zuojin Hu and Xianwei Jiang and Yu{-}Dong Zhang}, title = {Research on the Construction and Application of Smart Hospital Based on Mobile Terminal Security Aggregation Business Management Platform}, booktitle = {Multimedia Technology and Enhanced Learning - 5th {EAI} International Conference, {ICMTEL} 2023, Leicester, UK, April 28-29, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {532}, pages = {354--361}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50571-3\_25}, doi = {10.1007/978-3-031-50571-3\_25}, timestamp = {Tue, 30 Apr 2024 13:48:13 +0200}, biburl = {https://dblp.org/rec/conf/icmtel/WangFCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict/ChandraTSPTTS23, author = {Rudy Chandra and Togu Novriansyah Turnip and Eka Stephani Sinambela and Goklas Henry Agus Panjaitan and Vivi Nessa Tampubolon and Agnes Mebyolla Turnip and Donianto Siahaan}, title = {Mobile Application Security in the Health Care and Finance Sector with Static Analysis (Tools: MobSF)}, booktitle = {29th International Conference on Telecommunications, {ICT} 2023, Toba, Indonesia, November 8-9, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICT60153.2023.10374057}, doi = {10.1109/ICT60153.2023.10374057}, timestamp = {Mon, 22 Jan 2024 20:34:14 +0100}, biburl = {https://dblp.org/rec/conf/ict/ChandraTSPTTS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iisa/KormpakisKAMPM23, author = {Georgios Kormpakis and Panagiotis Kapsalis and Konstantinos Alexakis and Zoi Mylona and Sotiris Pelekis and Vangelis Marinakis}, editor = {Nikolaos G. Bourbakis and George A. Tsihrintzis and Maria Virvou}, title = {Energy Sector Digitilisation: {A} Security Framework Application for Role-Based Access Management}, booktitle = {14th International Conference on Information, Intelligence, Systems {\&} Applications, {IISA} 2023, Volos, Greece, July 10-12, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IISA59645.2023.10345842}, doi = {10.1109/IISA59645.2023.10345842}, timestamp = {Fri, 19 Jan 2024 14:45:43 +0100}, biburl = {https://dblp.org/rec/conf/iisa/KormpakisKAMPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotais/RahmawatiSSSKH23, author = {Tia Rahmawati and Rama Wijaya Shiddiq and Mochamad Rizal Sumpena and Shendy Setiawan and Nyoman Bogi Aditya Karna and Sofia Naning Hertiana}, title = {Web Application Firewall Using Proxy and Security Information and Event Management {(SIEM)} for {OWASP} Cyber Attack Detection}, booktitle = {{IEEE} International Conference on Internet of Things and Intelligence Systems, IoTaIS 2023, Bali, Indonesia, November 28-30, 2023}, pages = {280--285}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IoTaIS60147.2023.10346051}, doi = {10.1109/IOTAIS60147.2023.10346051}, timestamp = {Fri, 09 Feb 2024 20:38:53 +0100}, biburl = {https://dblp.org/rec/conf/iotais/RahmawatiSSSKH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/ChatzisofroniouMK23, author = {George Chatzisofroniou and Chris Markellos and Panayiotis Kotzanikolaou}, title = {Assessing the Security Risks of Medical Mobile Applications}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2023, Gammarth, Tunisia, July 9-12, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISCC58397.2023.10217984}, doi = {10.1109/ISCC58397.2023.10217984}, timestamp = {Wed, 06 Sep 2023 08:09:43 +0200}, biburl = {https://dblp.org/rec/conf/iscc/ChatzisofroniouMK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ismict/BorghiniCMRJHPH23, author = {Giacomo Borghini and Stefano Caputo and Lorenzo Mucchi and Adnan Rashid and Sara Jayousi and Matti H{\"{a}}m{\"{a}}l{\"{a}}inen and Tuomas Paso and Marco Hernandez}, title = {Security of Wireless Body Area Networks for Healthcare Applications: Comparison between {ETSI} and {IEEE} Approaches}, booktitle = {17th {IEEE} International Symposium on Medical Information and Communication Technology, {ISMICT} 2023, Lincoln, NE, USA, May 10-12, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISMICT58261.2023.10152140}, doi = {10.1109/ISMICT58261.2023.10152140}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ismict/BorghiniCMRJHPH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec2/YanCGY23, author = {Sun Yan and Luo Cuiyun and Li Guangming and Wu Yin}, title = {Research on the Application of Maintenance Sensitivity and Network Reconfiguration in Power Grid Security and Stability Platform}, booktitle = {{IEEE} Sustainable Power and Energy Conference, iSPEC 2023, Chongqing, China, November 28-30, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/iSPEC58282.2023.10402845}, doi = {10.1109/ISPEC58282.2023.10402845}, timestamp = {Thu, 22 Feb 2024 20:17:11 +0100}, biburl = {https://dblp.org/rec/conf/ispec2/YanCGY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itnac/AliGLD23, author = {Belal Ali and Mark A. Gregory and Shuo Li and Omar Amjad Dib}, title = {Zero Trust Security Framework for 5G {MEC} Applications: Evaluating {UE} Dynamic Network Behaviour}, booktitle = {33rd International Telecommunication Networks and Applications Conference, {ITNAC} 2023, Melbourne, Australia, November 29 - Dec. 1, 2023}, pages = {140--144}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ITNAC59571.2023.10368551}, doi = {10.1109/ITNAC59571.2023.10368551}, timestamp = {Mon, 22 Jan 2024 20:34:15 +0100}, biburl = {https://dblp.org/rec/conf/itnac/AliGLD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itnac/KasturiLPL23, author = {Santanam Kasturi and Xiaolong Li and John Pickard and Peng Li}, title = {Understanding Statistical Correlation of Application Security Vulnerability Data from Detection and Monitoring Tools}, booktitle = {33rd International Telecommunication Networks and Applications Conference, {ITNAC} 2023, Melbourne, Australia, November 29 - Dec. 1, 2023}, pages = {289--296}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ITNAC59571.2023.10368476}, doi = {10.1109/ITNAC59571.2023.10368476}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itnac/KasturiLPL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mipro/KaniskiDK23, author = {Matija Kaniski and Jasminka Dobsa and Dragutin Kermek}, editor = {Dragan Cisic and Neven Vrcek and Marko Koricic and Vera Gradisnik and Karolj Skala and Zeljka Car and Marina Cicin{-}Sain and Snjezana Babic and Vlado Sruk and Dejan Skvorc and Alan Jovic and Stjepan Gros and Boris Vrdoljak and Edvard Tijan and Tihomir Katulic and Juraj Petrovic and Tihana Galinac Grbac and Lovro Bozicevic}, title = {Deep Learning within the Web Application Security Scope - Literature Review}, booktitle = {46th {MIPRO} {ICT} and Electronics Convention, {MIPRO} 2023, Opatija, Croatia, May 22-26, 2023}, pages = {1195--1200}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/MIPRO57284.2023.10159847}, doi = {10.23919/MIPRO57284.2023.10159847}, timestamp = {Thu, 13 Jul 2023 08:42:06 +0200}, biburl = {https://dblp.org/rec/conf/mipro/KaniskiDK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mipro/MilenkovicNCP23, author = {Melita Milenkovic and Robertina Nikolic and Silvestar Celan and Paula Petrosanec}, editor = {Dragan Cisic and Neven Vrcek and Marko Koricic and Vera Gradisnik and Karolj Skala and Zeljka Car and Marina Cicin{-}Sain and Snjezana Babic and Vlado Sruk and Dejan Skvorc and Alan Jovic and Stjepan Gros and Boris Vrdoljak and Edvard Tijan and Tihomir Katulic and Juraj Petrovic and Tihana Galinac Grbac and Lovro Bozicevic}, title = {Analysis of IoT Devices Security for Household Applications}, booktitle = {46th {MIPRO} {ICT} and Electronics Convention, {MIPRO} 2023, Opatija, Croatia, May 22-26, 2023}, pages = {1490--1495}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/MIPRO57284.2023.10159881}, doi = {10.23919/MIPRO57284.2023.10159881}, timestamp = {Thu, 13 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mipro/MilenkovicNCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/KecskemetiGVL23, author = {K{\'{a}}roly Kecskem{\'{e}}ti and Csaba Gy{\"{o}}rgyi and P{\'{e}}ter V{\"{o}}r{\"{o}}s and S{\'{a}}ndor Laki}, editor = {Jie Wu and Suresh Subramaniam and Bo Ji and Carla{-}Fabiana Chiasserini}, title = {In-Network Security Applications with {P4RROT}}, booktitle = {Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, MobiHoc 2023, Washington, DC, USA, October 23-26, 2023}, pages = {346--351}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3565287.3617612}, doi = {10.1145/3565287.3617612}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobihoc/KecskemetiGVL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msr/SchneiderOCS23, author = {Simon Schneider and Tufan {\"{O}}zen and Michael Chen and Riccardo Scandariato}, title = {microSecEnD: {A} Dataset of Security-Enriched Dataflow Diagrams for Microservice Applications}, booktitle = {20th {IEEE/ACM} International Conference on Mining Software Repositories, {MSR} 2023, Melbourne, Australia, May 15-16, 2023}, pages = {125--129}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/MSR59073.2023.00030}, doi = {10.1109/MSR59073.2023.00030}, timestamp = {Wed, 19 Jul 2023 17:21:49 +0200}, biburl = {https://dblp.org/rec/conf/msr/SchneiderOCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msr/ZeroualiOR23, author = {Ahmed Zerouali and Ruben Opdebeeck and Coen De Roover}, title = {Helm Charts for Kubernetes Applications: Evolution, Outdatedness and Security Risks}, booktitle = {20th {IEEE/ACM} International Conference on Mining Software Repositories, {MSR} 2023, Melbourne, Australia, May 15-16, 2023}, pages = {523--533}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/MSR59073.2023.00078}, doi = {10.1109/MSR59073.2023.00078}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/msr/ZeroualiOR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChenLC0L23, author = {An Chen and Jiho Lee and Basanta Chaulagain and Yonghwi Kwon and Kyu Hyung Lee}, title = {SynthDB: Synthesizing Database via Program Analysis for Security Testing of Web Applications}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/synthdb-synthesizing-database-via-program-analysis-for-security-testing-of-web-applications/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ChenLC0L23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Jin0CD0W23, author = {Zihao Jin and Shuo Chen and Yang Chen and Haixin Duan and Jianjun Chen and Jianping Wu}, title = {A Security Study about Electron Applications and a Programming Methodology to Tame {DOM} Functionalities}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/a-security-study-about-electron-applications-and-a-programming-methodology-to-tame-dom-functionalities/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/Jin0CD0W23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pads/ChenHQJ23, author = {Gong Chen and Zheng Hu and Yanfeng Qu and Dong Jin}, editor = {Margaret L. Loper and Dong (Kevin) Jin and Christopher D. Carothers}, title = {Combining Power Simulation and Programmable Network Emulation for Smart Grid Security Application Evaluation}, booktitle = {Proceedings of the 2023 {ACM} {SIGSIM} Conference on Principles of Advanced Discrete Simulation, {SIGSIM-PADS} 2023, Orlando, FL, USA, June 21-23, 2023}, pages = {52--53}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3573900.3593633}, doi = {10.1145/3573900.3593633}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pads/ChenHQJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sds/FarukC23, author = {Md. Jobair Hossain Faruk and Jerry Q. Cheng}, editor = {Muhannad Quwaider and Yaser Jararweh and Elhadj Benkhelifa and Jaime Lloret}, title = {Integration of Blockchain in Computer Networking: Overview, Applications, and Future Perspectives for Software-defined Networking (SDN), Network Security, and Protocols}, booktitle = {Tenth International Conference on Software Defined Systems, {SDS} 2023, San Antonio, TX, USA, October 23-25, 2023}, pages = {20--27}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SDS59856.2023.10329025}, doi = {10.1109/SDS59856.2023.10329025}, timestamp = {Thu, 04 Jan 2024 08:13:43 +0100}, biburl = {https://dblp.org/rec/conf/sds/FarukC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/ShuvoHMS23, author = {Md. Wasiuddin Pathan Shuvo and Md. Nazmul Hoq and Suryadipta Majumdar and Paria Shirani}, editor = {Felix G{\"{u}}nther and Julia Hesse}, title = {On Reducing Underutilization of Security Standards by Deriving Actionable Rules: An Application to IoT}, booktitle = {Security Standardisation Research - 8th International Conference, {SSR} 2023, Lyon, France, April 22-23, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13895}, pages = {103--128}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30731-7\_5}, doi = {10.1007/978-3-031-30731-7\_5}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secsr/ShuvoHMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/LiCFFLLLC23, author = {Kaixuan Li and Sen Chen and Lingling Fan and Ruitao Feng and Han Liu and Chengwei Liu and Yang Liu and Yixiang Chen}, editor = {Satish Chandra and Kelly Blincoe and Paolo Tonella}, title = {Comparison and Evaluation on Static Application Security Testing {(SAST)} Tools for Java}, booktitle = {Proceedings of the 31st {ACM} Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, {ESEC/FSE} 2023, San Francisco, CA, USA, December 3-9, 2023}, pages = {921--933}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3611643.3616262}, doi = {10.1145/3611643.3616262}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/LiCFFLLLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soli/BalachandranKLEK23, author = {Vivek Balachandran and Ryan Fraser Kirwan and Peter Loh and Mohamed Riaz Ebrahim and Ravishanker Kusuma}, title = {{ASAP:} Application Security Assessment Protocol}, booktitle = {{IEEE} International Conference on Service Operations and Logistics, and Informatics, {SOLI} 2023, Singapore, December 11-13, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SOLI60636.2023.10425121}, doi = {10.1109/SOLI60636.2023.10425121}, timestamp = {Thu, 29 Feb 2024 20:53:04 +0100}, biburl = {https://dblp.org/rec/conf/soli/BalachandranKLEK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spcnc/BinTLYL23, author = {Dongmei Bin and Fuchuan Tang and Yangguang Lin and Chunyan Yang and Ying Ling}, title = {Application of Zero Trust Security Architecture in Power Communication Network Security Management System}, booktitle = {Proceedings of the 2nd International Conference on Signal Processing, Computer Networks and Communications, {SPCNC} 2023, Xiamen, China, December 8-10, 2023}, pages = {397--401}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3654446.3654517}, doi = {10.1145/3654446.3654517}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spcnc/BinTLYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spcnc/LiWGL23, author = {Xiaolong Li and Kongpeng Wei and Hongbin Gu and Bo Liu}, title = {Research and Application of Network Security Situational Awareness Technology Based on Ridge Regression}, booktitle = {Proceedings of the 2nd International Conference on Signal Processing, Computer Networks and Communications, {SPCNC} 2023, Xiamen, China, December 8-10, 2023}, pages = {169--173}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3654446.3654476}, doi = {10.1145/3654446.3654476}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spcnc/LiWGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spcnc/WangZY23, author = {Nan Wang and Qinghua Zhang and Xu Yang}, title = {Discussion on the Application of Tracking Codes on Color Laser Printouts in Information Security and Document Anti-counterfeiting}, booktitle = {Proceedings of the 2nd International Conference on Signal Processing, Computer Networks and Communications, {SPCNC} 2023, Xiamen, China, December 8-10, 2023}, pages = {378--383}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3654446.3654514}, doi = {10.1145/3654446.3654514}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spcnc/WangZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssci/SiddiqueHRGSG23, author = {Sunzida Siddique and Mohd Ariful Haque and Rakib Hossain Rifat and Roy George and Khalil Shujaee and Kishor Datta Gupta}, title = {Cyber Security Issues in the Industrial Applications of Digital Twins}, booktitle = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2023, Mexico City, Mexico, December 5-8, 2023}, pages = {873--878}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SSCI52147.2023.10371850}, doi = {10.1109/SSCI52147.2023.10371850}, timestamp = {Mon, 15 Jan 2024 21:26:31 +0100}, biburl = {https://dblp.org/rec/conf/ssci/SiddiqueHRGSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ucami/RussoLGM23, author = {Enrico Russo and Giacomo Longo and Meriem Guerar and Alessio Merlo}, editor = {Jos{\'{e}} Bravo and Gabriel Urz{\'{a}}iz}, title = {Cloud-Native Application Security Training and Testing with Cyber Ranges}, booktitle = {Proceedings of the 15th International Conference on Ubiquitous Computing {\&} Ambient Intelligence (UCAmI 2023) - Volume 3, Riviera Maya, Mexico, 28-29 November, 2023}, series = {Lecture Notes in Networks and Systems}, volume = {841}, pages = {205--216}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48590-9\_20}, doi = {10.1007/978-3-031-48590-9\_20}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ucami/RussoLGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AzadJTEN23, author = {Babak Amin Azad and Rasoul Jahanshahi and Chris Tsoukaladelis and Manuel Egele and Nick Nikiforakis}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {AnimateDead: Debloating Web Applications Using Concolic Execution}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5575--5591}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/azad}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AzadJTEN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Ding023, author = {Changchang Ding and Yan Huang}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Dubhe: Succinct Zero-Knowledge Proofs for Standard {AES} and related Applications}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4373--4390}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/ding-changchang}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Ding023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JahanshahiANE23, author = {Rasoul Jahanshahi and Babak Amin Azad and Nick Nikiforakis and Manuel Egele}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Minimalist: Semi-automated Debloating of {PHP} Web Applications through Static Analysis}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5557--5573}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/jahanshahi}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/JahanshahiANE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Jegan0BS23, author = {Deepak Sirone Jegan and Liang Wang and Siddhant Bhagat and Michael M. Swift}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Guarding Serverless Applications with Kalium}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4087--4104}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/jegan}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Jegan0BS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KassarCB23, author = {Feras Al Kassar and Luca Compagna and Davide Balzarotti}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {{WHIP:} Improving Static Vulnerability Detection in Web Application by Forcing tools to Collaborate}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {6079--6096}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/al-kassar}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KassarCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KochAJ23, author = {Simon Koch and Benjamin Altpeter and Martin Johns}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {The {OK} Is Not Enough: {A} Large Scale Study of Consent Dialogs in Smartphone Applications}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5467--5484}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/koch}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KochAJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Li0ZSSQ23, author = {Guoren Li and Hang Zhang and Jinmeng Zhou and Wenbo Shen and Yulei Sui and Zhiyun Qian}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4211--4228}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/li-guoren}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Li0ZSSQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiDHHZS23, author = {Yun Li and Yufei Duan and Zhicong Huang and Cheng Hong and Chao Zhang and Yifan Song}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Efficient 3PC for Binary Circuits with Application to Maliciously-Secure {DNN} Inference}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5377--5394}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/li-yun}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiDHHZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Wu0ZTMW23, author = {Yafei Wu and Cong Sun and Dongrui Zeng and Gang Tan and Siqi Ma and Peicheng Wang}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {LibScan: Towards More Precise Third-Party Library Identification for Android Applications}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3385--3402}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/wu-yafei}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Wu0ZTMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YaoFKASS23, author = {Mingxuan Yao and Jonathan Fuller and Ranjita Pai Kasturi and Saumya Agarwal and Amit Kumar Sikder and Brendan Saltaformaggio}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {6115--6132}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/yao-mingxuan}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/YaoFKASS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Yu0Q00X23, author = {Jiahao Yu and Wenbo Guo and Qi Qin and Gang Wang and Ting Wang and Xinyu Xing}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {{AIRS:} Explanation for Deep Reinforcement Learning based Security Applications}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {7375--7392}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/yu-jiahao}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Yu0Q00X23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YurekX0023, author = {Thomas Yurek and Zhuolun Xiang and Yu Xia and Andrew Miller}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Long Live The Honey Badger: Robust Asynchronous {DPSS} and its Applications}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5413--5430}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/yurek}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/YurekX0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vmcai/TiraboschiRR23, author = {Ignacio Tiraboschi and Tamara Rezk and Xavier Rival}, editor = {Cezara Dragoi and Michael Emmi and Jingbo Wang}, title = {Sound Symbolic Execution via Abstract Interpretation and Its Application to Security}, booktitle = {Verification, Model Checking, and Abstract Interpretation - 24th International Conference, {VMCAI} 2023, Boston, MA, USA, January 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13881}, pages = {267--295}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-24950-1\_13}, doi = {10.1007/978-3-031-24950-1\_13}, timestamp = {Wed, 29 May 2024 09:08:46 +0200}, biburl = {https://dblp.org/rec/conf/vmcai/TiraboschiRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wfcs/HosseiniFBKSS23, author = {Ali Mohammad Hosseini and Clara Fischer and Mukund Bhole and Wolfgang Kastner and Thilo Sauter and Sebastian Schlund}, title = {A Safety and Security Requirements Management Methodology in Reconfigurable Collaborative Human-Robot Application}, booktitle = {19th {IEEE} International Conference on Factory Communication Systems, {WFCS} 2023, Pavia, Italy, April 26-28, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/WFCS57264.2023.10144233}, doi = {10.1109/WFCS57264.2023.10144233}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wfcs/HosseiniFBKSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wincom/RguigEOH23, author = {Bouchra Rguig and Brahim Es{-}Sousy and Said Ouhmi and Khalid Housni}, editor = {Khalil Ibrahimi and Mohamed El{-}Kamili and Abdellatif Kobbane and Ibraheem Shayea}, title = {IoT Security Based on Smart Contracts: Classification of Algorithms, Complexity, Robustness and Fields of Application}, booktitle = {10th International Conference on Wireless Networks and Mobile Communications, {WINCOM} 2023, Istanbul, Turkey, October 26-28, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/WINCOM59760.2023.10322936}, doi = {10.1109/WINCOM59760.2023.10322936}, timestamp = {Mon, 01 Jan 2024 01:38:00 +0100}, biburl = {https://dblp.org/rec/conf/wincom/RguigEOH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worldcist/ConvertiniDILSV23, author = {Vito Nicola Convertini and Vincenzo Dentamaro and Donato Impedovo and Ugo Lopez and Michele Scalera and Andrea Viccari}, editor = {{\'{A}}lvaro Rocha and Hojjat Adeli and Gintautas Dzemyda and Fernando Moreira and Valentina Colla}, title = {{BOOGIE:} {A} New Blockchain Application for Health Certificate Security}, booktitle = {Information Systems and Technologies - WorldCIST 2023, Volume 4, Pisa, Italy, April 4-6, 2023}, series = {Lecture Notes in Networks and Systems}, volume = {802}, pages = {371--380}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45651-0\_37}, doi = {10.1007/978-3-031-45651-0\_37}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/worldcist/ConvertiniDILSV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpmc/TungLCLC23, author = {Yi{-}Chih Tung and En{-}Cheng Liou and Chung{-}Hsiang Cheng and Tzu{-}Hang Lin and Shu{-}Min Chuang}, title = {Closed-Loop Security Management for Developing {O-RAN} Infrastructure and {B5G} {RIC} Applications}, booktitle = {26th International Symposium on Wireless Personal Multimedia Communications, {WPMC} 2023, Tampa, FL, USA, November 19-22, 2023}, pages = {278--281}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/WPMC59531.2023.10338980}, doi = {10.1109/WPMC59531.2023.10338980}, timestamp = {Wed, 17 Jan 2024 10:56:10 +0100}, biburl = {https://dblp.org/rec/conf/wpmc/TungLCLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsse/TanLGJLT23, author = {Su{-}Mae Tan and Tze Wei Liew and Chin Lay Gan and Hasmida Jamaluddin and Yi Yong Lee and James Yong Zheng Tey}, title = {What drives the continuous adoption of mobile stock trading applications among Gen-Z traders? An investigation of the TAM, social influence, trust, and perceived security}, booktitle = {The 5th World Symposium on Software Engineering, {WSSE} 2023, Tokyo, Japan, September 22-24, 2023}, pages = {96--103}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3631991.3632006}, doi = {10.1145/3631991.3632006}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wsse/TanLGJLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/23/BugliesiCR23, author = {Michele Bugliesi and Stefano Calzavara and Alvise Rabitti}, editor = {Sedat Akleylek and Besik Dundua}, title = {Cryptographic Web Applications: from Security Engineering to Formal Analysis}, booktitle = {Handbook of Formal Analysis and Verification in Cryptography}, pages = {275--318}, publisher = {{CRC} Press}, year = {2023}, url = {https://doi.org/10.1201/9781003090052-6}, doi = {10.1201/9781003090052-6}, timestamp = {Mon, 25 Sep 2023 12:19:41 +0200}, biburl = {https://dblp.org/rec/books/crc/23/BugliesiCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/23/BhattacharjyaS23, author = {Sairath Bhattacharjya and Hossein Saiedian}, editor = {Kevin Daimi and Abeer Alsadoon and Cathryn Peoples and Nour El Madhoun}, title = {End-to-End Security for IoT Communications: {A} Practical Implementation}, booktitle = {Emerging Trends in Cybersecurity Applications}, pages = {21--43}, publisher = {Springer International Publishing}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-09640-2\_2}, doi = {10.1007/978-3-031-09640-2\_2}, timestamp = {Wed, 22 Feb 2023 15:20:25 +0100}, biburl = {https://dblp.org/rec/books/sp/23/BhattacharjyaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/23/ColombWIA23, author = {Yvette Colomb and Peter White and Rafiqul Islam and Abeer Alsadoon}, editor = {Kevin Daimi and Abeer Alsadoon and Cathryn Peoples and Nour El Madhoun}, title = {Applying Zero Trust Architecture and Probability-Based Authentication to Preserve Security and Privacy of Data in the Cloud}, booktitle = {Emerging Trends in Cybersecurity Applications}, pages = {137--169}, publisher = {Springer International Publishing}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-09640-2\_7}, doi = {10.1007/978-3-031-09640-2\_7}, timestamp = {Sat, 15 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/23/ColombWIA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/23/RealistaPSNA23, author = {Nuno Realista and Francisco Palma and Carlos Serr{\~{a}}o and Lu{\'{\i}}s Nunes and Ana de Almeida}, editor = {Kevin Daimi and Abeer Alsadoon and Cathryn Peoples and Nour El Madhoun}, title = {Improving Android Application Quality Through Extendable, Automated Security Testing}, booktitle = {Emerging Trends in Cybersecurity Applications}, pages = {251--274}, publisher = {Springer International Publishing}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-09640-2\_12}, doi = {10.1007/978-3-031-09640-2\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/23/RealistaPSNA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/Al-DosariHB23, author = {Khalifa Al{-}Dosari and Ziad Hunaiti and Wamadeva Balachandran}, editor = {Muhammad Alshurideh and Barween Hikmat Al Kurdi and Ra'ed Masa'deh and Haitham M. Alzoubi and Said A. Salloum}, title = {A Review of Civilian Drones Systems, Applications, Benefits, Safety, and Security Challenges}, booktitle = {The Effect of Information Technology on Business and Marketing Intelligence Systems}, series = {Studies in Computational Intelligence}, volume = {1056}, pages = {793--812}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-12382-5\_43}, doi = {10.1007/978-3-031-12382-5\_43}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sci/Al-DosariHB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2023, title = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106}, doi = {10.1145/3627106}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2023-1, editor = {Jian Guo and Ron Steinfeld}, title = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14438}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8721-4}, doi = {10.1007/978-981-99-8721-4}, isbn = {978-981-99-8720-7}, timestamp = {Sun, 07 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2023-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2023-2, editor = {Jian Guo and Ron Steinfeld}, title = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14439}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8724-5}, doi = {10.1007/978-981-99-8724-5}, isbn = {978-981-99-8723-8}, timestamp = {Sun, 07 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2023-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2023-3, editor = {Jian Guo and Ron Steinfeld}, title = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14440}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8727-6}, doi = {10.1007/978-981-99-8727-6}, isbn = {978-981-99-8726-9}, timestamp = {Sun, 07 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2023-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2023-4, editor = {Jian Guo and Ron Steinfeld}, title = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14441}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8730-6}, doi = {10.1007/978-981-99-8730-6}, isbn = {978-981-99-8729-0}, timestamp = {Sun, 07 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2023-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2023-5, editor = {Jian Guo and Ron Steinfeld}, title = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14442}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8733-7}, doi = {10.1007/978-981-99-8733-7}, isbn = {978-981-99-8732-0}, timestamp = {Sun, 07 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2023-5.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2023-6, editor = {Jian Guo and Ron Steinfeld}, title = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14443}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8736-8}, doi = {10.1007/978-981-99-8736-8}, isbn = {978-981-99-8735-1}, timestamp = {Sun, 07 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2023-6.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2023-7, editor = {Jian Guo and Ron Steinfeld}, title = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {VII}}, series = {Lecture Notes in Computer Science}, volume = {14444}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8739-9}, doi = {10.1007/978-981-99-8739-9}, isbn = {978-981-99-8738-2}, timestamp = {Sun, 07 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2023-7.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2023-8, editor = {Jian Guo and Ron Steinfeld}, title = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {VIII}}, series = {Lecture Notes in Computer Science}, volume = {14445}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8742-9}, doi = {10.1007/978-981-99-8742-9}, isbn = {978-981-99-8741-2}, timestamp = {Sun, 07 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2023-8.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/atis/2022, editor = {Srikanth Prabhu and Shiva Raj Pokhrel and Gang Li}, title = {Applications and Techniques in Information Security - 13th International Conference, {ATIS} 2022, Manipal, India, December 30-31, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1804}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-2264-2}, doi = {10.1007/978-981-99-2264-2}, isbn = {978-981-99-2263-5}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cesar/2022, editor = {Gurvan le Guernic}, title = {Proceedings of the 29th Computer {\&} Electronics Security Application Rendezvous co-located with the 7th European Cyber Week {(ECW} 2022), Rennes, France, November 15-16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3329}, publisher = {CEUR-WS.org}, year = {2023}, url = {http://ceur-ws.org/Vol-3329}, urn = {urn:nbn:de:0074-3329-8}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cesar/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2023, editor = {Mohamed Shehab and Maribel Fern{\'{a}}ndez and Ninghui Li}, title = {Proceedings of the Thirteenth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577923}, doi = {10.1145/3577923}, timestamp = {Mon, 24 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2023, editor = {Vijayalakshmi Atluri and Anna Lisa Ferrara}, title = {Data and Applications Security and Privacy {XXXVII} - 37th Annual {IFIP} {WG} 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13942}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37586-6}, doi = {10.1007/978-3-031-37586-6}, isbn = {978-3-031-37585-9}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fdse/2023, editor = {Tran Khanh Dang and Josef K{\"{u}}ng and Tai M. Chung}, title = {Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications - 10th International Conference, {FDSE} 2023, Da Nang, Vietnam, November 22-24, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1925}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8296-7}, doi = {10.1007/978-981-99-8296-7}, isbn = {978-981-99-8295-0}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdse/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tpsisa/2023, title = {5th {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2023, Atlanta, GA, USA, November 1-4, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/TPS-ISA58951.2023}, doi = {10.1109/TPS-ISA58951.2023}, isbn = {979-8-3503-2385-6}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2022, editor = {Ilsun You and Taek{-}Young Youn}, title = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-25659-2}, doi = {10.1007/978-3-031-25659-2}, isbn = {978-3-031-25658-5}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-07783, author = {Ignacio Tiraboschi and Tamara Rezk and Xavier Rival}, title = {Sound Symbolic Execution via Abstract Interpretation and its Application to Security}, journal = {CoRR}, volume = {abs/2301.07783}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.07783}, doi = {10.48550/ARXIV.2301.07783}, eprinttype = {arXiv}, eprint = {2301.07783}, timestamp = {Thu, 26 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-07783.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-01508, author = {Fangzhou Wang and A. Lee Swindlehurst}, title = {Applications of Absorptive Reconfigurable Intelligent Surfaces in Interference Mitigation and Physical Layer Security}, journal = {CoRR}, volume = {abs/2302.01508}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.01508}, doi = {10.48550/ARXIV.2302.01508}, eprinttype = {arXiv}, eprint = {2302.01508}, timestamp = {Thu, 09 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-01508.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-06725, author = {Serhan W. Bahar}, title = {Advanced Security Threat Modelling for Blockchain-Based FinTech Applications}, journal = {CoRR}, volume = {abs/2304.06725}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.06725}, doi = {10.48550/ARXIV.2304.06725}, eprinttype = {arXiv}, eprint = {2304.06725}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-06725.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-09486, author = {Jingjin Li and Chao Chen and Lei Pan and Mostafa Rahimi Azghadi and Hossein Ghodosi and Jun Zhang}, title = {Security and Privacy Problems in Voice Assistant Applications: {A} Survey}, journal = {CoRR}, volume = {abs/2304.09486}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.09486}, doi = {10.48550/ARXIV.2304.09486}, eprinttype = {arXiv}, eprint = {2304.09486}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-09486.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-12769, author = {Simon Schneider and Riccardo Scandariato}, title = {Automatic Extraction of Security-Rich Dataflow Diagrams for Microservice Applications written in Java}, journal = {CoRR}, volume = {abs/2304.12769}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.12769}, doi = {10.48550/ARXIV.2304.12769}, eprinttype = {arXiv}, eprint = {2304.12769}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-12769.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-01936, author = {Georgios Batsis and Ioannis Mademlis and Georgios Th. Papadopoulos}, title = {Illicit item detection in X-ray images for security applications}, journal = {CoRR}, volume = {abs/2305.01936}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.01936}, doi = {10.48550/ARXIV.2305.01936}, eprinttype = {arXiv}, eprint = {2305.01936}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-01936.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-05108, author = {Uchenna Daniel Ani and Jeremy M. Watson and Nilufer Tuptuk and Steve Hailes and Aslam Jawar}, title = {Socio-Technical Security Modelling: Analysis of State-of-the-Art, Application, and Maturity in Critical Industrial Infrastructure Environments/Domains}, journal = {CoRR}, volume = {abs/2305.05108}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.05108}, doi = {10.48550/ARXIV.2305.05108}, eprinttype = {arXiv}, eprint = {2305.05108}, timestamp = {Fri, 12 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-05108.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-09261, author = {Beckett LeClair and James McLeod and Lee Ramsay and Mick Warren}, title = {Challenges with the Application of Cyber Security for Airworthiness {(CSA)} in Real-World Contexts}, journal = {CoRR}, volume = {abs/2305.09261}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.09261}, doi = {10.48550/ARXIV.2305.09261}, eprinttype = {arXiv}, eprint = {2305.09261}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-09261.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-11781, author = {Qingkai Shi and Junyang Shao and Yapeng Ye and Mingwei Zheng and Xiangyu Zhang}, title = {Lifting Network Protocol Implementation to Precise Format Specification with Security Applications}, journal = {CoRR}, volume = {abs/2305.11781}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.11781}, doi = {10.48550/ARXIV.2305.11781}, eprinttype = {arXiv}, eprint = {2305.11781}, timestamp = {Thu, 25 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-11781.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-16473, author = {Muhammad Adil and Houbing Song and Muhammad Khurram Khan and Ahmed Farouk and Zhanpeng Jin}, title = {5G/6G-Enabled Metaverse Technologies: Taxonomy, Applications, and Open Security Challenges with Future Research Directions}, journal = {CoRR}, volume = {abs/2305.16473}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.16473}, doi = {10.48550/ARXIV.2305.16473}, eprinttype = {arXiv}, eprint = {2305.16473}, timestamp = {Wed, 07 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-16473.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-12516, author = {Souvik Das and Priyanka Dey and Debasish Chatterjee}, title = {Separability of State Trajectories and its Applications to Security of Cyber-Physical Systems}, journal = {CoRR}, volume = {abs/2306.12516}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.12516}, doi = {10.48550/ARXIV.2306.12516}, eprinttype = {arXiv}, eprint = {2306.12516}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-12516.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-15588, author = {Samuel C. Hollifield and Pablo Moriano and William L. Lambert and Joel Asiamah and Isaac Sikkema and Michael D. Iannacone}, title = {Developing and Deploying Security Applications for In-Vehicle Networks}, journal = {CoRR}, volume = {abs/2306.15588}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.15588}, doi = {10.48550/ARXIV.2306.15588}, eprinttype = {arXiv}, eprint = {2306.15588}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-15588.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-16540, author = {Joel H{\"{o}}glund and Shahid Raza}, title = {{BLEND:} Efficient and blended IoT data storage and communication with application layer security}, journal = {CoRR}, volume = {abs/2306.16540}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.16540}, doi = {10.48550/ARXIV.2306.16540}, eprinttype = {arXiv}, eprint = {2306.16540}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-16540.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-08840, author = {Zeyang Jia and Eli Ben{-}Michael and Kosuke Imai}, title = {Bayesian Safe Policy Learning with Chance Constrained Optimization: Application to Military Security Assessment during the Vietnam War}, journal = {CoRR}, volume = {abs/2307.08840}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.08840}, doi = {10.48550/ARXIV.2307.08840}, eprinttype = {arXiv}, eprint = {2307.08840}, timestamp = {Tue, 25 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-08840.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-10342, author = {Khadija Manzoor and Umara Noor and Zahid Rashid}, title = {NFT-Based Blockchain-Oriented Security Framework for Metaverse Applications}, journal = {CoRR}, volume = {abs/2307.10342}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.10342}, doi = {10.48550/ARXIV.2307.10342}, eprinttype = {arXiv}, eprint = {2307.10342}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-10342.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-12488, author = {Zhilong Wang and Lan Zhang and Peng Liu}, title = {ChatGPT for Software Security: Exploring the Strengths and Limitations of ChatGPT in the Security Applications}, journal = {CoRR}, volume = {abs/2307.12488}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.12488}, doi = {10.48550/ARXIV.2307.12488}, eprinttype = {arXiv}, eprint = {2307.12488}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-12488.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-10613, author = {Jasper Surmont and Weihong Wang and Tom Van Cutsem}, title = {Static Application Security Testing of Consensus-Critical Code in the Cosmos Network}, journal = {CoRR}, volume = {abs/2308.10613}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.10613}, doi = {10.48550/ARXIV.2308.10613}, eprinttype = {arXiv}, eprint = {2308.10613}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-10613.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-14434, author = {Atieh Bakhshandeh and Abdalsamad Keramatfar and Amir Norouzi and Mohammad Mahdi Chekidehkhoun}, title = {Using ChatGPT as a Static Application Security Testing Tool}, journal = {CoRR}, volume = {abs/2308.14434}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.14434}, doi = {10.48550/ARXIV.2308.14434}, eprinttype = {arXiv}, eprint = {2308.14434}, timestamp = {Fri, 01 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-14434.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-14741, author = {Yuvaray Athur Raghuvir and Senthil Govindarajan and Sanjeevi Vijayakumar and Pradeep Yadlapalli and Fabio Di Troia}, title = {Advancement on Security Applications of Private Intersection Sum Protocol}, journal = {CoRR}, volume = {abs/2308.14741}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.14741}, doi = {10.48550/ARXIV.2308.14741}, eprinttype = {arXiv}, eprint = {2308.14741}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-14741.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-02707, author = {Shams Forruque Ahmed and Shanjana Shuravi and Afsana Bhuyian and Shaila Afrin and Aanushka Mehjabin and Sweety Angela Kuldeep and Md. Sakib Bin Alam and Amir H. Gandomi}, title = {Navigating the IoT landscape: Unraveling forensics, security issues, applications, research challenges, and future}, journal = {CoRR}, volume = {abs/2309.02707}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.02707}, doi = {10.48550/ARXIV.2309.02707}, eprinttype = {arXiv}, eprint = {2309.02707}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-02707.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-05525, author = {Shivraj Hanumant Gonde and Christoph Frisch and Svetoslav Duhovnikov and Martin Kubisch and Thomas Meyerhoff and Dominic Schupke}, title = {Physical Layer Security in a Private 5G Network for Industrial and Mobility Application}, journal = {CoRR}, volume = {abs/2310.05525}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.05525}, doi = {10.48550/ARXIV.2310.05525}, eprinttype = {arXiv}, eprint = {2310.05525}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-05525.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-12037, author = {Saleh Darzi and Kasra Ahmadi and Saeed Aghapour and Attila Altay Yavuz and Mehran Mozaffari Kermani}, title = {Envisioning the Future of Cyber Security in Post-Quantum Era: {A} Survey on {PQ} Standardization, Applications, Challenges and Opportunities}, journal = {CoRR}, volume = {abs/2310.12037}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.12037}, doi = {10.48550/ARXIV.2310.12037}, eprinttype = {arXiv}, eprint = {2310.12037}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-12037.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-19459, author = {Amir Pakmehr and Andreas A{\ss}muth and Christoph P. Neumann and Gerald Pirkl}, title = {Security Challenges for Cloud or Fog Computing-Based {AI} Applications}, journal = {CoRR}, volume = {abs/2310.19459}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.19459}, doi = {10.48550/ARXIV.2310.19459}, eprinttype = {arXiv}, eprint = {2310.19459}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-19459.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-00842, author = {Naresh Kshetri and James Hutson and Revathy G}, title = {healthAIChain: Improving security and safety using Blockchain Technology applications in AI-based healthcare systems}, journal = {CoRR}, volume = {abs/2311.00842}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.00842}, doi = {10.48550/ARXIV.2311.00842}, eprinttype = {arXiv}, eprint = {2311.00842}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-00842.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-03723, author = {Alexandru Cojocaru and Juan A. Garay and Fang Song}, title = {Generalized Hybrid Search and Applications to Blockchain and Hash Function Security}, journal = {CoRR}, volume = {abs/2311.03723}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.03723}, doi = {10.48550/ARXIV.2311.03723}, eprinttype = {arXiv}, eprint = {2311.03723}, timestamp = {Thu, 16 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-03723.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-10450, author = {Rui Ventura and Daniel Jos{\'{e}} Franco and Omar Khasro Akram}, title = {A Novel {VAPT} Algorithm: Enhancing Web Application Security Trough {OWASP} top 10 Optimization}, journal = {CoRR}, volume = {abs/2311.10450}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.10450}, doi = {10.48550/ARXIV.2311.10450}, eprinttype = {arXiv}, eprint = {2311.10450}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-10450.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-05275, author = {Fangzhou Wu and Qingzhao Zhang and Ati Priya Bajaj and Tiffany Bao and Ning Zhang and Ruoyu Wang and Chaowei Xiao}, title = {Exploring the Limits of ChatGPT in Software Security Applications}, journal = {CoRR}, volume = {abs/2312.05275}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.05275}, doi = {10.48550/ARXIV.2312.05275}, eprinttype = {arXiv}, eprint = {2312.05275}, timestamp = {Wed, 03 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-05275.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-17726, author = {Aishwarya Seth and Saikath Bhattacharya and Sarah Elder and Nusrat Zahan and Laurie A. Williams}, title = {Comparing Effectiveness and Efficiency of Interactive Application Security Testing {(IAST)} and Runtime Application Self-Protection {(RASP)} Tools in a Large Java-based System}, journal = {CoRR}, volume = {abs/2312.17726}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.17726}, doi = {10.48550/ARXIV.2312.17726}, eprinttype = {arXiv}, eprint = {2312.17726}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-17726.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhovratovichBM23, author = {Dmitry Khovratovich and Mario Marhuenda Beltr{\'{a}}n and Bart Mennink}, title = {Generic Security of the {SAFE} {API} and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2023}, url = {https://eprint.iacr.org/2023/520}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhovratovichBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StefanAS23, author = {Adrian{-}Daniel Stefan and Ionut{-}Petrisor Anghel and Emil Simion}, title = {Quantum-Safe Protocols and Application in Data Security of Medical Records}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2023}, url = {https://eprint.iacr.org/2023/041}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/StefanAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuCCYZ23, author = {Shiyuan Xu and Yibo Cao and Xue Chen and Siu{-}Ming Yiu and Yanmin Zhao}, title = {Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, Implementation, and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {591}, year = {2023}, url = {https://eprint.iacr.org/2023/591}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuCCYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/ws/Song22, author = {Hang Song}, title = {Internet of Everything - Key Technologies, Practical Applications and Security of IoT}, publisher = {WorldScientific}, year = {2022}, url = {https://doi.org/10.1142/12526}, doi = {10.1142/12526}, isbn = {9789811246265}, timestamp = {Tue, 11 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ws/Song22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Truong22, author = {Thomas Truong}, title = {Object-Subject Relationship Detection using Deep Learning and Decision Support Systems for Safety and Security Applications}, school = {University of Calgary, Alberta, Canada}, year = {2022}, url = {http://hdl.handle.net/1880/114338}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Truong22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Blochberger22, author = {Maximilian Blochberger}, title = {Applied declarative security {\&} privacy mechanisms in macOS applications = Angewandte deklarative Mechanismen zur Wahrung von Anwendungssicherheit und Datenschutz in macOS-Anwendungen}, school = {University of Hamburg, Germany}, year = {2022}, url = {https://d-nb.info/1265819351}, timestamp = {Fri, 30 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Blochberger22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Hebborn22, author = {Phil Hebborn}, title = {Security assessment and design of symmetric ciphers for emerging applications}, school = {Ruhr University Bochum, Germany}, year = {2022}, url = {https://hss-opus.ub.ruhr-uni-bochum.de/opus4/frontdoor/index/index/docId/8588}, urn = {urn:nbn:de:hbz:294-85883}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Hebborn22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Mohr22, author = {Martin Mohr}, title = {Systematic Approaches to Advanced Information Flow Analysis - and Applications to Software Security}, school = {Karlsruhe Institute of Technology, Germany}, year = {2022}, url = {https://nbn-resolving.org/urn:nbn:de:101:1-2022070604595001707702}, urn = {urn:nbn:de:101:1-2022070604595001707702}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/dnb/Mohr22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Abegg22, author = {Jean{-}Philippe Abegg}, title = {Security and efficiency of blockchain technologies applied to internet-of-things application. (S{\'{e}}curit{\'{e}} et {\'{e}}fficacit{\'{e}} des technologies blockchain appliqu{\'{e}}es {\`{a}} l'internet des objets)}, school = {University of Strasbourg, France}, year = {2022}, url = {https://tel.archives-ouvertes.fr/tel-04009659}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/hal/Abegg22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Auguste22, author = {Amaury Auguste}, title = {D{\'{e}}ploiement d'un syst{\`{e}}me de suivi par vid{\'{e}}o et analyse comportementale : application {\`{a}} la surveillance urbaine. (Deployment of a video tracking and behavioral analysis system : application to the security of urban spaces)}, school = {University of Western Brittany, Brest, France}, year = {2022}, url = {https://tel.archives-ouvertes.fr/tel-03922664}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/hal/Auguste22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Robles22, author = {Virgile Robles}, title = {Specifying and verifying high-level requirements on large programs : application to security of {C} programs. (Sp{\'{e}}cifier et v{\'{e}}rifier des exigences de haut niveau sur des programmes importants : application {\`{a}} la s{\'{e}}curit{\'{e}} des programmes {C)}}, school = {University of Paris-Saclay, France}, year = {2022}, url = {https://tel.archives-ouvertes.fr/tel-03626084}, timestamp = {Fri, 27 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Robles22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/se/Horga22, author = {Adrian Horga}, title = {Performance and Security Analysis for GPU-Based Applications}, school = {Link{\"{o}}ping University, Sweden}, year = {2022}, url = {https://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-189603}, urn = {urn:nbn:se:liu:diva-189603}, doi = {10.3384/9789179294885}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/se/Horga22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/tr/Sevri22, author = {Mehmet Sevri}, title = {DER{\.{I}}N {\"{O}}{\u{G}}RENME Y{\"{O}}NTEMLER{\.{I}} {KULLANILARAK} {WEB} {UYGULAMA} G{\"{U}}VENL{\.{I}}{\u{G}}{\.{I}} SA{\u{G}}LANMASI {(ENSURING} {WEB} {APPLICATION} {SECURITY} {USING} {DEEP} {LEARNING} {METHODS)}}, school = {Gazi University, Turkey}, year = {2022}, url = {https://tez.yok.gov.tr/UlusalTezMerkezi/tezDetay.jsp?id=W0tQyuxbr25kvI-OpF\_k1g\&no=4cTKIXxmUQPhlMAVpoHaVA}, timestamp = {Sun, 03 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/tr/Sevri22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/DeMarinis22, author = {Nicholas DeMarinis}, title = {Improving Application Security at Scale by Reducing System Call and Library Overprivilege}, school = {Brown University, {USA}}, year = {2022}, url = {https://cs.brown.edu/research/pubs/theses/phd/2022/demarinis.nicholas.pdf}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/DeMarinis22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AbbasiPPC22, author = {Mahmoud Abbasi and Marta Plaza{-}Hern{\'{a}}ndez and Javier Prieto and Juan M. Corchado}, title = {Security in the Internet of Things Application Layer: Requirements, Threats, and Solutions}, journal = {{IEEE} Access}, volume = {10}, pages = {97197--97216}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3205351}, doi = {10.1109/ACCESS.2022.3205351}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AbbasiPPC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AbdulghaniNK22, author = {Hezam Akram Abdulghani and Niels Alexander Nijdam and Dimitri Konstantas}, title = {Analysis on Security and Privacy Guidelines: RFID-Based IoT Applications}, journal = {{IEEE} Access}, volume = {10}, pages = {131528--131554}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3227449}, doi = {10.1109/ACCESS.2022.3227449}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AbdulghaniNK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/CharfeddineMSAA22, author = {Maha Charfeddine and Eya Mezghani and Masmoudi Salma and Chokri Ben Amar and Hesham Alhumyani}, title = {Audio Watermarking for Security and Non-Security Applications}, journal = {{IEEE} Access}, volume = {10}, pages = {12654--12677}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3145950}, doi = {10.1109/ACCESS.2022.3145950}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/CharfeddineMSAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DiniBCPFSS22, author = {Pierpaolo Dini and Andrea Begni and Stefano Ciavarella and Emiliano De Paoli and Giuseppe Fiorelli and Carmelo Silvestro and Sergio Saponara}, title = {Design and Testing Novel One-Class Classifier Based on Polynomial Interpolation With Application to Networking Security}, journal = {{IEEE} Access}, volume = {10}, pages = {67910--67924}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3186026}, doi = {10.1109/ACCESS.2022.3186026}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DiniBCPFSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DivyanshuKKAM22, author = {Divyanshu Divyanshu and Rajat Kumar and Danial Khan and Selma Amara and Yehia Massoud}, title = {Physically Unclonable Function Using {GSHE} Driven {SOT} Assisted p-MTJ for Next Generation Hardware Security Applications}, journal = {{IEEE} Access}, volume = {10}, pages = {93029--93038}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3203817}, doi = {10.1109/ACCESS.2022.3203817}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DivyanshuKKAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/FerragFHMJ22, author = {Mohamed Amine Ferrag and Othmane Friha and Djallel Hamouda and Leandros A. Maglaras and Helge Janicke}, title = {Edge-IIoTset: {A} New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning}, journal = {{IEEE} Access}, volume = {10}, pages = {40281--40306}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3165809}, doi = {10.1109/ACCESS.2022.3165809}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/FerragFHMJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HalakYS22, author = {Basel Halak and Yildiran Yilmaz and Daniel Shiu}, title = {Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security Applications}, journal = {{IEEE} Access}, volume = {10}, pages = {76707--76719}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3192970}, doi = {10.1109/ACCESS.2022.3192970}, timestamp = {Mon, 08 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HalakYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HalakYS22a, author = {Basel Halak and Yildiran Yilmaz and Daniel Shiu}, title = {Comments and Corrections Correction to "Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security Applications"}, journal = {{IEEE} Access}, volume = {10}, pages = {118522}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3219282}, doi = {10.1109/ACCESS.2022.3219282}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HalakYS22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SunLCLIZIA22, author = {Nan Sun and Chang{-}Tsun Li and Hin Chan and Ba Dung Le and Md Zahidul Islam and Leo Yu Zhang and Md. Rafiqul Islam and Warren Armstrong}, title = {Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges}, journal = {{IEEE} Access}, volume = {10}, pages = {44756--44777}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3168716}, doi = {10.1109/ACCESS.2022.3168716}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/SunLCLIZIA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WazidDMP22, author = {Mohammad Wazid and Ashok Kumar Das and Noor Mohd and Youngho Park}, title = {Healthcare 5.0 Security Framework: Applications, Issues and Future Research Directions}, journal = {{IEEE} Access}, volume = {10}, pages = {129429--129442}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3228505}, doi = {10.1109/ACCESS.2022.3228505}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WazidDMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangHDYT22, author = {Zhibo Zhang and Hussam M. N. Al Hamadi and Ernesto Damiani and Chan Yeob Yeun and Fatma Taher}, title = {Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research}, journal = {{IEEE} Access}, volume = {10}, pages = {93104--93139}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3204051}, doi = {10.1109/ACCESS.2022.3204051}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangHDYT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cal/BarberGZT22, author = {Kristin Barber and Moein Ghaniyoun and Yinqian Zhang and Radu Teodorescu}, title = {A Pre-Silicon Approach to Discovering Microarchitectural Vulnerabilities in Security Critical Applications}, journal = {{IEEE} Comput. Archit. Lett.}, volume = {21}, number = {1}, pages = {9--12}, year = {2022}, url = {https://doi.org/10.1109/LCA.2022.3151256}, doi = {10.1109/LCA.2022.3151256}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cal/BarberGZT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/WangMR22, author = {Liang Wang and Prateek Mittal and Jennifer Rexford}, title = {Data-plane security applications in adversarial settings}, journal = {Comput. Commun. Rev.}, volume = {52}, number = {2}, pages = {2--9}, year = {2022}, url = {https://doi.org/10.1145/3544912.3544914}, doi = {10.1145/3544912.3544914}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/WangMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/CollottaYZS22, author = {Mario Collotta and Ilsun You and Sherali Zeadally and Fei Song}, title = {Introduction to the special section on Smart Green Applications: QoS and Security-aware solutions in collaborative wireless networks (VSI-cwn)}, journal = {Comput. Electr. Eng.}, volume = {97}, pages = {107656}, year = {2022}, url = {https://doi.org/10.1016/j.compeleceng.2021.107656}, doi = {10.1016/J.COMPELECENG.2021.107656}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/CollottaYZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cleiej/BetarteCDGMMM22, author = {Gustavo Betarte and Juan Diego Campo and Andrea Delgado and Laura Gonz{\'{a}}lez and {\'{A}}lvaro Mart{\'{\i}}n and Rodrigo Mart{\'{\i}}nez and B{\'{a}}rbara Muracciole}, title = {Contact tracing solutions for {COVID-19:} applications, data privacy and security}, journal = {{CLEI} Electron. J.}, volume = {25}, number = {2}, year = {2022}, url = {https://doi.org/10.19153/cleiej.25.2.4}, doi = {10.19153/CLEIEJ.25.2.4}, timestamp = {Fri, 30 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cleiej/BetarteCDGMMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AlSabehKKCB22, author = {Ali AlSabeh and Joseph Khoury and Elie F. Kfoury and Jorge Crichigno and Elias Bou{-}Harb}, title = {A survey on security applications of {P4} programmable switches and a STRIDE-based vulnerability assessment}, journal = {Comput. Networks}, volume = {207}, pages = {108800}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.108800}, doi = {10.1016/J.COMNET.2022.108800}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/AlSabehKKCB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LuoYXJWS22, author = {Meng Luo and Yepeng Yao and Liling Xin and Zhengwei Jiang and Qiuyun Wang and Wenchang Shi}, title = {Measurement for encrypted open resolvers: Applications and security}, journal = {Comput. Networks}, volume = {213}, pages = {109081}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.109081}, doi = {10.1016/J.COMNET.2022.109081}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LuoYXJWS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/SinghWDCG22, author = {Jaskaran Singh and Mohammad Wazid and Ashok Kumar Das and Vinay Chamola and Mohsen Guizani}, title = {Machine learning security attacks and defense approaches for emerging cyber physical applications: {A} comprehensive survey}, journal = {Comput. Commun.}, volume = {192}, pages = {316--331}, year = {2022}, url = {https://doi.org/10.1016/j.comcom.2022.06.012}, doi = {10.1016/J.COMCOM.2022.06.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/SinghWDCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChahalBK22, author = {Navdeep S. Chahal and Preeti Bali and Praveen Kumar Khosla}, title = {A Proactive Approach to assess web application security through the integration of security tools in a Security Orchestration Platform}, journal = {Comput. Secur.}, volume = {122}, pages = {102886}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102886}, doi = {10.1016/J.COSE.2022.102886}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChahalBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/KrishnamoorthyK22, author = {Ramesh Krishnamoorthy and Kalimuthu Krishnan}, title = {An optimum security enabled System-on-Chip selection for Internet of Things applications using genetic algorithm modeling}, journal = {Concurr. Comput. Pract. Exp.}, volume = {34}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/cpe.6635}, doi = {10.1002/CPE.6635}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/KrishnamoorthyK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/XuHM22, author = {Bing Xu and Darong Huang and Bo Mi}, title = {Research on the application of mobile payment security system based on the Internet of Things}, journal = {Concurr. Comput. Pract. Exp.}, volume = {34}, number = {9}, year = {2022}, url = {https://doi.org/10.1002/cpe.5779}, doi = {10.1002/CPE.5779}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/XuHM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ChenLXCFT21, author = {Fei Chen and Duming Luo and Tao Xiang and Ping Chen and Junfeng Fan and Hong Linh Truong}, title = {IoT Cloud Security Review: {A} Case Study Approach Using Emerging Consumer-oriented Applications}, journal = {{ACM} Comput. Surv.}, volume = {54}, number = {4}, pages = {75:1--75:36}, year = {2022}, url = {https://doi.org/10.1145/3447625}, doi = {10.1145/3447625}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/ChenLXCFT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/JhaN22, author = {Ashwin Jha and Mridul Nandi}, title = {A Survey on Applications of H-Technique: Revisiting Security Analysis of {PRP} and {PRF}}, journal = {Entropy}, volume = {24}, number = {4}, pages = {462}, year = {2022}, url = {https://doi.org/10.3390/e24040462}, doi = {10.3390/E24040462}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/JhaN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/es/HaqueBD22, author = {A. K. M. Bahalul Haque and Bharat Bhushan and Gaurav Dhiman}, title = {Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends}, journal = {Expert Syst. J. Knowl. Eng.}, volume = {39}, number = {5}, year = {2022}, url = {https://doi.org/10.1111/exsy.12753}, doi = {10.1111/EXSY.12753}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/es/HaqueBD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/AlidoostiNN22, author = {Mitra Alidoosti and Alireza Nowroozi and Ahmad Nickabadi}, title = {Semantic web Racer: Dynamic security testing of the web application against race condition in the business layer}, journal = {Expert Syst. Appl.}, volume = {195}, pages = {116569}, year = {2022}, url = {https://doi.org/10.1016/j.eswa.2022.116569}, doi = {10.1016/J.ESWA.2022.116569}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/AlidoostiNN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/et/RSAP22, author = {Naveenkumar R and N. M. Sivamangai and Napolean A and S. Sridevi Sathya Priya}, title = {Design and Evaluation of {XOR} Arbiter Physical Unclonable Function and its Implementation on {FPGA} in Hardware Security Applications}, journal = {J. Electron. Test.}, volume = {38}, number = {6}, pages = {653--666}, year = {2022}, url = {https://doi.org/10.1007/s10836-022-06034-7}, doi = {10.1007/S10836-022-06034-7}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/et/RSAP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/ChenZDH22, author = {Ze Chen and Xiaojun Zuo and Na Dong and Botao Hou}, title = {Application of network security penetration technology in power internet of things security vulnerability detection}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {33}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/ett.3859}, doi = {10.1002/ETT.3859}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/ChenZDH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/KongZGHL22, author = {Ke Kong and Zhaoxin Zhang and Changyong Guo and Jideng Han and Gang Long}, title = {{PMMSA:} Security analysis system for android wearable applications based on permission matching and malware similarity analysis}, journal = {Future Gener. Comput. Syst.}, volume = {137}, pages = {349--362}, year = {2022}, url = {https://doi.org/10.1016/j.future.2022.08.002}, doi = {10.1016/J.FUTURE.2022.08.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/KongZGHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiuWHW22, author = {Qin Liu and Guojun Wang and Jiankun Hu and Jie Wu}, title = {Preface of special issue on Artificial Intelligence: The security {\&} privacy opportunities and challenges for emerging applications}, journal = {Future Gener. Comput. Syst.}, volume = {133}, pages = {169--170}, year = {2022}, url = {https://doi.org/10.1016/j.future.2022.03.021}, doi = {10.1016/J.FUTURE.2022.03.021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LiuWHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/AngSN22, author = {Kenneth Li{-}Minn Ang and Jasmine Kah{-}Phooi Seng and Ericmoore Ngharamike}, title = {Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications}, journal = {Future Internet}, volume = {14}, number = {2}, pages = {49}, year = {2022}, url = {https://doi.org/10.3390/fi14020049}, doi = {10.3390/FI14020049}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/AngSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ShostackMBS22, author = {Adam Shostack and Fabio Massacci and Eric Bodden and Antonino Sabetta}, title = {25 Years in Application Security: Looking Back, Looking Forward}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {1}, pages = {109--112}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2021.3127961}, doi = {10.1109/MSEC.2021.3127961}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ShostackMBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cps/SinghGPSB22, author = {Vivek Kumar Singh and Manimaran Govindarasu and Donald Porschet and Edward Shaffer and Morris Berman}, title = {NEFTSec: Networked federation testbed for cyber-physical security of smart grid: Architecture, applications, and evaluation}, journal = {{IET} Cyper-Phys. Syst.: Theory {\&} Appl.}, volume = {7}, number = {4}, pages = {197--211}, year = {2022}, url = {https://doi.org/10.1049/cps2.12033}, doi = {10.1049/CPS2.12033}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-cps/SinghGPSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ShenLWSH22, author = {Xuan Shen and Guoqiang Liu and Xiaofeng Wang and Bing Sun and Jun He}, title = {Security evaluation on type-1 and type-1-like 4-branch generalized Feistel structures and application to reduced-round Lesamnta-LW-BC}, journal = {{IET} Inf. Secur.}, volume = {16}, number = {5}, pages = {390--400}, year = {2022}, url = {https://doi.org/10.1049/ise2.12065}, doi = {10.1049/ISE2.12065}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ShenLWSH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbpim/RebiaiMB22, author = {Samiha Rebiai and El Kamel Merah and Djallel Eddine Boubiche}, title = {A novel comprehensive extension to {BPMN} language for security-aware two-tier security model and architecture of cloud applications}, journal = {Int. J. Bus. Process. Integr. Manag.}, volume = {11}, number = {2}, pages = {135--148}, year = {2022}, url = {https://doi.org/10.1504/IJBPIM.2022.10053836}, doi = {10.1504/IJBPIM.2022.10053836}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijbpim/RebiaiMB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnds/DasMJ22, author = {Sunayana Das and Bhabendu Kumar Mohanta and Debasish Jena}, title = {A state-of-the-art security and attacks analysis in blockchain applications network}, journal = {Int. J. Commun. Networks Distributed Syst.}, volume = {28}, number = {2}, pages = {199--218}, year = {2022}, url = {https://doi.org/10.1504/IJCNDS.2022.121199}, doi = {10.1504/IJCNDS.2022.121199}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnds/DasMJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/Du22, author = {Meiyan Du}, title = {Application of information communication network security management and control based on big data technology}, journal = {Int. J. Commun. Syst.}, volume = {35}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/dac.4643}, doi = {10.1002/DAC.4643}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/Du22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/NandanR22, author = {V. Nandan and R. Gowri Shankar Rao}, title = {Low-power and area-efficient design of {AES} S-Box using enhanced transformation method for security application}, journal = {Int. J. Commun. Syst.}, volume = {35}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/dac.4308}, doi = {10.1002/DAC.4308}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcomsys/NandanR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfs/SuZWC22, author = {Yong Su and Mengwei Zhao and Cun Wei and Xudong Chen}, title = {{PT-TODIM} Method for Probabilistic Linguistic {MAGDM} and Application to Industrial Control System Security Supplier Selection}, journal = {Int. J. Fuzzy Syst.}, volume = {24}, number = {1}, pages = {202--215}, year = {2022}, url = {https://doi.org/10.1007/s40815-021-01125-7}, doi = {10.1007/S40815-021-01125-7}, timestamp = {Thu, 24 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijfs/SuZWC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/Liu22a, author = {Qiuxia Liu}, title = {Research on the application of data fusion technology in the security of wireless sensor networks}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {1}, pages = {37--48}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.124323}, doi = {10.1504/IJICT.2022.124323}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/Liu22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfomandi/AmponsahAW22, author = {Anokye Acheampong Amponsah and Adebayo Felix Adekoya and Benjamin Asubam Weyori}, title = {Improving the Financial Security of National Health Insurance using Cloud-Based Blockchain Technology Application}, journal = {Int. J. Inf. Manag. Data Insights}, volume = {2}, number = {1}, pages = {100081}, year = {2022}, url = {https://doi.org/10.1016/j.jjimei.2022.100081}, doi = {10.1016/J.JJIMEI.2022.100081}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijinfomandi/AmponsahAW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/DuanGAKA22, author = {Wen{-}Qi Duan and Muhammad Gulistan and Fizza Hussain Abbasi and Adnan Khurshid and Mohammed M. Ali Al{-}Shamiri}, title = {q-Rung double hierarchy linguistic term set fuzzy AHP; applications in the security system threats features of social media platforms}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {8}, pages = {5152--5185}, year = {2022}, url = {https://doi.org/10.1002/int.22755}, doi = {10.1002/INT.22755}, timestamp = {Mon, 08 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/DuanGAKA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/Stewart22, author = {Harrison Stewart}, title = {Security versus Compliance: An Empirical Study of the Impact of Industry Standards Compliance on Application Security}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {32}, number = {3}, pages = {363--393}, year = {2022}, url = {https://doi.org/10.1142/S0218194022500152}, doi = {10.1142/S0218194022500152}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/Stewart22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaLT/MatuleviciusIEG22, author = {Raimundas Matulevicius and Mubashar Iqbal and Emna Ammar Elhadjamor and Sonia Ayachi Ghannouchi and Mariia Bakhtina and Slaheddine Ghannouchi}, title = {Ontological Representation of Healthcare Application Security Using Blockchain Technology}, journal = {Informatica}, volume = {33}, number = {2}, pages = {365--397}, year = {2022}, url = {https://doi.org/10.15388/22-INFOR486}, doi = {10.15388/22-INFOR486}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/informaticaLT/MatuleviciusIEG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/JimenezD22, author = {Francisco Jos{\'{e}} Fern{\'{a}}ndez Jim{\'{e}}nez and Jos{\'{e}} Ramiro Martinez de Dios}, title = {A Robot-Sensor Network Security Architecture for Monitoring Applications}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {8}, pages = {6288--6304}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3113756}, doi = {10.1109/JIOT.2021.3113756}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/JimenezD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/KhadkaRKC22, author = {Grishma Khadka and Biplob Ray and Nemai Chandra Karmakar and Jinho Choi}, title = {Physical-Layer Detection and Security of Printed Chipless {RFID} Tag for Internet of Things Applications}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {17}, pages = {15714--15724}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3151364}, doi = {10.1109/JIOT.2022.3151364}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/KhadkaRKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/AndarzianL22, author = {Seyed Behnam Andarzian and Behrouz Tork Ladani}, title = {{SANT:} Static Analysis of Native Threads for Security Vetting of Android Applications}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {1}, pages = {13--25}, year = {2022}, url = {https://doi.org/10.22042/isecure.2021.247906.572}, doi = {10.22042/ISECURE.2021.247906.572}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/AndarzianL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/0002P22, author = {Peter Sabev and Milen Petrov}, title = {Android Password Managers and Vault Applications: Data Storage Security Issues Identification}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103152}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103152}, doi = {10.1016/J.JISA.2022.103152}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/0002P22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AhalawatBTP22a, author = {Anchal Ahalawat and Korra Sathya Babu and Ashok Kumar Turuk and Sanjeev Patel}, title = {Corrigendum to "A low-rate DDoS detection and mitigation for {SDN} using Renyi Entropy with Packet Drop" [Journal of Information Security and Applications 68 {(2022)} 103212]}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103344}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103344}, doi = {10.1016/J.JISA.2022.103344}, timestamp = {Mon, 14 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AhalawatBTP22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Bagherpour22a, author = {Bagher Bagherpour}, title = {Corrigendum to "An efficient verifiable secret redistribution scheme" [Journal of information security and applications, 69 {(2022)103295]}}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103356}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103356}, doi = {10.1016/J.JISA.2022.103356}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Bagherpour22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenXMZWLSX22, author = {Li{-}Bo Chen and Yihang Xia and Zhenbang Ma and Ruijie Zhao and Yanhao Wang and Yue Liu and Wenqi Sun and Zhi Xue}, title = {{SEAF:} {A} Scalable, Efficient, and Application-independent Framework for container security detection}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103351}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103351}, doi = {10.1016/J.JISA.2022.103351}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChenXMZWLSX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DeverashettiKP22, author = {Mounika Deverashetti and Ranjitha K. and K. V. Pradeepthi}, title = {Security analysis of menstruation cycle tracking applications using static, dynamic and machine learning techniques}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103171}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103171}, doi = {10.1016/J.JISA.2022.103171}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DeverashettiKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FarzadniaSN22, author = {Ehsan Farzadnia and Hossein Shirazi and Alireza Nowroozi}, title = {Corrigendum to 'A novel sophisticated hybrid method for intrusion detection using the artificial immune system': Journal of Information Security and Applications Volume 58, May 2021, 102721}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103349}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103349}, doi = {10.1016/J.JISA.2022.103349}, timestamp = {Mon, 14 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/FarzadniaSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/SevriK22, author = {Mehmet Sevri and Hacer Karacan}, title = {Two Stage Deep Learning Based Stacked Ensemble Model for Web Application Security}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {16}, number = {2}, pages = {632--657}, year = {2022}, url = {https://doi.org/10.3837/tiis.2022.02.014}, doi = {10.3837/TIIS.2022.02.014}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/SevriK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcmse/Wang22e, author = {Lei Wang}, title = {Speech denoising algorithm and artificial intelligence application in network security}, journal = {J. Comput. Methods Sci. Eng.}, volume = {22}, number = {6}, pages = {2243--2255}, year = {2022}, url = {https://doi.org/10.3233/JCM-226368}, doi = {10.3233/JCM-226368}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcmse/Wang22e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/AmineFRS22, author = {Khaldi Amine and Kahlessenane Fares and Kafi Med Redouane and Euschi Salah}, title = {Medical Image Watermarking for Telemedicine Application Security}, journal = {J. Circuits Syst. Comput.}, volume = {31}, number = {5}, pages = {2250097:1--2250097:17}, year = {2022}, url = {https://doi.org/10.1142/S0218126622500979}, doi = {10.1142/S0218126622500979}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/AmineFRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/HuangXLLY22, author = {Haining Huang and Lihua Xu and Haomin Lu and Zhencheng Lin and Wei Yan}, title = {Application Optimization of Cloud Management Mode in Information Technology in Sudden Social Security Incidents}, journal = {J. Circuits Syst. Comput.}, volume = {31}, number = {12}, pages = {2250212:1--2250212:20}, year = {2022}, url = {https://doi.org/10.1142/S0218126622502127}, doi = {10.1142/S0218126622502127}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/HuangXLLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/AydosACS22, author = {Murat Aydos and {\c{C}}igdem Aldan and Evren Coskun and Alperen Soydan}, title = {Security testing of web applications: {A} systematic mapping of the literature}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {34}, number = {9}, pages = {6775--6792}, year = {2022}, url = {https://doi.org/10.1016/j.jksuci.2021.09.018}, doi = {10.1016/J.JKSUCI.2021.09.018}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/AydosACS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlap/NigamT22, author = {Vivek Nigam and Carolyn L. Talcott}, title = {Automated construction of security integrity wrappers for Industry 4.0 applications}, journal = {J. Log. Algebraic Methods Program.}, volume = {126}, pages = {100745}, year = {2022}, url = {https://doi.org/10.1016/j.jlamp.2021.100745}, doi = {10.1016/J.JLAMP.2021.100745}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jlap/NigamT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/Adu-ManuESBD22, author = {Kofi Sarpong Adu{-}Manu and Felicia Engmann and Godwin Sarfo{-}Kantanka and Godwill Enchill Baiden and Bernice Akusika Dulemordzi}, title = {{WSN} Protocols and Security Challenges for Environmental Monitoring Applications: {A} Survey}, journal = {J. Sensors}, volume = {2022}, pages = {1--21}, year = {2022}, url = {https://doi.org/10.1155/2022/1628537}, doi = {10.1155/2022/1628537}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/js/Adu-ManuESBD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jwe/LachkovTB22, author = {Petar Lachkov and Lo'ai Tawalbeh and Smriti Bhatt}, title = {Vulnerability Assessment for Applications Security Through Penetration Simulation and Testing}, journal = {J. Web Eng.}, volume = {21}, number = {7}, pages = {2187--2208}, year = {2022}, url = {https://doi.org/10.13052/jwe1540-9589.2178}, doi = {10.13052/JWE1540-9589.2178}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jwe/LachkovTB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jwe/ZhangZ22, author = {Yanling Zhang and Ting Zhang}, title = {Research Into the Security Threat of Web Application}, journal = {J. Web Eng.}, volume = {21}, number = {5}, year = {2022}, url = {https://doi.org/10.13052/jwe1540-9589.21514}, doi = {10.13052/JWE1540-9589.21514}, timestamp = {Sat, 17 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jwe/ZhangZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mdpinetwork/RosendoG22, author = {Miguel Rosendo and Jorge Granjal}, title = {Energy-Aware Security Adaptation for Low-Power IoT Applications}, journal = {Network}, volume = {2}, number = {1}, pages = {36--52}, year = {2022}, url = {https://doi.org/10.3390/network2010003}, doi = {10.3390/NETWORK2010003}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mdpinetwork/RosendoG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mj/MorsaliMR22, author = {Mehrdad Morsali and Mohammad Hossein Moaiyeri and Ramin Rajaei}, title = {A process variation resilient spintronic true random number generator for highly reliable hardware security applications}, journal = {Microelectron. J.}, volume = {129}, pages = {105606}, year = {2022}, url = {https://doi.org/10.1016/j.mejo.2022.105606}, doi = {10.1016/J.MEJO.2022.105606}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mj/MorsaliMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/Wu22, author = {Xuejun Wu}, title = {Special Issue on Advanced Network Security: Methods and Applications}, journal = {Mob. Networks Appl.}, volume = {27}, number = {4}, pages = {1337--1338}, year = {2022}, url = {https://doi.org/10.1007/s11036-022-01983-x}, doi = {10.1007/S11036-022-01983-X}, timestamp = {Thu, 06 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/Wu22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HaiderSASK22, author = {Muhammad Imran Haider and Tariq Shah and Asif Ali and Dawood Shah and Ijaz Khalid}, title = {Pseudo random sequences based on elliptic curve subgroups and mathematical model for its application to digital image security}, journal = {Multim. Tools Appl.}, volume = {81}, number = {17}, pages = {23709--23734}, year = {2022}, url = {https://doi.org/10.1007/s11042-022-12358-5}, doi = {10.1007/S11042-022-12358-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HaiderSASK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/SrivastavaJRPJ22, author = {Akhilesh M. Srivastava and Arushi Jain and Priyanka Rotte and Surya Prakash and Umarani Jayaraman}, title = {A technique to match highly similar 3D objects with an application to biomedical security}, journal = {Multim. Tools Appl.}, volume = {81}, number = {10}, pages = {13159--13178}, year = {2022}, url = {https://doi.org/10.1007/s11042-020-10161-8}, doi = {10.1007/S11042-020-10161-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/SrivastavaJRPJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmhci/TurnerPNL22, author = {Sarah Turner and Nandita Pattnaik and Jason R. C. Nurse and Shujun Li}, title = {"You Just Assume It Is In There, {I} Guess": Understanding {UK} Families' Application and Knowledge of Smart Home Cyber Security}, journal = {Proc. {ACM} Hum. Comput. Interact.}, volume = {6}, number = {{CSCW2}}, pages = {1--34}, year = {2022}, url = {https://doi.org/10.1145/3555159}, doi = {10.1145/3555159}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmhci/TurnerPNL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/GruberHGUG22, author = {Moritz Gruber and Christian H{\"{o}}fig and Maximilian Golla and Tobias Urban and Matteo Gro{\ss}e{-}Kampmann}, title = {"We may share the number of diaper changes": {A} Privacy and Security Analysis of Mobile Child Care Applications}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {3}, pages = {394--414}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0078}, doi = {10.56553/POPETS-2022-0078}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/GruberHGUG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/programming/PupoNB22, author = {Angel Luis Scull Pupo and Jens Nicolay and Elisa Gonzalez Boix}, title = {Deriving Static Security Testing from Runtime Security Protection for Web Applications}, journal = {Art Sci. Eng. Program.}, volume = {6}, number = {1}, pages = {1}, year = {2022}, url = {https://doi.org/10.22152/programming-journal.org/2022/6/1}, doi = {10.22152/PROGRAMMING-JOURNAL.ORG/2022/6/1}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/programming/PupoNB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/JalaliNEAF22, author = {Foad Jalali and Mehran Alidoost Nia and Tatiana Ermakova and Meisam Abdollahi and Benjamin Fabian}, title = {Investigating the role of usable security in developers' intention toward security enhancement in service-oriented applications}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.199}, doi = {10.1002/SPY2.199}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/JalaliNEAF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/Abdel-BassetGSE22, author = {Mohamed Abdel{-}Basset and Abduallah Gamal and Karam M. Sallam and Ibrahim Elgendi and Kumudu S. Munasinghe and Abbas Jamalipour}, title = {An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions}, journal = {Sensors}, volume = {22}, number = {11}, pages = {4123}, year = {2022}, url = {https://doi.org/10.3390/s22114123}, doi = {10.3390/S22114123}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/Abdel-BassetGSE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ChorasKP22, author = {Michal Choras and Rafal Kozik and Marek Pawlicki}, title = {Sensors and Pattern Recognition Methods for Security and Industrial Applications}, journal = {Sensors}, volume = {22}, number = {16}, pages = {5968}, year = {2022}, url = {https://doi.org/10.3390/s22165968}, doi = {10.3390/S22165968}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/ChorasKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/GavricB22, author = {Nikola Gavric and Zivko Bojovic}, title = {Security Concerns in {MMO} Games - Analysis of a Potent Application Layer DDoS Threat}, journal = {Sensors}, volume = {22}, number = {20}, pages = {7791}, year = {2022}, url = {https://doi.org/10.3390/s22207791}, doi = {10.3390/S22207791}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/GavricB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HakeemHK22, author = {Shimaa A. Abdel Hakeem and Hanan H. Hussein and HyungWon Kim}, title = {Security Requirements and Challenges of 6G Technologies and Applications}, journal = {Sensors}, volume = {22}, number = {5}, pages = {1969}, year = {2022}, url = {https://doi.org/10.3390/s22051969}, doi = {10.3390/S22051969}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/HakeemHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/OgbodoAK22, author = {Emmanuel Utochukwu Ogbodo and Adnan M. Abu{-}Mahfouz and Anish Mathew Kurien}, title = {A Survey on 5G and LPWAN-IoT for Improved Smart Cities and Remote Area Applications: From the Aspect of Architecture and Security}, journal = {Sensors}, volume = {22}, number = {16}, pages = {6313}, year = {2022}, url = {https://doi.org/10.3390/s22166313}, doi = {10.3390/S22166313}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/OgbodoAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sis/AnsariAK22, author = {Md Tarique Jamal Ansari and Alka Agrawal and Raees Ahmad Khan}, title = {DURASec: Durable Security Blueprints for Web-Applications Empowering Digital India Initiative}, journal = {{EAI} Endorsed Trans. Scalable Inf. Syst.}, volume = {9}, number = {4}, pages = {7}, year = {2022}, url = {https://doi.org/10.4108/eai.13-1-2022.172816}, doi = {10.4108/EAI.13-1-2022.172816}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sis/AnsariAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/Qiang22, author = {Xu Jian Qiang}, title = {Computer application under the management of network information security technology using genetic algorithm}, journal = {Soft Comput.}, volume = {26}, number = {16}, pages = {7871--7876}, year = {2022}, url = {https://doi.org/10.1007/s00500-022-06813-6}, doi = {10.1007/S00500-022-06813-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/Qiang22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/stvr/AlalfiPN22, author = {Manar H. Alalfi and Sajeda Parveen and Bara' Nazzal}, title = {A mutation framework for evaluating security analysis tools in IoT applications}, journal = {Softw. Test. Verification Reliab.}, volume = {32}, number = {7}, year = {2022}, url = {https://doi.org/10.1002/stvr.1799}, doi = {10.1002/STVR.1799}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/stvr/AlalfiPN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/DengWZWL22, author = {Chao Deng and Changyun Wen and Ying Zou and Wei Wang and Xinyao Li}, title = {A Hierarchical Security Control Framework of Nonlinear CPSs Against DoS Attacks With Application to Power Sharing of {AC} Microgrids}, journal = {{IEEE} Trans. Cybern.}, volume = {52}, number = {6}, pages = {5255--5266}, year = {2022}, url = {https://doi.org/10.1109/TCYB.2020.3029045}, doi = {10.1109/TCYB.2020.3029045}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/DengWZWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/ZhangP22, author = {Weihai Zhang and Chenchen Peng}, title = {Indefinite Mean-Field Stochastic Cooperative Linear-Quadratic Dynamic Difference Game With Its Application to the Network Security Model}, journal = {{IEEE} Trans. Cybern.}, volume = {52}, number = {11}, pages = {11805--11818}, year = {2022}, url = {https://doi.org/10.1109/TCYB.2021.3070352}, doi = {10.1109/TCYB.2021.3070352}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcyb/ZhangP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tem/RodgersAA22, author = {Waymond Rodgers and Rexford Attah{-}Boakye and Kweku Adams}, title = {Application of Algorithmic Cognitive Decision Trust Modeling for Cyber Security Within Organisations}, journal = {{IEEE} Trans. Engineering Management}, volume = {69}, number = {6}, pages = {3792--3801}, year = {2022}, url = {https://doi.org/10.1109/TEM.2020.3019218}, doi = {10.1109/TEM.2020.3019218}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tem/RodgersAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/AlazabGS22, author = {Mamoun Alazab and Thippa Reddy Gadekallu and Chunhua Su}, title = {Guest Editorial: Security and Privacy Issues in Industry 4.0 Applications}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {9}, pages = {6326--6329}, year = {2022}, url = {https://doi.org/10.1109/TII.2022.3164741}, doi = {10.1109/TII.2022.3164741}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/AlazabGS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/ShojafarMPA22, author = {Mohammad Shojafar and Mithun Mukherjee and Vincenzo Piuri and Jemal H. Abawajy}, title = {Guest Editorial: Security and Privacy of Federated Learning Solutions for Industrial IoT Applications}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {5}, pages = {3519--3521}, year = {2022}, url = {https://doi.org/10.1109/TII.2021.3128972}, doi = {10.1109/TII.2021.3128972}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/ShojafarMPA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/XiaoWCMA22, author = {Bin Xiao and Fan Wu and Francesco Chiti and Mohammad Hossein Manshaei and Giuseppe Ateniese}, title = {Guest Editorial: Introduction to the Special Section on Security and Privacy for {AI} Models and Applications}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {9}, number = {1}, pages = {171--172}, year = {2022}, url = {https://doi.org/10.1109/TNSE.2021.3133123}, doi = {10.1109/TNSE.2021.3133123}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/XiaoWCMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/todaes/MahalatMMSC22, author = {Mahabub Hasan Mahalat and Suraj Mandal and Anindan Mondal and Bibhash Sen and Rajat Subhra Chakraborty}, title = {Implementation, Characterization and Application of Path Changing Switch based Arbiter {PUF} on {FPGA} as a lightweight Security Primitive for IoT}, journal = {{ACM} Trans. Design Autom. Electr. Syst.}, volume = {27}, number = {3}, pages = {26:1--26:26}, year = {2022}, url = {https://doi.org/10.1145/3491212}, doi = {10.1145/3491212}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/todaes/MahalatMMSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/HeNHZ22, author = {Miao He and Jianbing Ni and Yuanyuan He and Ning Zhang}, title = {Low-Complexity Phased-Array Physical Layer Security in Millimeter-Wave Communication for Cybertwin-Driven {V2X} Applications}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {71}, number = {5}, pages = {4573--4583}, year = {2022}, url = {https://doi.org/10.1109/TVT.2021.3138702}, doi = {10.1109/TVT.2021.3138702}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/HeNHZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/MaYXYLY22, author = {Li Ma and Huihong Yang and Jianxiong Xu and Zexian Yang and Qidi Lao and Dong Yuan}, title = {Code Analysis with Static Application Security Testing for Python Program}, journal = {J. Signal Process. Syst.}, volume = {94}, number = {11}, pages = {1169--1182}, year = {2022}, url = {https://doi.org/10.1007/s11265-022-01740-z}, doi = {10.1007/S11265-022-01740-Z}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vlsisp/MaYXYLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/PadmajaSPCKV22, author = {Mididoddi Padmaja and Shitharth Selvarajan and K. Prasuna and Abhay Chaturvedi and Pravin Kshirsagar and A. Vani}, title = {Grow of Artificial Intelligence to Challenge Security in IoT Application}, journal = {Wirel. Pers. Commun.}, volume = {127}, number = {3}, pages = {1829--1845}, year = {2022}, url = {https://doi.org/10.1007/s11277-021-08725-4}, doi = {10.1007/S11277-021-08725-4}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/PadmajaSPCKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BillawaTFSSS22, author = {Priyanka Billawa and Anusha Bambhore Tukaram and Nicol{\'{a}}s E. D{\'{\i}}az Ferreyra and Jan{-}Philipp Stegh{\"{o}}fer and Riccardo Scandariato and Georg Simhandl}, title = {SoK: Security of Microservice Applications: {A} Practitioners' Perspective on Challenges and Best Practices}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {9:1--9:10}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3538986}, doi = {10.1145/3538969.3538986}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BillawaTFSSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/TseliosPX22, author = {Christos Tselios and Ilias Politis and Christos Xenakis}, title = {Improving Network, Data and Application Security for SMEs}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {95:1--95:8}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3544426}, doi = {10.1145/3538969.3544426}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/TseliosPX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/TukaramSFSZS22, author = {Anusha Bambhore Tukaram and Simon Schneider and Nicol{\'{a}}s E. D{\'{\i}}az Ferreyra and Georg Simhandl and Uwe Zdun and Riccardo Scandariato}, title = {Towards a Security Benchmark for the Architectural Design of Microservice Applications}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {116:1--116:7}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3543807}, doi = {10.1145/3538969.3543807}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/TukaramSFSZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/accc/GaoXHW22, author = {Siyu Gao and Yuanying Xiao and Ye He and Jianfeng Wen}, title = {Mobile Application {SDK} Version Detection and Security Alert Based on Multi-partition {LSH}}, booktitle = {3rd Asia Conference on Computers and Communications, {ACCC} 2022, Shanghai, China, December 16-18, 2022}, pages = {8--12}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ACCC58361.2022.00008}, doi = {10.1109/ACCC58361.2022.00008}, timestamp = {Tue, 03 Oct 2023 19:13:27 +0200}, biburl = {https://dblp.org/rec/conf/accc/GaoXHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsos/LinTGHL22, author = {Yuhang Lin and Olufogorehan Tunde{-}Onadele and Xiaohui Gu and Jingzhu He and Hugo Latapie}, editor = {Roberto Casadei and Elisabetta Di Nitto and Ilias Gerostathopoulos and Danilo Pianini and Ivana Dusparic and Timothy Wood and Phyllis R. Nelson and Evangelos Pournaras and Nelly Bencomo and Sebastian G{\"{o}}tz and Christian Krupitzer and Claudia Raibulet}, title = {{SHIL:} Self-Supervised Hybrid Learning for Security Attack Detection in Containerized Applications}, booktitle = {{IEEE} International Conference on Autonomic Computing and Self-Organizing Systems, {ACSOS} 2022, Virtual, CA, USA, September 19-23, 2022}, pages = {41--50}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ACSOS55765.2022.00022}, doi = {10.1109/ACSOS55765.2022.00022}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsos/LinTGHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhip/JiangXLL22, author = {Jiang Jiang and Hanyang Xie and Yuqing Li and Jinman Luo}, editor = {Weina Fu and Yun Lin}, title = {Application of Cloud Security Terminal in Information Management of Power Industry}, booktitle = {Advanced Hybrid Information Processing - 6th {EAI} International Conference, {ADHIP} 2022, Changsha, China, September 29-30, 2022, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {468}, pages = {771--783}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-28787-9\_57}, doi = {10.1007/978-3-031-28787-9\_57}, timestamp = {Fri, 04 Aug 2023 23:41:06 +0200}, biburl = {https://dblp.org/rec/conf/adhip/JiangXLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiee/ChenJR22, author = {Zhiwen Chen and Yong Ji and Yuanhong Ren}, title = {Research on the Application of Fall Detection Technology Based on the Security Field of the Smart Care for the Elderly}, booktitle = {{AIEE} 2022: The 3rd International Conference on Artificial Intelligence in Electronics Engineering, Bangkok Thailand, January 11 - 13, 2022}, pages = {75--79}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3512826.3512832}, doi = {10.1145/3512826.3512832}, timestamp = {Thu, 02 Jun 2022 17:13:52 +0200}, biburl = {https://dblp.org/rec/conf/aiee/ChenJR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/OgielaO22, author = {Marek R. Ogiela and Lidia Ogiela}, editor = {Leonard Barolli and Farookh Hussain and Tomoya Enokido}, title = {Application of Hybrid Intelligence for Security Purposes}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022), Volume 2}, series = {Lecture Notes in Networks and Systems}, volume = {450}, pages = {539--542}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-99587-4\_45}, doi = {10.1007/978-3-030-99587-4\_45}, timestamp = {Thu, 31 Mar 2022 15:30:21 +0200}, biburl = {https://dblp.org/rec/conf/aina/OgielaO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/PaccamiccioM22, author = {Mattia Paccamiccio and Leonardo Mostarda}, editor = {Leonard Barolli and Farookh Hussain and Tomoya Enokido}, title = {Reasoning About Inter-procedural Security Requirements in IoT Applications}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022), Volume 3}, series = {Lecture Notes in Networks and Systems}, volume = {451}, pages = {245--254}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-99619-2\_24}, doi = {10.1007/978-3-030-99619-2\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aina/PaccamiccioM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/0001JDSFK22, author = {Priyanka Dutta and Mei Jiang and Dung Hoang Duong and Willy Susilo and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {408--422}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517400}, doi = {10.1145/3488932.3517400}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiaccs/0001JDSFK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bisec/NikolicZFA22, author = {Sara Nikolic and Nemanja Zdravkovic and Igor Franc and N. Arivazhagan}, editor = {Nemanja Zdravkovic and Dragan Domazet and Sonsoles L{\'{o}}pez{-}Pernas and Miguel {\'{A}}ngel Conde and Ponnusamy Vijayakumar}, title = {A Comparison on Hyperledger Consensus Mechanism Security and their Applications}, booktitle = {Proceedings of the 13th International Conference on Business Information Security (BISEC-2022), Belgrade, Serbia, December 02, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3529}, pages = {34--41}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3529/short\_5.pdf}, timestamp = {Tue, 19 Dec 2023 17:15:12 +0100}, biburl = {https://dblp.org/rec/conf/bisec/NikolicZFA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbd/WenTCZLZ22, author = {Jing Wen and Chaohong Tan and Jining Chen and Qin Zhao and Sen Li and Fei Zhou}, title = {The Application of RNN-based {API} Data Security Detection in Government Cloud Service}, booktitle = {Tenth International Conference on Advanced Cloud and Big Data, {CBD} 2022, Guilin, China, November 4-5, 2022}, pages = {276--281}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CBD58033.2022.00056}, doi = {10.1109/CBD58033.2022.00056}, timestamp = {Wed, 08 Feb 2023 17:46:14 +0100}, biburl = {https://dblp.org/rec/conf/cbd/WenTCZLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/TaylorCHNRZT22, author = {Curtis R. Taylor and Jason M. Carter and Shean Huff and Eric Nafziger and Jackeline Rios{-}Torres and Bob Zhang and Joseph Turcotte}, title = {Evaluating Efficiency and Security of Connected and Autonomous Vehicle Applications}, booktitle = {19th {IEEE} Annual Consumer Communications {\&} Networking Conference, {CCNC} 2022, Las Vegas, NV, USA, January 8-11, 2022}, pages = {236--239}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CCNC49033.2022.9700691}, doi = {10.1109/CCNC49033.2022.9700691}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/TaylorCHNRZT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001S0Y22, author = {Yusuke Naito and Yu Sasaki and Takeshi Sugawara and Kan Yasuda}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to {TDES}}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {2323--2336}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560674}, doi = {10.1145/3548606.3560674}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001S0Y22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuoWC22, author = {Yunpeng Luo and Ziwen Wan and Qi Alfred Chen}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Poster: Towards Complete Computation Graph Generation for Security Assessment of {ROS} Applications}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3411--3413}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3563540}, doi = {10.1145/3548606.3563540}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuoWC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coins/BoppanaB22, author = {Tej Kiran Boppana and Priyanka Bagade}, title = {Security risks in MQTT-based Industrial IoT Applications}, booktitle = {{IEEE} International Conference on Omni-layer Intelligent Systems, {COINS} 2022, Barcelona, Spain, August 1-3, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/COINS54846.2022.9854993}, doi = {10.1109/COINS54846.2022.9854993}, timestamp = {Fri, 26 Aug 2022 16:30:17 +0200}, biburl = {https://dblp.org/rec/conf/coins/BoppanaB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coms2/Moon22, author = {Sunil K. Moon}, editor = {Nirbhay Chaubey and Sabu M. Thampi and Noor Zaman Jhanjhi}, title = {Application of Forensic Audio-Video Steganography Technique to Improve Security, Robustness, and Authentication of Secret Data}, booktitle = {Computing Science, Communication and Security - Third International Conference, {COMS2} 2022, Gujarat, India, February 6-7, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1604}, pages = {11--25}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-10551-7\_2}, doi = {10.1007/978-3-031-10551-7\_2}, timestamp = {Mon, 06 Nov 2023 12:57:51 +0100}, biburl = {https://dblp.org/rec/conf/coms2/Moon22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/HoglundR22, author = {Joel H{\"{o}}glund and Shahid Raza}, title = {{BLEND:} Efficient and blended IoT data storage and communication with application layer security}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2022, Rhodes, Greece, July 27-29, 2022}, pages = {253--260}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSR54599.2022.9850290}, doi = {10.1109/CSR54599.2022.9850290}, timestamp = {Fri, 19 Aug 2022 14:18:24 +0200}, biburl = {https://dblp.org/rec/conf/csr2/HoglundR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/StockME22, author = {Sebastian Stock and Atif Mashkoor and Alexander Egyed}, editor = {Gabriele Kotsis and A Min Tjoa and Ismail Khalil and Bernhard Moser and Alfred Taudes and Atif Mashkoor and Johannes Sametinger and Jorge Mart{\'{\i}}nez Gil and Florian Sobieczky and Lukas Fischer and Rudolf Ramler and Maqbool Khan and Gerald Czech}, title = {Application of Validation Obligations to Security Concerns}, booktitle = {Database and Expert Systems Applications - {DEXA} 2022 Workshops - 33rd International Conference, {DEXA} 2022, Vienna, Austria, August 22-24, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1633}, pages = {337--346}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-14343-4\_31}, doi = {10.1007/978-3-031-14343-4\_31}, timestamp = {Mon, 26 Jun 2023 20:42:59 +0200}, biburl = {https://dblp.org/rec/conf/dexaw/StockME22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drc/GalderisiMT22, author = {Giulio Galderisi and Thomas Mikolajick and Jens Trommer}, title = {Robust Reconfigurable Field Effect Transistors Process Route Enabling Multi-VT Devices Fabrication for Hardware Security Applications}, booktitle = {Device Research Conference, {DRC} 2022, Columbus, OH, USA, June 26-29, 2022}, pages = {1--2}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DRC55272.2022.9855805}, doi = {10.1109/DRC55272.2022.9855805}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drc/GalderisiMT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsit/LiMDC22, author = {Yong Li and Chen Mu and Zaojian Dai and Lu Chen}, title = {Security situation awareness method of power mobile application based on big data architecture}, booktitle = {5th International Conference on Data Science and Information Technology, {DSIT} 2022, Shanghai, China, July 22-24, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSIT55514.2022.9943899}, doi = {10.1109/DSIT55514.2022.9943899}, timestamp = {Thu, 24 Nov 2022 14:56:16 +0100}, biburl = {https://dblp.org/rec/conf/dsit/LiMDC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/DeligiannisCRTV22, author = {Nikolaos Ioannis Deligiannis and Riccardo Cantoro and Matteo Sonza Reorda and Marcello Traiola and Emanuele Valea}, title = {Improving the Fault Resilience of Neural Network Applications Through Security Mechanisms}, booktitle = {52nd Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2022, Supplemental Volume, Baltimore, MD, USA, June 27-30, 2022}, pages = {23--24}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSN-S54099.2022.00017}, doi = {10.1109/DSN-S54099.2022.00017}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/DeligiannisCRTV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dtesi/RazaqueAAKA22, author = {Abdul Razaque and Saule Amanzholova and Amir Akimbayev and Emil Kovalenko and Dilnaz Ashimzhanova}, editor = {Askar Khikmetov and Yevgeniya A. Daineko and Madina T. Ipalakova}, title = {Development System of Application Security Testing}, booktitle = {Proceedings of the 7th International Conference on Digital Technologies in Education, Science and Industry {(DTESI} 2022), Almaty, Kazakhstan, October 20-21, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3382}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3382/Short3.pdf}, timestamp = {Thu, 31 Aug 2023 17:03:37 +0200}, biburl = {https://dblp.org/rec/conf/dtesi/RazaqueAAKA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecir/JanzenOT22, author = {Shawn Janzen and Carolin Orr and Sara{-}Jayne Terp}, editor = {Marinella Petrocchi and Marco Viviani}, title = {Cognitive Security and Resilience: {A} Social Ecological Model of Disinformation and other Harms with Applications to {COVID-19} Vaccine Information Behaviors}, booktitle = {Proceedings of the 2nd Workshop Reducing Online Misinformation through Credible Information Retrieval 2022 co-located with The 44th European Conference on Information Retrieval {(ECIR} 2022), Stavanger, Norway, April 10, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3138}, pages = {48--88}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3138/paper4\_jot.pdf}, timestamp = {Mon, 21 Aug 2023 07:59:10 +0200}, biburl = {https://dblp.org/rec/conf/ecir/JanzenOT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eitce/PengYLZH22, author = {Jiao Peng and Shulin Yang and Xiang Li and Meiqi Zhou and Yongliang Huang}, title = {Research on the Application of Digital Education Resource Data Security Sharing Based on Blockchain and Access Control}, booktitle = {Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, {EITCE} 2022, Xiamen, China, October 21-23, 2022}, pages = {1179--1184}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3573428.3573639}, doi = {10.1145/3573428.3573639}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eitce/PengYLZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/Link22, author = {Sebastian Link}, editor = {Jolita Ralyt{\'{e}} and Sharma Chakravarthy and Mukesh K. Mohania and Manfred A. Jeusfeld and Kamalakar Karlapalem}, title = {Object Normal Form, Fourth Normal Form and Their Application to Database Security}, booktitle = {Conceptual Modeling - 41st International Conference, {ER} 2022, Hyderabad, India, October 17-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13607}, pages = {349--364}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17995-2\_25}, doi = {10.1007/978-3-031-17995-2\_25}, timestamp = {Wed, 22 Mar 2023 17:54:58 +0100}, biburl = {https://dblp.org/rec/conf/er/Link22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/TanZ22, author = {Teik Guan Tan and Jianying Zhou}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nicola Dragoni}, title = {Migrating Blockchains Away from {ECDSA} for Post-quantum Security: {A} Study of Impact on Users and Applications}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2022 International Workshops, {DPM} 2022 and {CBT} 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13619}, pages = {308--316}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25734-6\_19}, doi = {10.1007/978-3-031-25734-6\_19}, timestamp = {Tue, 28 Feb 2023 08:10:09 +0100}, biburl = {https://dblp.org/rec/conf/esorics/TanZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etfa/Khan22, author = {Muhammad Taimoor Khan}, title = {Towards Practical and Formal Security Risk Analysis of IoT (Internet of Things) Applications}, booktitle = {27th {IEEE} International Conference on Emerging Technologies and Factory Automation, {ETFA} 2022, Stuttgart, Germany, September 6-9, 2022}, pages = {1--4}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ETFA52439.2022.9921511}, doi = {10.1109/ETFA52439.2022.9921511}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/etfa/Khan22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Huguenin-Dumittan22, author = {Lo{\"{\i}}s Huguenin{-}Dumittan and Serge Vaudenay}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {On IND-qCCA Security in the {ROM} and Its Applications - {CPA} Security Is Sufficient for {TLS} 1.3}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {613--642}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_22}, doi = {10.1007/978-3-031-07082-2\_22}, timestamp = {Tue, 31 May 2022 17:23:10 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Huguenin-Dumittan22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euromicro/RahmanI22, author = {Karishma Rahman and Clemente Izurieta}, editor = {Gustavo Marrero Callic{\'{o}} and Regina Hebig and Andreas Wortmann}, title = {A Mapping Study of Security Vulnerability Detection Approaches for Web Applications}, booktitle = {48th Euromicro Conference on Software Engineering and Advanced Applications, {SEAA} 2022, Maspalomas, Gran Canaria, Spain, 31 August - 2 September 2022}, pages = {491--494}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SEAA56994.2022.00081}, doi = {10.1109/SEAA56994.2022.00081}, timestamp = {Wed, 15 Feb 2023 22:07:57 +0100}, biburl = {https://dblp.org/rec/conf/euromicro/RahmanI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficloud/ArtychBCNPPW22, author = {Rafal Artych and Krzysztof Bocianiak and Yannick Carlinet and Wojciech Niewolski and Nancy Perrot and Aleksandra Podlasek and Jean{-}Philippe Wary}, editor = {Muhammad Younas and Irfan Awan and Wenny Rahayu}, title = {Security Constraints for Placement of Latency Sensitive 5G {MEC} Applications}, booktitle = {9th International Conference on Future Internet of Things and Cloud, FiCloud 2022, Rome, Italy, August 22-24, 2022}, pages = {40--45}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/FiCloud57274.2022.00013}, doi = {10.1109/FICLOUD57274.2022.00013}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ficloud/ArtychBCNPPW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ftc/GirmaGI22, author = {Anteneh Girma and Michelle A. Guo and John Irungu}, editor = {Kohei Arai}, title = {Identifying Shared Security Vulnerabilities and Mitigation Strategies at the Intersection of Application Programming Interfaces (APIs), Application-Level and Operating System {(OS)} of Mobile Devices}, booktitle = {Proceedings of the Future Technologies Conference, {FTC} 2022, Virtual Event, 20-21 October 2022, Volume 2}, series = {Lecture Notes in Networks and Systems}, volume = {560}, pages = {499--513}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18458-1\_34}, doi = {10.1007/978-3-031-18458-1\_34}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ftc/GirmaGI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/BoddupalliODCR22, author = {Srivalli Boddupalli and Richard Owoputi and Chengwei Duan and Tashfique Hasnine Choudhury and Sandip Ray}, editor = {Ioannis Savidis and Avesta Sasan and Himanshu Thapliyal and Ronald F. DeMara}, title = {Resiliency in Connected Vehicle Applications: Challenges and Approaches for Security Validation}, booktitle = {{GLSVLSI} '22: Great Lakes Symposium on {VLSI} 2022, Irvine {CA} USA, June 6 - 8, 2022}, pages = {475--480}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3526241.3530832}, doi = {10.1145/3526241.3530832}, timestamp = {Mon, 16 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/BoddupalliODCR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/Salmani22a, author = {Hassan Salmani}, editor = {Ioannis Savidis and Avesta Sasan and Himanshu Thapliyal and Ronald F. DeMara}, title = {Session details: Session 6B: Special Session - 2: Application-oriented Hardware Security Challenges and Solutions}, booktitle = {{GLSVLSI} '22: Great Lakes Symposium on {VLSI} 2022, Irvine {CA} USA, June 6 - 8, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3542693}, doi = {10.1145/3542693}, timestamp = {Fri, 03 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/Salmani22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/MirandaGSNA22, author = {Mario Miranda and Kevin Granda and David R. Castillo Salazar and Guillermo Palacios Navarro and Jos{\'{e}} Varela Ald{\'{a}}s}, editor = {Constantine Stephanidis and Margherita Antona and Stavroula Ntoa}, title = {Monitoring Security in a Vehicle Using a Mobile Application}, booktitle = {{HCI} International 2022 Posters - 24th International Conference on Human-Computer Interaction, {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part {IV}}, series = {Communications in Computer and Information Science}, volume = {1583}, pages = {239--244}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06394-7\_31}, doi = {10.1007/978-3-031-06394-7\_31}, timestamp = {Sun, 02 Oct 2022 16:02:13 +0200}, biburl = {https://dblp.org/rec/conf/hci/MirandaGSNA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3i/KwatraJRBBC22, author = {Chetna Vaid Kwatra and Anupam Jain and Angelina Royappa and Susama Bagchi and S. B. G. Tilak Babu and Harish Chowdhary}, title = {Artificial Intelligence Application for Security Issues and Challenges in IoT}, booktitle = {5th International Conference on Contemporary Computing and Informatics, {IC3I} 2022, Uttar Pradesh, India, December 14-16, 2022}, pages = {2100--2104}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IC3I56241.2022.10072808}, doi = {10.1109/IC3I56241.2022.10072808}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ic3i/KwatraJRBBC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3i/MakkaMDKKP22, author = {Shanti Makka and Tripti Misra and Rajesh Deorari and Deepak Kumar and Vikas Kumar and Bhaker Pant}, title = {A Structured Investigation of Network Security Strategies and its Applications}, booktitle = {5th International Conference on Contemporary Computing and Informatics, {IC3I} 2022, Uttar Pradesh, India, December 14-16, 2022}, pages = {52--56}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IC3I56241.2022.10072695}, doi = {10.1109/IC3I56241.2022.10072695}, timestamp = {Sat, 25 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic3i/MakkaMDKKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3i/MakkaSRSRS22, author = {Shanthi Makka and K. Sreenivasulu and B. S. Rawat and Komal Saxena and S. Rajasulochana and Surendra Kumar Shukla}, title = {Application of Blockchain and Internet of Things (IoT) for Ensuring Privacy and Security of Health Records and Medical Services}, booktitle = {5th International Conference on Contemporary Computing and Informatics, {IC3I} 2022, Uttar Pradesh, India, December 14-16, 2022}, pages = {84--88}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IC3I56241.2022.10072427}, doi = {10.1109/IC3I56241.2022.10072427}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ic3i/MakkaSRSRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3i/VigHKSJK22, author = {Heena Vig and Shaikh Abdul Hannan and Ashok Kumar and Rajshree Singh and Juhi Juwairiyyah and Neenu Kuriakose}, title = {Gender and Age Classification Enabled Blockchain Security Mechanism for assisting Mobile Application}, booktitle = {5th International Conference on Contemporary Computing and Informatics, {IC3I} 2022, Uttar Pradesh, India, December 14-16, 2022}, pages = {1123--1128}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IC3I56241.2022.10073014}, doi = {10.1109/IC3I56241.2022.10073014}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ic3i/VigHKSJK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icca2/RafaRMHRN22, author = {Fahmida Rafa and Zinnet Rahman and Md Mahbub Mishu and Morad Hasan and Raiyan Rahman and Dip Nandi}, title = {Detecting Intrusion in Cloud using Snort: An Application towards Cyber-Security}, booktitle = {{ICCA} 2022: 2nd International Conference on Computing Advancements, Dhaka, Bangladesh, March 10 - 12, 2022}, pages = {199--206}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3542954.3542984}, doi = {10.1145/3542954.3542984}, timestamp = {Wed, 17 Aug 2022 14:26:49 +0200}, biburl = {https://dblp.org/rec/conf/icca2/RafaRMHRN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShiCJ22, author = {Jing Shi and Mingyang Chen and Jiazheng Jiao}, editor = {Xingming Sun and Xiaorui Zhang and Zhihua Xia and Elisa Bertino}, title = {Thoughts on the Application of Low-Interactive Honeypot Based on Raspberry Pi in Public Security Actual Combat, {LIHRP}}, booktitle = {Artificial Intelligence and Security - 8th International Conference, {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13340}, pages = {144--156}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06791-4\_12}, doi = {10.1007/978-3-031-06791-4\_12}, timestamp = {Tue, 02 Aug 2022 22:23:49 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ShiCJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccir/ZhangL22, author = {Jiqiang Zhang and Pengcheng Liu}, title = {Application of edge computing in intelligent security system}, booktitle = {Proceedings of the 2nd International Conference on Control and Intelligent Robotics, {ICCIR} 2022, Nanjing, China, June 24-26, 2022}, pages = {216--220}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548608.3559195}, doi = {10.1145/3548608.3559195}, timestamp = {Wed, 26 Oct 2022 14:31:02 +0200}, biburl = {https://dblp.org/rec/conf/iccir/ZhangL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/XiongGZZ22, author = {Xinli Xiong and Liang Guo and Yunfeng Zhang and Jingye Zhang}, title = {Cyber-Security Enhanced Network Meta-Model and its Application}, booktitle = {6th International Conference on Cryptography, Security and Privacy, {CSP} 2022, Tianjin, China, January 14-16, 2022}, pages = {80--85}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSP55486.2022.00023}, doi = {10.1109/CSP55486.2022.00023}, timestamp = {Mon, 06 Nov 2023 13:06:30 +0100}, biburl = {https://dblp.org/rec/conf/iccsp/XiongGZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciap/LioupisDMKAGMCL21, author = {Panagiotis Lioupis and Aris Dadoukis and Evangelos Maltezos and Lazaros Karagiannidis and Angelos Amditis and Maite Gonz{\'{a}}lez and Jon Martin and David Cantero and Mikel Larra{\~{n}}aga}, editor = {Pier Luigi Mazzeo and Emanuele Frontoni and Stan Sclaroff and Cosimo Distante}, title = {Embedded Intelligence for Safety and Security Machine Vision Applications}, booktitle = {Image Analysis and Processing. {ICIAP} 2022 Workshops - {ICIAP} International Workshops, Lecce, Italy, May 23-27, 2022, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13374}, pages = {37--46}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-13324-4\_4}, doi = {10.1007/978-3-031-13324-4\_4}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciap/LioupisDMKAGMCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icist/ZahidAAAM22, author = {Rimsha Zahid and Muhammad Waseem Anwar and Farooque Azam and Anam Amjad and Danish Mukhtar}, editor = {Audrius Lopata and Daina Gudoniene and Rita Butkiene}, title = {Enhancing End-to-End Communication Security in IoT Devices Through Application Layer Protocol}, booktitle = {Information and Software Technologies - 28th International Conference, {ICIST} 2022, Kaunas, Lithuania, October 13-15, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1665}, pages = {148--159}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-16302-9\_11}, doi = {10.1007/978-3-031-16302-9\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icist/ZahidAAAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitee/WuDX22, author = {Guofang Wu and Guoliang Dong and Shuquan Xu}, title = {Application of Personnel Safety Management System in Network Security Guarantee}, booktitle = {Proceedings of the 5th International Conference on Information Technologies and Electrical Engineering, {ICITEE} 2022, Changsha, China, November 4-6, 2022}, pages = {714--718}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3582935.3583055}, doi = {10.1145/3582935.3583055}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitee/WuDX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icr2/AdelBESFB22, author = {Basant Adel and Asmaa Badran and Nada E. Elshami and Ahmad Salah and Ahmed Fathalla and Mahmoud Bekhit}, editor = {Kevin Daimi and Abeer Alsadoon}, title = {A Survey on Deep Learning Architectures in Human Activities Recognition Application in Sports Science, Healthcare, and Security}, booktitle = {Proceedings of the ICR'22 International Conference on Innovations in Computing Research, Athens, Greece, 29-31 August, 2022}, series = {Advances in Intelligent Systems and Computing}, volume = {1431}, pages = {121--134}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-14054-9\_13}, doi = {10.1007/978-3-031-14054-9\_13}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icr2/AdelBESFB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icseb/AgnoGCVI22, author = {Miguel Abhram Agno and Anna Patricia De Guia and Danilo Dela Cruz and Paul Jericho Marcos Vale and Grace Lorraine D. Intal}, title = {A Study on the Design of Pandora's Box Web Application Using Design Thinking approach: {A} study on a centralized web browser security extension design and planned realization}, booktitle = {6th International Conference on Software and e-Business, {ICSEB} 2022, Shenzhen, China, December 9-11, 2022}, pages = {89--96}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3578997.3579006}, doi = {10.1145/3578997.3579006}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icseb/AgnoGCVI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsm/RahkemaP22, author = {Kristiina Rahkema and Dietmar Pfahl}, title = {Quality Analysis of iOS Applications with Focus on Maintainability and Security}, booktitle = {{IEEE} International Conference on Software Maintenance and Evolution, {ICSME} 2022, Limassol, Cyprus, October 3-7, 2022}, pages = {602--606}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICSME55016.2022.00083}, doi = {10.1109/ICSME55016.2022.00083}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsm/RahkemaP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsm2/MimoM22, author = {Edgard Musafiri Mimo and Troy McDaniel}, editor = {Stefano Berretti and Guan{-}Ming Su}, title = {Security Concerns and Citizens' Privacy Implications in Smart Multimedia Applications}, booktitle = {Smart Multimedia - Third International Conference, {ICSM} 2022, Marseille, France, August 25-27, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13497}, pages = {107--115}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22061-6\_8}, doi = {10.1007/978-3-031-22061-6\_8}, timestamp = {Fri, 16 Dec 2022 15:59:57 +0100}, biburl = {https://dblp.org/rec/conf/icsm2/MimoM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/SalazarCMSZR22, author = {Zujany Salazar and Ana Rosa Cavalli and Wissam Mallouli and Filip Sebek and Fatiha Za{\"{\i}}di and Monika Ewa Rakoczy}, title = {Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System}, booktitle = {15th {IEEE} International Conference on Software Testing, Verification and Validation Workshops {ICST} Workshops 2022, Valencia, Spain, April 4-13, 2022}, pages = {40--48}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICSTW55395.2022.00021}, doi = {10.1109/ICSTW55395.2022.00021}, timestamp = {Mon, 13 Jun 2022 16:53:37 +0200}, biburl = {https://dblp.org/rec/conf/icst/SalazarCMSZR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict4d/MathijssenT22, author = {Maxine Mathijssen and Maureen Tanner}, editor = {Yingqin Zheng and Pamela Abbott and Jose Antonio Robles{-}Flores}, title = {The Use of a User-Centric Smart Mobile Application Prototype for Supporting Safety and Security in a City: {A} Design Science Method}, booktitle = {Freedom and Social Inclusion in a Connected World - 17th {IFIP} {WG} 9.4 International Conference on Implications of Information and Digital Technologies for Development, {ICT4D} 2022, Lima, Peru, May 25-27, 2022, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {657}, pages = {270--294}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-19429-0\_17}, doi = {10.1007/978-3-031-19429-0\_17}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ict4d/MathijssenT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/RahmanHJ22, author = {Anichur Rahman and Kamrul Hasan and Seong{-}Ho Jeong}, title = {An Enhanced Security Architecture for Industry 4.0 Applications based on Software-Defined Networking}, booktitle = {13th International Conference on Information and Communication Technology Convergence, {ICTC} 2022, Jeju Island, Korea, Republic of, October 19-21, 2022}, pages = {2127--2130}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICTC55196.2022.9952633}, doi = {10.1109/ICTC55196.2022.9952633}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/RahmanHJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idsta/KundaA22, author = {Mohammed Ali Kunda and Izzat Alsmadi}, editor = {Mohammad A. Alsmirat and Yaser Jararweh and Moayad Aloqaily and Izzat Alsmadi}, title = {Practical web security testing: Evolution of web application modules and open source testing tools}, booktitle = {3rd International Conference on Intelligent Data Science Technologies and Applications, {IDSTA} 2022, San Antonio, TX, USA, September 5-7, 2022}, pages = {152--155}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IDSTA55301.2022.9923130}, doi = {10.1109/IDSTA55301.2022.9923130}, timestamp = {Thu, 10 Nov 2022 11:54:13 +0100}, biburl = {https://dblp.org/rec/conf/idsta/KundaA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iisa/GuA22, author = {Siyao Gu and Miltiadis Alamaniotis}, editor = {Nikolaos G. Bourbakis and George A. Tsihrintzis and Maria Virvou}, title = {Radiation Sensor Placement using Reinforcement Learning in Nuclear Security Applications}, booktitle = {13th International Conference on Information, Intelligence, Systems {\&} Applications, {IISA} 2022, Corfu, Greece, July 18-20, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IISA56318.2022.9904349}, doi = {10.1109/IISA56318.2022.9904349}, timestamp = {Fri, 18 Nov 2022 11:48:30 +0100}, biburl = {https://dblp.org/rec/conf/iisa/GuA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indin/AllisonSM22, author = {David Allison and Paul Smith and Kieran McLaughlin}, title = {Digital Twin-Enhanced Methodology for Training Edge-Based Models for Cyber Security Applications}, booktitle = {20th {IEEE} International Conference on Industrial Informatics, {INDIN} 2022, Perth, Australia, July 25-28, 2022}, pages = {226--232}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/INDIN51773.2022.9976095}, doi = {10.1109/INDIN51773.2022.9976095}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indin/AllisonSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotbd/RuddC22, author = {Steph Rudd and Hamish Cunningham}, editor = {Denis Bastieri and Gary B. Wills and P{\'{e}}ter Kacsuk and Victor Chang}, title = {Threat Modelling with the {GDPR} towards a Security and Privacy Metrics Framework for IoT Smart-farm Application}, booktitle = {Proceedings of the 7th International Conference on Internet of Things, Big Data and Security, IoTBDS 2022, Online Streaming, April 22-24, 2022}, pages = {91--102}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010920800003194}, doi = {10.5220/0010920800003194}, timestamp = {Tue, 06 Jun 2023 14:58:00 +0200}, biburl = {https://dblp.org/rec/conf/iotbd/RuddC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isami/AbbasiPM22, author = {Mahmoud Abbasi and Marta Plaza{-}Hern{\'{a}}ndez and Yeray Mezquita}, editor = {Vicente Juli{\'{a}}n and Jo{\~{a}}o Carneiro and Ricardo S. Alonso and Pablo Chamoso and Paulo Novais}, title = {Security of IoT Application Layer: Requirements, Threats, and Solutions}, booktitle = {Ambient Intelligence - Software and Applications - 13th International Symposium on Ambient Intelligence, ISAmI 2022, L'Aquila, Italy, 13-15 July, 2022}, series = {Lecture Notes in Networks and Systems}, volume = {603}, pages = {86--100}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22356-3\_9}, doi = {10.1007/978-3-031-22356-3\_9}, timestamp = {Tue, 05 Sep 2023 09:14:36 +0200}, biburl = {https://dblp.org/rec/conf/isami/AbbasiPM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/KarnZJE22, author = {Rupesh Raj Karn and Matthew Ziegler and Jinwook Jung and Ibrahim Abe M. Elfadel}, title = {Hyper-parameter Tuning for Progressive Learning and its Application to Network Cyber Security}, booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2022, Austin, TX, USA, May 27 - June 1, 2022}, pages = {1220--1224}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISCAS48785.2022.9937433}, doi = {10.1109/ISCAS48785.2022.9937433}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscas/KarnZJE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isncc/ZrelliNE22, author = {Amira Zrelli and Cherifa Nakkach and Tahar Ezzedine}, title = {Cyber-Security for IoT Applications based on {ANN} Algorithm}, booktitle = {International Symposium on Networks, Computers and Communications, {ISNCC} 2022, Shenzhen, China, July 19-22, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISNCC55209.2022.9851715}, doi = {10.1109/ISNCC55209.2022.9851715}, timestamp = {Sun, 07 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isncc/ZrelliNE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itc/KibriaRFT22, author = {Rasheed Kibria and M. Sazadur Rahman and Farimah Farahmandi and Mark M. Tehranipoor}, title = {RTL-FSMx: Fast and Accurate Finite State Machine Extraction at the {RTL} for Security Applications}, booktitle = {{IEEE} International Test Conference, {ITC} 2022, Anaheim, CA, USA, September 23-30, 2022}, pages = {165--174}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ITC50671.2022.00024}, doi = {10.1109/ITC50671.2022.00024}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itc/KibriaRFT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itc/StellariS22, author = {Franco Stellari and Peilin Song}, title = {Reliability Study of 14 nm Scan Chains and Its Application to Hardware Security}, booktitle = {{IEEE} International Test Conference, {ITC} 2022, Anaheim, CA, USA, September 23-30, 2022}, pages = {28--35}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ITC50671.2022.00009}, doi = {10.1109/ITC50671.2022.00009}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itc/StellariS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iti2/PleskachZBPV22, author = {Valentyna Pleskach and Viacheslav V. Zosimov and Oleksandra S. Bulgakova and Mariia Pleskach and Eva Volnyanska}, editor = {Anatoly Anisimov and Vitaliy Snytyuk and Aldrich Chris and Andreas Pester and Fr{\'{e}}d{\'{e}}ric Mallet and Hiroshi Tanaka and Iurii Krak and Karsten Henke and Oleg Chertov and Oleksandr Marchenko and S{\'{a}}ndor Boz{\'{o}}ki and Vitaliy V. Tsyganok and Vladimir Vovk}, title = {{C2C} Application as an Example of Eshop for Handmade: Tools, Security Issues, Basic Technologies}, booktitle = {Selected Papers of the {IX} International Scientific Conference "Information Technology and Implementation" (IT{\&}I-2022). Conference Proceedings Kyiv, Ukraine, November 30 - December 02, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3347}, pages = {148--158}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3347/Paper\_13.pdf}, timestamp = {Wed, 13 Sep 2023 14:01:43 +0200}, biburl = {https://dblp.org/rec/conf/iti2/PleskachZBPV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itsc/BoddupalliCLR22, author = {Srivalli Boddupalli and Venkata Sai Gireesh Chamarthi and Chung{-}Wei Lin and Sandip Ray}, title = {{CAVELIER:} Automated Security Evaluation for Connected Autonomous Vehicle Applications}, booktitle = {25th {IEEE} International Conference on Intelligent Transportation Systems, {ITSC} 2022, Macau, China, October 8-12, 2022}, pages = {4335--4340}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ITSC55140.2022.9921825}, doi = {10.1109/ITSC55140.2022.9921825}, timestamp = {Thu, 10 Nov 2022 21:13:36 +0100}, biburl = {https://dblp.org/rec/conf/itsc/BoddupalliCLR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwssip/Zeneli22, author = {Manjola Zeneli}, title = {Pathway of applications of cyber security standards and rules in Albania}, booktitle = {29th International Conference on Systems, Signals and Image Processing, {IWSSIP} 2022, Sofia, Bulgaria, June 1-3, 2022}, pages = {1--4}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IWSSIP55020.2022.9854492}, doi = {10.1109/IWSSIP55020.2022.9854492}, timestamp = {Fri, 26 Aug 2022 16:30:18 +0200}, biburl = {https://dblp.org/rec/conf/iwssip/Zeneli22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mwscas/DivyanshuKKAM22, author = {Divyanshu Divyanshu and Rajat Kumar and Danial Khan and Selma Amara and Yehia Massoud}, title = {Physically Unclonable Function using {GSHE} driven {SOT} assisted {MTJ} for next Generation Hardware Security Applications}, booktitle = {65th {IEEE} International Midwest Symposium on Circuits and Systems, {MWSCAS} 2022, Fukuoka, Japan, August 7-10, 2022}, pages = {1--4}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/MWSCAS54063.2022.9859327}, doi = {10.1109/MWSCAS54063.2022.9859327}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mwscas/DivyanshuKKAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mwscas/LiuA22, author = {Xingye Liu and Paul Ampadu}, title = {A Scalable Integrated {DC/DC} Converter with Enhanced Load Transient Response and Security for Emerging SoC Applications}, booktitle = {65th {IEEE} International Midwest Symposium on Circuits and Systems, {MWSCAS} 2022, Fukuoka, Japan, August 7-10, 2022}, pages = {1--4}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/MWSCAS54063.2022.9859336}, doi = {10.1109/MWSCAS54063.2022.9859336}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mwscas/LiuA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/KassarCCBY22, author = {Feras Al Kassar and Giulia Clerici and Luca Compagna and Davide Balzarotti and Fabian Yamaguchi}, title = {Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-206/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/KassarCCBY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/CorinCCMS22, author = {Roberto Doriguzzi Corin and Silvio Cretti and Tiziana Catena and Simone Magnani and Domenico Siracusa}, editor = {Alexander Clemm and Guido Maier and Carmen Mas Machuca and K. K. Ramakrishnan and Fulvio Risso and Prosper Chemouil and Noura Limam}, title = {Towards Application-Aware Provisioning of Security Services with Kubernetes}, booktitle = {8th {IEEE} International Conference on Network Softwarization, NetSoft 2022, Milan, Italy, June 27 - July 1, 2022}, pages = {284--286}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/NetSoft54395.2022.9844023}, doi = {10.1109/NETSOFT54395.2022.9844023}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/netsoft/CorinCCMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/TopmanA22, author = {Nicholas Topman and Asma Adnane}, title = {Mobile applications for connected cars: Security analysis and risk assessment}, booktitle = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2022, Budapest, Hungary, April 25-29, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/NOMS54207.2022.9789873}, doi = {10.1109/NOMS54207.2022.9789873}, timestamp = {Wed, 15 Jun 2022 16:45:18 +0200}, biburl = {https://dblp.org/rec/conf/noms/TopmanA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pais/KenazaKBML22, author = {Rabah Kenaza and Ameur Khemane and Hakim Bendjenna and Abdallah Meraoumia and Laimeche Lakhdar}, title = {Internet of Things (IoT): Architecture, Applications, and Security Challenges}, booktitle = {4th International Conference on Pattern Analysis and Intelligent Systems, {PAIS} 2022, Oum El Bouaghi, Algeria, October 12-13, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/PAIS56586.2022.9946918}, doi = {10.1109/PAIS56586.2022.9946918}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pais/KenazaKBML22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/profes/IovanC22, author = {Monica Iovan and Daniela Soares Cruzes}, editor = {Davide Taibi and Marco Kuhrmann and Tommi Mikkonen and Jil Kl{\"{u}}nder and Pekka Abrahamsson}, title = {Data-Driven Improvement of Static Application Security Testing Service: An Experience Report in Visma}, booktitle = {Product-Focused Software Process Improvement - 23rd International Conference, {PROFES} 2022, Jyv{\"{a}}skyl{\"{a}}, Finland, November 21-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13709}, pages = {157--170}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-21388-5\_11}, doi = {10.1007/978-3-031-21388-5\_11}, timestamp = {Thu, 17 Nov 2022 16:10:54 +0100}, biburl = {https://dblp.org/rec/conf/profes/IovanC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/Kaneko22, author = {Tomoko Kaneko}, title = {Security Resilience - Considerations from the Application of the Functional Resonance Method {(FRAM)} to Information Security Incidents}, booktitle = {22nd {IEEE} International Conference on Software Quality, Reliability, and Security, {QRS} 2022 - Companion, Guangzhou, China, December 5-9, 2022}, pages = {16--23}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/QRS-C57518.2022.00013}, doi = {10.1109/QRS-C57518.2022.00013}, timestamp = {Sat, 22 Apr 2023 17:02:06 +0200}, biburl = {https://dblp.org/rec/conf/qrs/Kaneko22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ricai/JiangWWYCZ22, author = {Chunlin Jiang and Shi{-}lan Wu and Guangsheng Wu and Chunrong Yang and Lin Cai and Fulian Zhong}, title = {Application Research of security policy in the Linux operating system}, booktitle = {Proceedings of the 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence, {RICAI} 2022, Dongguan, China, December 16-18, 2022}, pages = {638--641}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584376.3584488}, doi = {10.1145/3584376.3584488}, timestamp = {Fri, 19 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ricai/JiangWWYCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/roedunet/ContaselTP22, author = {Cristian Contasel and Dumitru{-}Cristian Tranca and Alexandru{-}Viorel Palacean}, title = {Increasing the security of web applications by using smartphones}, booktitle = {21st RoEduNet Conference: Networking in Education and Research, RoEduNet 2022, Sovata, Romania, September 15-16, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/RoEduNet57163.2022.9921098}, doi = {10.1109/ROEDUNET57163.2022.9921098}, timestamp = {Thu, 10 Nov 2022 10:31:43 +0100}, biburl = {https://dblp.org/rec/conf/roedunet/ContaselTP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sds/AlsharaSJ22, author = {Zakarea Alshara and Anas Shatnawi and Yaser Jararweh}, editor = {Larbi Boubchir and Boubaker Daachi and Abdellah Mokrane and Yaser Jararweh and Elhadj Benkhelifa}, title = {NIV-Detector: An Automated Approach for Detecting Next- Intent Security Vulnerability in Android Applications}, booktitle = {Ninth International Conference on Software Defined Systems, {SDS} 2022, Paris, France, December 12-15, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SDS57574.2022.10062925}, doi = {10.1109/SDS57574.2022.10062925}, timestamp = {Wed, 29 Mar 2023 17:16:10 +0200}, biburl = {https://dblp.org/rec/conf/sds/AlsharaSJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sds/FilhoSBRSC22, author = {Raimir Holanda Filho and Debora Carla Barboza de Sousa and Wellington Alves de Brito and Victor Pasknel de Alencar Ribeiro and Emanuel Le{\~{a}}o S{\'{a}} and Joan Lucas Marques de Sousa Chaves}, editor = {Larbi Boubchir and Boubaker Daachi and Abdellah Mokrane and Yaser Jararweh and Elhadj Benkhelifa}, title = {Smart Contract Implementation to Improve Security on Solid Waste Management Application}, booktitle = {Ninth International Conference on Software Defined Systems, {SDS} 2022, Paris, France, December 12-15, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SDS57574.2022.10062932}, doi = {10.1109/SDS57574.2022.10062932}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sds/FilhoSBRSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/PhokelaSDKB22, author = {Kanchanjot Kaur Phokela and Kapil Singi and Kuntal Dey and Vikrant Kaulgud and Adam P. Burden}, title = {Framework to Assess Policy Driven Security Misconfiguration Risks in Cloud Native Application}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {63--64}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00023}, doi = {10.1109/SECDEV53368.2022.00023}, timestamp = {Tue, 20 Dec 2022 15:29:05 +0100}, biburl = {https://dblp.org/rec/conf/secdev/PhokelaSDKB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/segah/OrjiHSO22, author = {Joseph Orji and Amelia Hernandez and Biebelemabo Selema and Rita Orji}, title = {Virtual and Augmented Reality Applications for Promoting Safety and Security: {A} Systematic Review}, booktitle = {2022 {IEEE} 10th International Conference on Serious Games and Applications for Health(SeGAH), Sydney, Australia, August 10-12, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SEGAH54908.2022.9978597}, doi = {10.1109/SEGAH54908.2022.9978597}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/segah/OrjiHSO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/ChristakisCFLMP22, author = {Maria Christakis and Thomas Cottenier and Antonio Filieri and Linghui Luo and Muhammad Numair Mansur and Lee Pike and Nicol{\'{a}}s Rosner and Martin Sch{\"{a}}f and Aritra Sengupta and Willem Visser}, editor = {Abhik Roychoudhury and Cristian Cadar and Miryung Kim}, title = {Input splitting for cloud-based static application security testing platforms}, booktitle = {Proceedings of the 30th {ACM} Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, {ESEC/FSE} 2022, Singapore, Singapore, November 14-18, 2022}, pages = {1367--1378}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3540250.3558944}, doi = {10.1145/3540250.3558944}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/ChristakisCFLMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sii/ArnarsonKKSP22, author = {Halldor Arnarson and Faraz Safarpour Kanafi and Tero Kaarlela and Ulrich Seldeslachts and Roel Pieters}, title = {Evaluation of cyber security in agile manufacturing: Maturity of Technologies and Applications}, booktitle = {{IEEE/SICE} International Symposium on System Integration, {SII} 2022, Narvik, Norway, January 9-12, 2022}, pages = {784--789}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SII52469.2022.9708888}, doi = {10.1109/SII52469.2022.9708888}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sii/ArnarsonKKSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/softcom/KovacevicMGV22, author = {Ivan Kovacevic and Mihael Marovic and Stjepan Gros and Marin Vukovic}, title = {Predicting Vulnerabilities in Web Applications Based on Website Security Model}, booktitle = {30th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2022, Split, Croatia, September 22-24, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://ieeexplore.ieee.org/document/9911436}, timestamp = {Tue, 25 Oct 2022 14:27:11 +0200}, biburl = {https://dblp.org/rec/conf/softcom/KovacevicMGV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Howes0MS22, author = {James K. Howes IV and Marios Georgiou and Alex J. Malozemoff and Thomas Shrimpton}, title = {Security Foundations for Application-Based Covert Communication Channels}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {1971--1986}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833752}, doi = {10.1109/SP46214.2022.9833752}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/Howes0MS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tdit/MandalK022, author = {Subhadeep Mandal and Arpan Kumar Kar and Shivam Gupta}, editor = {Sujeet Kumar Sharma and Yogesh K. Dwivedi and Bhimaraya A. Metri and Banita Lal and Amany R. Elbanna}, title = {Blockchain-Based Application Security Versus Centralized and Distributed Data Management Systems - {A} Comparative Study}, booktitle = {Transfer, Diffusion and Adoption of Next-Generation Digital Technologies - {IFIP} {WG} 8.6 International Working Conference on Transfer and Diffusion of IT, {TDIT} 2023, Nagpur, India, December 15-16, 2023, Proceedings, Part {I}}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {697}, pages = {207--218}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-50188-3\_18}, doi = {10.1007/978-3-031-50188-3\_18}, timestamp = {Wed, 31 Jan 2024 08:20:28 +0100}, biburl = {https://dblp.org/rec/conf/tdit/MandalK022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BertoglioSZL22, author = {Daniel Dalalana Bertoglio and Luis G. B. Sch{\"{u}}ler and Avelino F. Zorzo and Roben Castagna Lunardi}, title = {Understanding the Penetration Test Workflow: a security test with Tramonto in an e-Government application}, booktitle = {{IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022}, pages = {1597--1604}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00229}, doi = {10.1109/TRUSTCOM56396.2022.00229}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BertoglioSZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/AlshaikhP022, author = {Omar Alshaikh and Simon Parkinson and Saad Khan}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Jie Wu and Ernesto Damiani}, title = {On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security}, booktitle = {Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1768}, pages = {545--555}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-0272-9\_38}, doi = {10.1007/978-981-99-0272-9\_38}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ubisec/AlshaikhP022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ucami/CandelMM22, author = {Jos{\'{e}} Manuel Ortega Candel and Francisco Jos{\'{e}} Mora{-}Gimeno and Higinio Mora Mora}, editor = {Jos{\'{e}} Bravo and Sergio F. Ochoa and Jes{\'{u}}s Favela}, title = {Serverless Security Analysis for IoT Applications}, booktitle = {Proceedings of the International Conference on Ubiquitous Computing {\&} Ambient Intelligence, UCAmI 2022, C{\'{o}}rdoba, Spain, 29 November - 2 December 2022}, series = {Lecture Notes in Networks and Systems}, volume = {594}, pages = {393--400}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-21333-5\_39}, doi = {10.1007/978-3-031-21333-5\_39}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ucami/CandelMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0004HP022, author = {Daniel G{\"{u}}nther and Maurice Heymann and Benny Pinkas and Thomas Schneider}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {GPU-accelerated {PIR} with Client-Independent Preprocessing for Large-Scale Applications}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {1759--1776}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/gunther}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/0004HP022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ArdiAKDHTS22, author = {Calvin Ardi and Connor Aubry and Brian Kocoloski and Dave DeAngelis and Alefiya Hussain and Matthew Troglia and Stephen Schwab}, title = {The {DARPA} {SEARCHLIGHT} Dataset of Application Network Traffic}, booktitle = {{CSET} 2022: Cyber Security Experimentation and Test Workshop, Virtual Event, 8 August 2022}, pages = {59--64}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3546096.3546103}, doi = {10.1145/3546096.3546103}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ArdiAKDHTS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BalashWGRA22, author = {David G. Balash and Xiaoyuan Wu and Miles Grant and Irwin Reyes and Adam J. Aviv}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Security and Privacy Perceptions of Third-Party Application Access for Google Accounts}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3397--3414}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/balash}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BalashWGRA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenLXZ00022, author = {Yuan Chen and Jiaqi Li and Guorui Xu and Yajin Zhou and Zhi Wang and Cong Wang and Kui Ren}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for {SGX}}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {4129--4146}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/chen-yuan}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChenLXZ00022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Chinprutthiwong22, author = {Phakpoom Chinprutthiwong and Jianwei Huang and Guofei Gu}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {{SWAPP:} {A} New Programmable Playground for Web Application Security}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {2029--2046}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/chinprutthiwong}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Chinprutthiwong22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Harrity0SL22, author = {Michael Harrity and Kevin Bock and Frederick Sell and Dave Levin}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {{GET} /out: Automated Discovery of Application-Layer Censorship Evasion Strategies}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {465--483}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/harrity}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Harrity0SL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LeungG0RZ22, author = {Derek Leung and Yossi Gilad and Sergey Gorbunov and Leonid Reyzin and Nickolai Zeldovich}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {4237--4254}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/leung}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LeungG0RZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Shi0LMCWZH022, author = {Youkun Shi and Yuan Zhang and Tianhan Luo and Xiangyu Mao and Yinzhi Cao and Ziwen Wang and Yudi Zhao and Zongan Huang and Min Yang}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Backporting Security Patches of Web Applications: {A} Prototype Design and Implementation on Injection Vulnerability Patches}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {1993--2010}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/shi}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Shi0LMCWZH022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YoungL0HD22, author = {Jeffrey Young and Song Liao and Long Cheng and Hongxin Hu and Huixing Deng}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {1113--1130}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/young}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/YoungL0HD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangXHSZ22, author = {Jiaheng Zhang and Tiancheng Xie and Thang Hoang and Elaine Shi and Yupeng Zhang}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Polynomial Commitment with a One-to-Many Prover and Applications}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {2965--2982}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/zhang-jiaheng}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZhangXHSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/Kumar022, author = {Amritesh Kumar and Debasis Das}, title = {IntelligentChain: Blockchain and Machine Learning based Intelligent Security Application for Internet of Vehicles (IoV)}, booktitle = {95th {IEEE} Vehicular Technology Conference, {VTC} Spring 2022, Helsinki, Finland, June 19-22, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/VTC2022-Spring54318.2022.9860946}, doi = {10.1109/VTC2022-SPRING54318.2022.9860946}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/Kumar022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vts/KibriaFFT22, author = {Rasheed Kibria and Nusrat Farzana and Farimah Farahmandi and Mark M. Tehranipoor}, title = {FSMx: Finite State Machine Extraction from Flattened Netlist With Application to Security}, booktitle = {40th {IEEE} {VLSI} Test Symposium, {VTS} 2022, San Diego, CA, USA, April 25-27, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/VTS52500.2021.9794151}, doi = {10.1109/VTS52500.2021.9794151}, timestamp = {Wed, 22 Jun 2022 15:24:48 +0200}, biburl = {https://dblp.org/rec/conf/vts/KibriaFFT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wac2/TianJ22, author = {Qiuyan Tian and Huayan Jiang}, title = {Application of Big Data Technology in Information Security}, booktitle = {World Automation Congress, {WAC} 2022, San Antonio, TX, USA, October 11-15, 2022}, pages = {133--137}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/WAC55640.2022.9934346}, doi = {10.23919/WAC55640.2022.9934346}, timestamp = {Fri, 18 Nov 2022 17:35:33 +0100}, biburl = {https://dblp.org/rec/conf/wac2/TianJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/HassanshahiLK22, author = {Behnaz Hassanshahi and Hyunjun Lee and Paddy Krishnan}, title = {Gelato: Feedback-driven and Guided Security Analysis of Client-side Web Applications}, booktitle = {{IEEE} International Conference on Software Analysis, Evolution and Reengineering, {SANER} 2022, Honolulu, HI, USA, March 15-18, 2022}, pages = {618--629}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SANER53432.2022.00079}, doi = {10.1109/SANER53432.2022.00079}, timestamp = {Tue, 26 Jul 2022 14:23:17 +0200}, biburl = {https://dblp.org/rec/conf/wcre/HassanshahiLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/PuentesLRHS22, author = {Matthew A. Puentes and Yunsen Lei and No{\"{e}}lle Rakotondravony and Lane T. Harrison and Craig A. Shue}, title = {Visualizing Web Application Execution Logs to Improve Software Security Defect Localization}, booktitle = {{IEEE} International Conference on Software Analysis, Evolution and Reengineering, {SANER} 2022, Honolulu, HI, USA, March 15-18, 2022}, pages = {1183--1190}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SANER53432.2022.00138}, doi = {10.1109/SANER53432.2022.00138}, timestamp = {Tue, 26 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcre/PuentesLRHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wf-iot/HasanHH22, author = {Raiful Hasan and Mohammad Aminul Hoque and Ragib Hasan}, title = {Towards a Threat Model and Security Analysis for Contact Tracing Applications}, booktitle = {8th {IEEE} World Forum on Internet of Things, WF-IoT 2022, Yokohama, Japan, October 26 - Nov. 11, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/WF-IoT54382.2022.10152080}, doi = {10.1109/WF-IOT54382.2022.10152080}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wf-iot/HasanHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/KishnaniNDD22, author = {Urvashi Kishnani and Naheem Noah and Sanchari Das and Rinku Dewri}, editor = {Yuan Hong and Lingyu Wang}, title = {Privacy and Security Evaluation of Mobile Payment Applications Through User-Generated Reviews}, booktitle = {Proceedings of the 21st Workshop on Privacy in the Electronic Society, WPES2022, Los Angeles, CA, USA, 7 November 2022}, pages = {159--173}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3559613.3563196}, doi = {10.1145/3559613.3563196}, timestamp = {Thu, 03 Nov 2022 11:08:36 +0100}, biburl = {https://dblp.org/rec/conf/wpes/KishnaniNDD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/RuffinLLW22, author = {Margie Ruffin and Israel Lopez{-}Toledo and Kirill Levchenko and Gang Wang}, editor = {Yuan Hong and Lingyu Wang}, title = {Casing the Vault: Security Analysis of Vault Applications}, booktitle = {Proceedings of the 21st Workshop on Privacy in the Electronic Society, WPES2022, Los Angeles, CA, USA, 7 November 2022}, pages = {175--180}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3559613.3563204}, doi = {10.1145/3559613.3563204}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/RuffinLLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/22/ArafinXQ22, author = {Md Tanvir Arafin and Qian Xu and Gang Qu}, editor = {Weiqiang Liu and Fabrizio Lombardi}, title = {Voltage Overscaling Techniques for Security Applications}, booktitle = {Approximate Computing}, pages = {287--311}, publisher = {Springer International Publishing}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98347-5\_12}, doi = {10.1007/978-3-030-98347-5\_12}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/22/ArafinXQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/22/TorkyDH22, author = {Mohamed Torky and Ashraf Darwish and Aboul Ella Hassanien}, editor = {Aboul Ella Hassanien and Ashraf Darwish and V{\'{a}}clav Sn{\'{a}}sel}, title = {Integrated Digital Twins and Blockchain Framework for Privacy and Security of Applications}, booktitle = {Digital Twins for Digital Transformation: Innovation in Industry}, series = {Studies in Systems, Decision and Control}, volume = {423}, pages = {99--112}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-96802-1\_6}, doi = {10.1007/978-3-030-96802-1\_6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/22/TorkyDH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2022, title = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625}, doi = {10.1145/3564625}, isbn = {978-1-4503-9759-9}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2022-1, editor = {Shweta Agrawal and Dongdai Lin}, title = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13791}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22963-3}, doi = {10.1007/978-3-031-22963-3}, isbn = {978-3-031-22962-6}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2022-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2022-2, editor = {Shweta Agrawal and Dongdai Lin}, title = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13792}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22966-4}, doi = {10.1007/978-3-031-22966-4}, isbn = {978-3-031-22965-7}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2022-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2022-3, editor = {Shweta Agrawal and Dongdai Lin}, title = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13793}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22969-5}, doi = {10.1007/978-3-031-22969-5}, isbn = {978-3-031-22968-8}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2022-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2022-4, editor = {Shweta Agrawal and Dongdai Lin}, title = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13794}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22972-5}, doi = {10.1007/978-3-031-22972-5}, isbn = {978-3-031-22971-8}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2022-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/atis/2021, editor = {Shiva Raj Pokhrel and Min Yu and Gang Li}, title = {Applications and Techniques in Information Security - 12th International Conference, {ATIS} 2021, Virtual Event, December 16-17, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1554}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-19-1166-8}, doi = {10.1007/978-981-19-1166-8}, isbn = {978-981-19-1165-1}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2022, editor = {Anupam Joshi and Maribel Fern{\'{a}}ndez and Rakesh M. Verma}, title = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3508398}, doi = {10.1145/3508398}, isbn = {978-1-4503-9220-4}, timestamp = {Wed, 20 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2022, editor = {Shamik Sural and Haibing Lu}, title = {Data and Applications Security and Privacy {XXXVI} - 36th Annual {IFIP} {WG} 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13383}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-10684-2}, doi = {10.1007/978-3-031-10684-2}, isbn = {978-3-031-10683-5}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisa/2021, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-93956-4}, doi = {10.1007/978-3-030-93956-4}, isbn = {978-3-030-93955-7}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eisa/2022, editor = {Jiageng Chen and Debiao He and Rongxing Lu}, title = {Emerging Information Security and Applications - Third International Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1641}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23098-1}, doi = {10.1007/978-3-031-23098-1}, isbn = {978-3-031-23097-4}, timestamp = {Wed, 08 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisa/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fdse/2022ccis, editor = {Tran Khanh Dang and Josef K{\"{u}}ng and Tai M. Chung}, title = {Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications - 9th International Conference, {FDSE} 2022, Ho Chi Minh City, Vietnam, November 23-25, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1688}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-19-8069-5}, doi = {10.1007/978-981-19-8069-5}, isbn = {978-981-19-8068-8}, timestamp = {Tue, 22 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdse/2022ccis.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tpsisa/2022, title = {4th {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, {TPS-ISA} 2022, Atlanta, GA, USA, December 14-17, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TPS-ISA56441.2022}, doi = {10.1109/TPS-ISA56441.2022}, isbn = {978-1-6654-7408-5}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/FerragFHMJ22, author = {Mohamed Amine Ferrag and Othmane Friha and Djallel Hamouda and Leandros A. Maglaras and Helge Janicke}, title = {Edge-IIoTset: {A} New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications: Centralized and Federated Learning}, publisher = {{IEEE} DataPort}, year = {2022}, month = apr, howpublished = {\url{https://doi.org/10.21227/mbc1-1h68}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/mbc1-1h68}, doi = {10.21227/MBC1-1H68}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/FerragFHMJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/JimenezD22, author = {Francisco Jos{\'{e}} Fern{\'{a}}ndez Jim{\'{e}}nez and Jos{\'{e}} Ramiro Martinez de Dios}, title = {Additional material of "A Robot-Sensor Network Security Architecture for Monitoring Applications"}, publisher = {{IEEE} DataPort}, year = {2022}, month = may, howpublished = {\url{https://doi.org/10.21227/62fj-8b04}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/62fj-8b04}, doi = {10.21227/62FJ-8B04}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/JimenezD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/ThomeSBB22, author = {Julian Thom{\'{e}} and Lwin Khin Shar and Domenico Bianculli and Lionel C. Briand}, title = {Benchmark suite for "An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications through Security Slicing and Hybrid Constraint Solving"}, publisher = {{IEEE} DataPort}, year = {2022}, month = may, howpublished = {\url{https://doi.org/10.21227/H2ZQ1N}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/H2ZQ1N}, doi = {10.21227/H2ZQ1N}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/ThomeSBB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-01927, author = {Mahmoud S. Fayed}, title = {Network Generations and the Security Challenge in IoT Applications}, journal = {CoRR}, volume = {abs/2201.01927}, year = {2022}, url = {https://arxiv.org/abs/2201.01927}, eprinttype = {arXiv}, eprint = {2201.01927}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-01927.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-02351, author = {Hampei Sasahara and Henrik Sandberg}, title = {Asymptotic Security using Bayesian Defense Mechanisms with Application to Cyber Deception}, journal = {CoRR}, volume = {abs/2201.02351}, year = {2022}, url = {https://arxiv.org/abs/2201.02351}, eprinttype = {arXiv}, eprint = {2201.02351}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-02351.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-03052, author = {Richard Apaua and Harjinder Singh Lallie}, title = {Measuring User Perceived Security of Mobile Banking Applications}, journal = {CoRR}, volume = {abs/2201.03052}, year = {2022}, url = {https://arxiv.org/abs/2201.03052}, eprinttype = {arXiv}, eprint = {2201.03052}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-03052.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-07417, author = {Nan Sun and Chang{-}Tsun Li and Hin Chan and Ba Dung Le and Md Zahidul Islam and Leo Yu Zhang and Md. Rafiqul Islam and Warren Armstrong}, title = {Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges}, journal = {CoRR}, volume = {abs/2201.07417}, year = {2022}, url = {https://arxiv.org/abs/2201.07417}, eprinttype = {arXiv}, eprint = {2201.07417}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-07417.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-07496, author = {Utsav Banerjee and Anantha P. Chandrakasan}, title = {A Low-Power {BLS12-381} Pairing Crypto-Processor for Internet-of-Things Security Applications}, journal = {CoRR}, volume = {abs/2201.07496}, year = {2022}, url = {https://arxiv.org/abs/2201.07496}, eprinttype = {arXiv}, eprint = {2201.07496}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-07496.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-00582, author = {Shaymaa Abdulla Al{-}Delayel}, title = {Security Analysis of Mobile Banking Application in Qatar}, journal = {CoRR}, volume = {abs/2202.00582}, year = {2022}, url = {https://arxiv.org/abs/2202.00582}, eprinttype = {arXiv}, eprint = {2202.00582}, timestamp = {Wed, 09 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-00582.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-01612, author = {Priyanka Billawa and Anusha Bambhore Tukaram and Nicol{\'{a}}s E. D{\'{\i}}az Ferreyra and Jan{-}Philipp Stegh{\"{o}}fer and Riccardo Scandariato and Georg Simhandl}, title = {Security of Microservice Applications: {A} Practitioners' Perspective on Challenges and Best Practices}, journal = {CoRR}, volume = {abs/2202.01612}, year = {2022}, url = {https://arxiv.org/abs/2202.01612}, eprinttype = {arXiv}, eprint = {2202.01612}, timestamp = {Wed, 09 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-01612.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-12693, author = {Marcos Fa{\'{u}}ndez{-}Zanuy and Jir{\'{\i}} Mekyska and Donato Impedovo}, title = {Online handwriting, signature and touch dynamics: tasks and potential applications in the field of security and health}, journal = {CoRR}, volume = {abs/2202.12693}, year = {2022}, url = {https://arxiv.org/abs/2202.12693}, eprinttype = {arXiv}, eprint = {2202.12693}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-12693.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-12760, author = {Marcos Fa{\'{u}}ndez{-}Zanuy and Julian Fi{\'{e}}rrez and Miguel A. Ferrer and Mois{\'{e}}s D{\'{\i}}az and Ruben Tolosana and R{\'{e}}jean Plamondon}, title = {Handwriting Biometrics: Applications and Future Trends in e-Security and e-Health}, journal = {CoRR}, volume = {abs/2202.12760}, year = {2022}, url = {https://arxiv.org/abs/2202.12760}, eprinttype = {arXiv}, eprint = {2202.12760}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-12760.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-09325, author = {Nitesh Kumar and Gaurav S. Kasbekar and D. Manjunath}, title = {Application of Data Collected by Endpoint Detection and Response Systems for Implementation of a Network Security System based on Zero Trust Principles and the EigenTrust Algorithm}, journal = {CoRR}, volume = {abs/2203.09325}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.09325}, doi = {10.48550/ARXIV.2203.09325}, eprinttype = {arXiv}, eprint = {2203.09325}, timestamp = {Mon, 28 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-09325.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-17215, author = {Jingyi Wang and Cosmin G. Petra}, title = {A simplified nonsmooth nonconvex bundle method with applications to security-constrained {ACOPF} problems}, journal = {CoRR}, volume = {abs/2203.17215}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.17215}, doi = {10.48550/ARXIV.2203.17215}, eprinttype = {arXiv}, eprint = {2203.17215}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-17215.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-04769, author = {Kai Liu and Fei Wang and Zhaoyun Ding and Sheng Liang and Zhengfei Yu and Yun Zhou}, title = {A review of knowledge graph application scenarios in cyber security}, journal = {CoRR}, volume = {abs/2204.04769}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.04769}, doi = {10.48550/ARXIV.2204.04769}, eprinttype = {arXiv}, eprint = {2204.04769}, timestamp = {Wed, 13 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-04769.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-07107, author = {Dr. C. Amuthadevi and Sparsh Srivastava and Raghav Khatoria and Varun Sangwan}, title = {A Study on Web Application Vulnerabilities to find an optimal Security Architecture}, journal = {CoRR}, volume = {abs/2204.07107}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.07107}, doi = {10.48550/ARXIV.2204.07107}, eprinttype = {arXiv}, eprint = {2204.07107}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-07107.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-03746, author = {Mattia Paccamiccio and Leonardo Mostarda}, title = {Reasoning about inter-procedural security requirements in IoT applications}, journal = {CoRR}, volume = {abs/2205.03746}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.03746}, doi = {10.48550/ARXIV.2205.03746}, eprinttype = {arXiv}, eprint = {2205.03746}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-03746.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-00868, author = {Muhammad Sajjad Akbar and Zawar Hussain and Quan Z. Sheng and Subhas Mukhopadhyay}, title = {6G Survey on Challenges, Requirements, Applications, Key Enabling Technologies, Use Cases, {AI} integration issues and Security aspects}, journal = {CoRR}, volume = {abs/2206.00868}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.00868}, doi = {10.48550/ARXIV.2206.00868}, eprinttype = {arXiv}, eprint = {2206.00868}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-00868.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-01041, author = {Gianluca Scopelliti and Sepideh Pouyanrad and Job Noorman and Fritz Alder and Christoph Baumann and Frank Piessens and Jan Tobias M{\"{u}}hlberg}, title = {End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs}, journal = {CoRR}, volume = {abs/2206.01041}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.01041}, doi = {10.48550/ARXIV.2206.01041}, eprinttype = {arXiv}, eprint = {2206.01041}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-01041.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-03930, author = {Sarah Turner and Nandita Pattnaik and Jason R. C. Nurse and Shujun Li}, title = {"You Just Assume It Is In There, {I} Guess": {UK} Families' Application And Knowledge Of Smart Home Cyber Security}, journal = {CoRR}, volume = {abs/2206.03930}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.03930}, doi = {10.48550/ARXIV.2206.03930}, eprinttype = {arXiv}, eprint = {2206.03930}, timestamp = {Tue, 14 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-03930.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-14304, author = {Shilun Li and Zijing Di}, title = {Indistinguishability Obfuscation of Circuits and its Application in Security}, journal = {CoRR}, volume = {abs/2206.14304}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.14304}, doi = {10.48550/ARXIV.2206.14304}, eprinttype = {arXiv}, eprint = {2206.14304}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-14304.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-03209, author = {Sebastian Stock and Atif Mashkoor and Alexander Egyed}, title = {Application of Validation Obligations to Security Concerns}, journal = {CoRR}, volume = {abs/2207.03209}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.03209}, doi = {10.48550/ARXIV.2207.03209}, eprinttype = {arXiv}, eprint = {2207.03209}, timestamp = {Fri, 16 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-03209.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-10809, author = {Hans Dermot Doran}, title = {Security and Safety Aspects of {AI} in Industry Applications}, journal = {CoRR}, volume = {abs/2207.10809}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.10809}, doi = {10.48550/ARXIV.2207.10809}, eprinttype = {arXiv}, eprint = {2207.10809}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-10809.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-10605, author = {Azqa Nadeem and Dani{\"{e}}l Vos and Clinton Cao and Luca Pajola and Simon Dieck and Robert Baumgartner and Sicco Verwer}, title = {SoK: Explainable Machine Learning for Computer Security Applications}, journal = {CoRR}, volume = {abs/2208.10605}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.10605}, doi = {10.48550/ARXIV.2208.10605}, eprinttype = {arXiv}, eprint = {2208.10605}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-10605.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-14937, author = {Zhibo Zhang and Hussam M. N. Al Hamadi and Ernesto Damiani and Chan Yeob Yeun and Fatma Taher}, title = {Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research}, journal = {CoRR}, volume = {abs/2208.14937}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.14937}, doi = {10.48550/ARXIV.2208.14937}, eprinttype = {arXiv}, eprint = {2208.14937}, timestamp = {Thu, 01 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-14937.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-01129, author = {Lesly{-}Ann Daniel and S{\'{e}}bastien Bardin and Tamara Rezk}, title = {Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure}, journal = {CoRR}, volume = {abs/2209.01129}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.01129}, doi = {10.48550/ARXIV.2209.01129}, eprinttype = {arXiv}, eprint = {2209.01129}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-01129.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-03670, author = {Rajendra Kumar Sharma and Ritumoni Sarma and Neha Arora and Vidya Sagar}, title = {Multisecret-sharing scheme with two-level security and its applications in Blockchain}, journal = {CoRR}, volume = {abs/2209.03670}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.03670}, doi = {10.48550/ARXIV.2209.03670}, eprinttype = {arXiv}, eprint = {2209.03670}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-03670.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-03465, author = {Sahitya Yarragolla and Nan Du and Torben Hemke and Xianyue Zhao and Ziang Chen and Ilia Polian and Thomas Mussenbrock}, title = {Physics inspired compact modelling of BiFeO{\textdollar}{\_}3{\textdollar} based memristors for hardware security applications}, journal = {CoRR}, volume = {abs/2210.03465}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.03465}, doi = {10.48550/ARXIV.2210.03465}, eprinttype = {arXiv}, eprint = {2210.03465}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-03465.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-07990, author = {Jiayi Sun and Wensheng Gan and Han{-}Chieh Chao and Philip S. Yu}, title = {Metaverse: Survey, Applications, Security, and Opportunities}, journal = {CoRR}, volume = {abs/2210.07990}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.07990}, doi = {10.48550/ARXIV.2210.07990}, eprinttype = {arXiv}, eprint = {2210.07990}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-07990.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-13547, author = {Subrato Bharati and Prajoy Podder}, title = {Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions}, journal = {CoRR}, volume = {abs/2210.13547}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.13547}, doi = {10.48550/ARXIV.2210.13547}, eprinttype = {arXiv}, eprint = {2210.13547}, timestamp = {Fri, 28 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-13547.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-05565, author = {Mehdi Rafiei and Jenni Raitoharju and Alexandros Iosifidis}, title = {Computer Vision on X-ray Data in Industrial Production and Security Applications: {A} survey}, journal = {CoRR}, volume = {abs/2211.05565}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.05565}, doi = {10.48550/ARXIV.2211.05565}, eprinttype = {arXiv}, eprint = {2211.05565}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-05565.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-06953, author = {Roshan Namal Rajapakse and Mansooreh Zahedi and Muhammad Ali Babar}, title = {Collaborative Application Security Testing for DevSecOps: An Empirical Analysis of Challenges, Best Practices and Tool Support}, journal = {CoRR}, volume = {abs/2211.06953}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.06953}, doi = {10.48550/ARXIV.2211.06953}, eprinttype = {arXiv}, eprint = {2211.06953}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-06953.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-10603, author = {Khaled Sarieddine and Mohammad Ali Sayed and Sadegh Torabi and Ribal Atallah and Chadi Assi}, title = {Investigating the Security of {EV} Charging Mobile Applications As an Attack Surface}, journal = {CoRR}, volume = {abs/2211.10603}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.10603}, doi = {10.48550/ARXIV.2211.10603}, eprinttype = {arXiv}, eprint = {2211.10603}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-10603.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-14115, author = {Tomasz Piotrowski and Matthias Frey and Renato L. G. Cavalcante and Rafail Ismayilov}, title = {Inverse Solvability and Security with Applications to Federated Learning}, journal = {CoRR}, volume = {abs/2211.14115}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.14115}, doi = {10.48550/ARXIV.2211.14115}, eprinttype = {arXiv}, eprint = {2211.14115}, timestamp = {Wed, 30 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-14115.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-15013, author = {Anichur Rahman and Md. Jahidul Islam and Rafiqul Islam and Ayesha Aziz and Dipanjali Kundu and Sadia Sazzad and Md. Razaul Karim and Mahedi Hasan and Ziaur Rahman and Said Elnaffar and Shahab S. Band}, title = {Enhancing Data Security for Cloud Computing Applications through Distributed Blockchain-based {SDN} Architecture in IoT Networks}, journal = {CoRR}, volume = {abs/2211.15013}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.15013}, doi = {10.48550/ARXIV.2211.15013}, eprinttype = {arXiv}, eprint = {2211.15013}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-15013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-00756, author = {Ioannis Vasileios Chremos and Andreas A. Malikopoulos}, title = {Mechanism Design Theory in Control Engineering: {A} Tutorial and Overview of Applications in Communication, Power Grid, Transportation, and Security Systems}, journal = {CoRR}, volume = {abs/2212.00756}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.00756}, doi = {10.48550/ARXIV.2212.00756}, eprinttype = {arXiv}, eprint = {2212.00756}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-00756.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-01905, author = {Maliheh Shirvanian and Sebastian Meiser}, title = {"Tell me, how do you know it's me?" Expectations of security and personalization measures for smart speaker applications}, journal = {CoRR}, volume = {abs/2212.01905}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.01905}, doi = {10.48550/ARXIV.2212.01905}, eprinttype = {arXiv}, eprint = {2212.01905}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-01905.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-06123, author = {Ambra Demontis and Maura Pintor and Luca Demetrio and Kathrin Grosse and Hsiao{-}Ying Lin and Chengfang Fang and Battista Biggio and Fabio Roli}, title = {A Survey on Reinforcement Learning Security with Application to Autonomous Driving}, journal = {CoRR}, volume = {abs/2212.06123}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.06123}, doi = {10.48550/ARXIV.2212.06123}, eprinttype = {arXiv}, eprint = {2212.06123}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-06123.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-13993, author = {Mansoor Ali and Faisal Naeem and Georges Kaddoum and Ekram Hossain}, title = {Metaverse Communications, Networking, Security, and Applications: Research Issues, State-of-the-Art, and Future Directions}, journal = {CoRR}, volume = {abs/2212.13993}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.13993}, doi = {10.48550/ARXIV.2212.13993}, eprinttype = {arXiv}, eprint = {2212.13993}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-13993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlagicBKMS22, author = {Gorjan Alagic and Chen Bai and Jonathan Katz and Christian Majenz and Patrick Struck}, title = {Post-Quantum Security of Tweakable Even-Mansour, and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1097}, year = {2022}, url = {https://eprint.iacr.org/2022/1097}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlagicBKMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndriesMCS22, author = {Stefania Andries and Andrei{-}Daniel Miron and Andrei Cristian and Emil Simion}, title = {A survey on the security protocols employed by mobile messaging applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2022}, url = {https://eprint.iacr.org/2022/088}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AndriesMCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaiLW22, author = {Qiqi Lai and Feng{-}Hao Liu and Zhedong Wang}, title = {New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {779}, year = {2022}, url = {https://eprint.iacr.org/2022/779}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaiLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KibriaRFT22, title = {RTL-FSMx: Fast and Accurate Finite State Machine Extraction at the {RTL} for Security Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1462}, year = {2022}, note = {Withdrawn.}, url = {https://eprint.iacr.org/2022/1462}, timestamp = {Sat, 01 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KibriaRFT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsae/Li22a, title = {Application of Artificial Intelligence Technology in Computer Network Security Communication}, journal = {J. Control. Sci. Eng.}, volume = {2022}, pages = {1--6}, year = {2022}, note = {Withdrawn.}, url = {https://doi.org/10.1155/2022/9785880}, doi = {10.1155/2022/9785880}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocsae/Li22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/WuL22, title = {Application of Symmetric Encryption Algorithm Sensor in the Research of College Student Security Management System}, journal = {J. Sensors}, volume = {2022}, pages = {1--7}, year = {2022}, note = {Withdrawn.}, url = {https://doi.org/10.1155/2022/3323547}, doi = {10.1155/2022/3323547}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/js/WuL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/hal/Dragos21, author = {Valentina Dragos}, title = {Semantic Frameworks to Enhance Situation Awareness for Defence and Security Applications. (D{\'{e}}finition de cadres s{\'{e}}mantiques pour les applications de d{\'{e}}fense et s{\'{e}}curit{\'{e}})}, year = {2021}, url = {https://tel.archives-ouvertes.fr/tel-03347626}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/hal/Dragos21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Azouaoui21, author = {Melissa Azouaoui}, title = {Shortcut side-channel security evaluations: application to elliptic curve cryptography, masking and shuffling}, school = {Catholic University of Louvain, Louvain-la-Neuve, Belgium}, year = {2021}, url = {https://hdl.handle.net/2078.1/254418}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Azouaoui21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Gradolewski21, author = {Dawid Gradolewski}, title = {Sensors and Algorithms in Industry 4.0: Security and Health Preservation Applications}, school = {Blekinge Institute of Technology, Karlskrona, Sweden}, year = {2021}, url = {https://nbn-resolving.org/urn:nbn:se:bth-21387}, urn = {urn:nbn:se:bth-21387}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Gradolewski21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Huang21b, author = {Jie Huang}, title = {Mitigating security and privacy threats from untrusted application components on Android}, school = {Saarland University, Saarbr{\"{u}}cken, Germany}, year = {2021}, url = {https://publikationen.sulb.uni-saarland.de/handle/20.500.11880/34645}, urn = {urn:nbn:de:bsz:291--ds-382920}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/dnb/Huang21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Passino21, author = {Francesco Sanna Passino}, title = {Latent factor representations of dynamic networks with applications in cyber-security}, school = {Imperial College London, {UK}}, year = {2021}, url = {https://doi.org/10.25560/87691}, doi = {10.25560/87691}, timestamp = {Mon, 22 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Passino21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Badier21, author = {Hannah Badier}, title = {Transient obfuscation for {HLS} security: application to cloud security, birthmarking and hardware Trojan defense. (Offuscation transitoire pour la s{\'{e}}curit{\'{e}} {HLS:} application {\`{a}} la s{\'{e}}curit{\'{e}} du cloud, aux filigranes num{\'{e}}riques et {\`{a}} la d{\'{e}}fense contre les virus type chevaux de Troie)}, school = {{\'{E}}cole nationale sup{\'{e}}rieure de techniques avanc{\'{e}}es Bretagne, Brest, France}, year = {2021}, url = {https://tel.archives-ouvertes.fr/tel-03789700}, timestamp = {Wed, 12 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Badier21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Chen21, author = {Huiqin Chen}, title = {Registration of egocentric views for collaborative localization in security applications. (Alignement de vues pour la localisation collaborative dans des applications de s{\'{e}}curit{\'{e}})}, school = {University of Paris-Saclay, France}, year = {2021}, url = {https://tel.archives-ouvertes.fr/tel-03259644}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Chen21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Cherif21, author = {Amina Cherif}, title = {S{\'{e}}curit{\'{e}} des RFIDs actifs et applications. (Security of active {RFID} and applications)}, school = {University of Limoges, France}, year = {2021}, url = {https://tel.archives-ouvertes.fr/tel-03191329}, timestamp = {Wed, 28 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Cherif21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Tayachi21a, author = {Mayssa Tayachi}, title = {S{\'{e}}curit{\'{e}} des images par tatouage num{\'{e}}rique et cryptographie dans les applications m{\'{e}}dicales. (Image security by digital watermarking and cryptography for medical applications)}, school = {Tunis El Manar University, Tunisia}, year = {2021}, url = {https://tel.archives-ouvertes.fr/tel-03659821}, timestamp = {Fri, 27 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Tayachi21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/se/Mahfouzi21, author = {Rouhollah Mahfouzi}, title = {Security-Aware Design of Cyber-Physical Systems for Control Applications}, school = {Link{\"{o}}ping University, Sweden}, year = {2021}, url = {https://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178320}, urn = {urn:nbn:se:liu:diva-178320}, timestamp = {Thu, 01 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/se/Mahfouzi21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AminEAGM21, author = {Mahmoud Amin and Fayez F. M. El{-}Sousy and Ghada A. Abdel Aziz and Khaled Gaber and Osama A. Mohammed}, title = {{CPS} Attacks Mitigation Approaches on Power Electronic Systems With Security Challenges for Smart Grid Applications: {A} Review}, journal = {{IEEE} Access}, volume = {9}, pages = {38571--38601}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3063229}, doi = {10.1109/ACCESS.2021.3063229}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AminEAGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/FerragFMJS21, author = {Mohamed Amine Ferrag and Othmane Friha and Leandros A. Maglaras and Helge Janicke and Lei Shu}, title = {Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis}, journal = {{IEEE} Access}, volume = {9}, pages = {138509--138542}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3118642}, doi = {10.1109/ACCESS.2021.3118642}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/FerragFMJS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HasanISKHHIAAKH21, author = {Mohammad Kamrul Hasan and Shayla Islam and Rossilawati Sulaiman and Sheroz Khan and Aisha Hassan Abdalla Hashim and Shabana Habib and Muhammad Islam and Saleh Alyahya and Musse Mohamed Ahmed and Samar Kamil and Md Arif Hassan}, title = {Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications}, journal = {{IEEE} Access}, volume = {9}, pages = {47731--47742}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3061710}, doi = {10.1109/ACCESS.2021.3061710}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HasanISKHHIAAKH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HeZ21, author = {Ningyu He and Jie Zhu}, title = {A Weighted Partial Domain Adaptation for Acoustic Scene Classification and Its Application in Fiber Optic Security System}, journal = {{IEEE} Access}, volume = {9}, pages = {2244--2250}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2020.3044153}, doi = {10.1109/ACCESS.2020.3044153}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HeZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KaracanS21, author = {Hacer Karacan and Mehmet Sevri}, title = {A Novel Data Augmentation Technique and Deep Learning Model for Web Application Security}, journal = {{IEEE} Access}, volume = {9}, pages = {150781--150797}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3125785}, doi = {10.1109/ACCESS.2021.3125785}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KaracanS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KimCBJK21, author = {Hyo{-}Young Kim and Sung{-}Jin Cho and Seung{-}Jin Baek and Seung{-}Won Jung and Sung{-}Jea Ko}, title = {Learning-Based Image Synthesis for Hazardous Object Detection in X-Ray Security Applications}, journal = {{IEEE} Access}, volume = {9}, pages = {135256--135265}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3116255}, doi = {10.1109/ACCESS.2021.3116255}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KimCBJK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MishraP21, author = {Nivedita Mishra and Sharnil Pandya}, title = {Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: {A} Systematic Review}, journal = {{IEEE} Access}, volume = {9}, pages = {59353--59377}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3073408}, doi = {10.1109/ACCESS.2021.3073408}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MishraP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MofidMMF21, author = {Omid Mofid and Mahdi Momeni and Saleh Mobayen and Afef Fekih}, title = {A Disturbance-Observer-Based Sliding Mode Control for the Robust Synchronization of Uncertain Delayed Chaotic Systems: Application to Data Security}, journal = {{IEEE} Access}, volume = {9}, pages = {16546--16555}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3053014}, doi = {10.1109/ACCESS.2021.3053014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MofidMMF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Morales-Sandoval21, author = {Miguel Morales{-}Sandoval and Ricardo De{-}La{-}Parra{-}Aguirre and Hiram Galeana{-}Zapi{\'{e}}n and Alejandro Galaviz{-}Mosqueda}, title = {A Three-Tier Approach for Lightweight Data Security of Body Area Networks in E-Health Applications}, journal = {{IEEE} Access}, volume = {9}, pages = {146350--146365}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3123456}, doi = {10.1109/ACCESS.2021.3123456}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/Morales-Sandoval21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SonmezK21, author = {Ferda {\"{O}}zdemir S{\"{o}}nmez and Banu G{\"{u}}nel Kili{\c{c}}}, title = {Holistic Web Application Security Visualization for Multi-Project and Multi-Phase Dynamic Application Security Test Results}, journal = {{IEEE} Access}, volume = {9}, pages = {25858--25884}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3057044}, doi = {10.1109/ACCESS.2021.3057044}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SonmezK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SonmezK21a, author = {Ferda {\"{O}}zdemir S{\"{o}}nmez and Banu G{\"{u}}nel Kili{\c{c}}}, title = {Reusable Security Requirements Repository Implementation Based on Application/System Components}, journal = {{IEEE} Access}, volume = {9}, pages = {165966--165988}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3133020}, doi = {10.1109/ACCESS.2021.3133020}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/SonmezK21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZahidTAAHMF21, author = {Amjad Hussain Zahid and Lo'ai Tawalbeh and Musheer Ahmad and Ahmed Alkhayyat and Malik Tahir Hassan and Atif Manzoor and Alaa Kadhim Farhan}, title = {Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications}, journal = {{IEEE} Access}, volume = {9}, pages = {98460--98475}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3095618}, doi = {10.1109/ACCESS.2021.3095618}, timestamp = {Wed, 04 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZahidTAAHMF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/accs/KassenovMT21, author = {Adil A. Kassenov and Alexey Anatolievich Magazev and Valeria Fedorovna Tsyrulnik}, title = {Markov Model of Nonmutually Exclusive Cyberthreats and Its Applications for Selecting an Optimal Set of Information Security Tools}, journal = {Autom. Control. Comput. Sci.}, volume = {55}, number = {7}, pages = {623--635}, year = {2021}, url = {https://doi.org/10.3103/S0146411621070075}, doi = {10.3103/S0146411621070075}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/accs/KassenovMT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aisy/LvLG21, author = {Shiya Lv and Jian Liu and Zhaoxin Geng}, title = {Application of Memristors in Hardware Security: {A} Current State-of-the-Art Technology}, journal = {Adv. Intell. Syst.}, volume = {3}, number = {1}, pages = {2000127}, year = {2021}, url = {https://doi.org/10.1002/aisy.202000127}, doi = {10.1002/AISY.202000127}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aisy/LvLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithms/StodtSRGWS21, author = {Jan Stodt and Daniel Sch{\"{o}}nle and Christoph Reich and Fatemeh Ghovanlooy Ghajar and Dominik Welte and Axel Sikora}, title = {Security Audit of a Blockchain-Based Industrial Application Platform}, journal = {Algorithms}, volume = {14}, number = {4}, pages = {121}, year = {2021}, url = {https://doi.org/10.3390/a14040121}, doi = {10.3390/A14040121}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithms/StodtSRGWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/behaviourIT/ChassidimPTL21, author = {Hadas Chassidim and Christos Perentis and Eran Toch and Bruno Lepri}, title = {Between privacy and security: the factors that drive intentions to use cyber-security applications}, journal = {Behav. Inf. Technol.}, volume = {40}, number = {16}, pages = {1769--1783}, year = {2021}, url = {https://doi.org/10.1080/0144929x.2020.1781259}, doi = {10.1080/0144929X.2020.1781259}, timestamp = {Thu, 10 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/behaviourIT/ChassidimPTL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/AledhariRP21, author = {Mohammed Aledhari and Rehma Razzak and Reza M. Parizi}, title = {Machine learning for network application security: Empirical evaluation and optimization}, journal = {Comput. Electr. Eng.}, volume = {91}, pages = {107052}, year = {2021}, url = {https://doi.org/10.1016/j.compeleceng.2021.107052}, doi = {10.1016/J.COMPELECENG.2021.107052}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/AledhariRP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/BaldiniGGD21, author = {Gianmarco Baldini and Raimondo Giuliani and Monica Gemo and Franc Dimc}, title = {On the application of sensor authentication with intrinsic physical features to vehicle security}, journal = {Comput. Electr. Eng.}, volume = {91}, pages = {107053}, year = {2021}, url = {https://doi.org/10.1016/j.compeleceng.2021.107053}, doi = {10.1016/J.COMPELECENG.2021.107053}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/BaldiniGGD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/BhushanSSJ21, author = {Bharat Bhushan and Preeti Sinha and Kulandairaj Martin Sagayam and J. Andrew Onesimu}, title = {Untangling blockchain technology: {A} survey on state of the art, security threats, privacy services, applications and future research directions}, journal = {Comput. Electr. Eng.}, volume = {90}, pages = {106897}, year = {2021}, url = {https://doi.org/10.1016/j.compeleceng.2020.106897}, doi = {10.1016/J.COMPELECENG.2020.106897}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/BhushanSSJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/Cabal-YepezLBA21, author = {Eduardo Cabal{-}Yepez and Luis Manuel Ledesma{-}Carrillo and Guillermo Botella and Irene Amerini}, title = {Introduction to the special section on image processing in security applications (VSI-ipsa)}, journal = {Comput. Electr. Eng.}, volume = {89}, pages = {106935}, year = {2021}, url = {https://doi.org/10.1016/j.compeleceng.2020.106935}, doi = {10.1016/J.COMPELECENG.2020.106935}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/Cabal-YepezLBA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/ChooDK21, author = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Hadis Karimipour}, title = {Introduction to the special section on application of artificial intelligence in security of cyber physical systems (VSI-aicps)}, journal = {Comput. Electr. Eng.}, volume = {92}, pages = {107145}, year = {2021}, url = {https://doi.org/10.1016/j.compeleceng.2021.107145}, doi = {10.1016/J.COMPELECENG.2021.107145}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/ChooDK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BrotsisLBKS21, author = {Sotirios Brotsis and Konstantinos Limniotis and Gueltoum Bendiab and Nicholas Kolokotronis and Stavros Shiaeles}, title = {On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance}, journal = {Comput. Networks}, volume = {191}, pages = {108005}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.108005}, doi = {10.1016/J.COMNET.2021.108005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BrotsisLBKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cogcom/Faundez-ZanuyMI21, author = {Marcos Fa{\'{u}}ndez{-}Zanuy and Jir{\'{\i}} Mekyska and Donato Impedovo}, title = {Online Handwriting, Signature and Touch Dynamics: Tasks and Potential Applications in the Field of Security and Health}, journal = {Cogn. Comput.}, volume = {13}, number = {5}, pages = {1406--1421}, year = {2021}, url = {https://doi.org/10.1007/s12559-021-09938-2}, doi = {10.1007/S12559-021-09938-2}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cogcom/Faundez-ZanuyMI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computation/Munoz-AusechaRR21, author = {Cesar Munoz{-}Ausecha and Juan Ruiz{-}Rosero and Gustavo{-}Adolfo Ram{\'{\i}}rez{-}Gonz{\'{a}}lez}, title = {{RFID} Applications and Security Review}, journal = {Comput.}, volume = {9}, number = {6}, pages = {69}, year = {2021}, url = {https://doi.org/10.3390/computation9060069}, doi = {10.3390/COMPUTATION9060069}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computation/Munoz-AusechaRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChernyshevBZ21, author = {Maxim Chernyshev and Zubair Ahmed Baig and Sherali Zeadally}, title = {Cloud-Native Application Security: Risks, Opportunities, and Challenges in Securing the Evolving Attack Surface}, journal = {Computer}, volume = {54}, number = {11}, pages = {47--57}, year = {2021}, url = {https://doi.org/10.1109/MC.2021.3076537}, doi = {10.1109/MC.2021.3076537}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ChernyshevBZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/HuAZ21, author = {Qinwen Hu and Muhammad Rizwan Asghar and Sherali Zeadally}, title = {Blockchain-based public ecosystem for auditing security of software applications}, journal = {Computing}, volume = {103}, number = {11}, pages = {2643--2665}, year = {2021}, url = {https://doi.org/10.1007/s00607-021-00954-6}, doi = {10.1007/S00607-021-00954-6}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/HuAZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/CaproluSP21, author = {Maurantonio Caprolu and Savio Sciancalepore and Roberto Di Pietro}, title = {Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {23}, number = {1}, pages = {311--340}, year = {2021}, url = {https://doi.org/10.1109/COMST.2020.2969030}, doi = {10.1109/COMST.2020.2969030}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/CaproluSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ChenYC21, author = {Hsing{-}Chung Chen and Wei{-}Ju Yang and Chao{-}Lung Chou}, title = {An online cognitive authentication and trust evaluation application programming interface for cognitive security gateway based on distributed massive Internet of Things network}, journal = {Concurr. Comput. Pract. Exp.}, volume = {33}, number = {19}, year = {2021}, url = {https://doi.org/10.1002/cpe.6128}, doi = {10.1002/CPE.6128}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/ChenYC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/OgielaLF21, author = {Lidia Ogiela and Fang{-}Yie Leu and Ugo Fiore}, title = {Transformative computing in security, big data analysis, and cloud computing applications}, journal = {Concurr. Comput. Pract. Exp.}, volume = {33}, number = {23}, year = {2021}, url = {https://doi.org/10.1002/cpe.6654}, doi = {10.1002/CPE.6654}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/OgielaLF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csm/AmanJS21, author = {Muhammad Naveed Aman and Uzair Javaid and Biplab Sikdar}, title = {Security Function Virtualization for IoT Applications in 6G Networks}, journal = {{IEEE} Commun. Stand. Mag.}, volume = {5}, number = {3}, pages = {90--95}, year = {2021}, url = {https://doi.org/10.1109/MCOMSTD.201.2100023}, doi = {10.1109/MCOMSTD.201.2100023}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csm/AmanJS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/AliCP20, author = {Isra Mohamed Ali and Maurantonio Caprolu and Roberto Di Pietro}, title = {Foundations, Properties, and Security Applications of Puzzles: {A} Survey}, journal = {{ACM} Comput. Surv.}, volume = {53}, number = {4}, pages = {72:1--72:38}, year = {2021}, url = {https://doi.org/10.1145/3396374}, doi = {10.1145/3396374}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/AliCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/KhanPGLM20, author = {Saad Khan and Simon Parkinson and Liam Grant and Na Liu and Stephen McGuire}, title = {Biometric Systems Utilising Health Data from Wearable Devices: Applications and Future Challenges in Computer Security}, journal = {{ACM} Comput. Surv.}, volume = {53}, number = {4}, pages = {85:1--85:29}, year = {2021}, url = {https://doi.org/10.1145/3400030}, doi = {10.1145/3400030}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/KhanPGLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eInformatica/KlotinsUCGPTP21, author = {Eriks Klotins and Michael Unterkalmsteiner and Panagiota Chatzipetrou and Tony Gorschek and Rafael Prikladnicki and Nirnaya Tripathi and Leandro Bento Pompermaier}, title = {SIoT Framework: Towards an Approach for Early Identification of Security Requirements for Internet-of-things Applications}, journal = {e Informatica Softw. Eng. J.}, volume = {15}, number = {1}, year = {2021}, url = {https://doi.org/10.37190/e-inf210103}, doi = {10.37190/E-INF210103}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eInformatica/KlotinsUCGPTP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/GuoYL21, author = {Yi Guo and Jianfang Yang and Baolong Liu}, title = {Application of chaotic encryption algorithm based on variable parameters in {RFID} security}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2021}, number = {1}, pages = {155}, year = {2021}, url = {https://doi.org/10.1186/s13638-021-02023-0}, doi = {10.1186/S13638-021-02023-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/GuoYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/GhosalMHS21, author = {Sudipta Kumar Ghosal and Souradeep Mukhopadhyay and S. K. Sabbir Hossain and Ram Sarkar}, title = {Application of Lah transform for security and privacy of data through information hiding in telecommunication}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {32}, number = {2}, year = {2021}, url = {https://doi.org/10.1002/ett.3984}, doi = {10.1002/ETT.3984}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/GhosalMHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/LatifIHA21, author = {Shahid Latif and Zeba Idrees and Zil E. Huma and Jawad Ahmad}, title = {Blockchain technology for the industrial Internet of Things: {A} comprehensive survey on security challenges, architectures, applications, and future research directions}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {32}, number = {11}, year = {2021}, url = {https://doi.org/10.1002/ett.4337}, doi = {10.1002/ETT.4337}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/LatifIHA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/YadavKK21, author = {Poonam Yadav and Sandeep Kumar and Rajesh Kumar}, title = {A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challenges}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {32}, number = {9}, year = {2021}, url = {https://doi.org/10.1002/ett.4270}, doi = {10.1002/ETT.4270}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/YadavKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/evi/PadmajaS21, author = {K. Padmaja and R. Seshadri}, title = {Analytics on real time security attacks in healthcare, retail and banking applications in the cloud}, journal = {Evol. Intell.}, volume = {14}, number = {2}, pages = {595--605}, year = {2021}, url = {https://doi.org/10.1007/s12065-019-00337-z}, doi = {10.1007/S12065-019-00337-Z}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/evi/PadmajaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/evi/ShendeD21, author = {Priti Shende and Yogesh Dandawate}, title = {Convolutional neural network-based feature extraction using multimodal for high security application}, journal = {Evol. Intell.}, volume = {14}, number = {2}, pages = {1023--1033}, year = {2021}, url = {https://doi.org/10.1007/s12065-020-00522-5}, doi = {10.1007/S12065-020-00522-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/evi/ShendeD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaacs/LiWP21, author = {Xuhong Li and Guan Wang and Wenwen Pan}, title = {Research on the application of data encryption technology in communication security}, journal = {Int. J. Auton. Adapt. Commun. Syst.}, volume = {14}, number = {1/2}, pages = {213--230}, year = {2021}, url = {https://doi.org/10.1504/IJAACS.2021.114289}, doi = {10.1504/IJAACS.2021.114289}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaacs/LiWP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaec/Boutekkouk21a, author = {Fateh Boutekkouk}, title = {Application of a Fuzzy {MCDM} Method to Select the Best Operating System for an Efficient Security-Aware Design of Embedded Systems}, journal = {Int. J. Appl. Evol. Comput.}, volume = {12}, number = {3}, pages = {1--20}, year = {2021}, url = {https://doi.org/10.4018/IJAEC.2021070101}, doi = {10.4018/IJAEC.2021070101}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaec/Boutekkouk21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbis/DubeM21, author = {Durga Prasad Dube and R. P. Mohanty}, title = {The application of cyber security capability maturity model to identify the impact of internal efficiency factors on the external effectiveness of cyber security}, journal = {Int. J. Bus. Inf. Syst.}, volume = {38}, number = {3}, pages = {367--392}, year = {2021}, url = {https://doi.org/10.1504/IJBIS.2021.119431}, doi = {10.1504/IJBIS.2021.119431}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbis/DubeM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcini/LiWSGCW21, author = {Yuehua Li and Chengcheng Wang and Jiahao Sun and Zhijin Guan and Jiaqing Chen and Zelin Wang}, title = {Research and Application of Encryption System Based on Quantum Circuit for Mobile Internet Security}, journal = {Int. J. Cogn. Informatics Nat. Intell.}, volume = {15}, number = {4}, pages = {1--17}, year = {2021}, url = {https://doi.org/10.4018/ijcini.20211001.oa26}, doi = {10.4018/IJCINI.20211001.OA26}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcini/LiWSGCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcmcst/FineKR21, author = {Benjamin Fine and Martin Kreuzer and Gerhard Rosenberger}, title = {Further potential applications of group theory in information security}, journal = {Int. J. Comput. Math. Comput. Syst. Theory}, volume = {6}, number = {4}, pages = {375--380}, year = {2021}, url = {https://doi.org/10.1080/23799927.2021.1931455}, doi = {10.1080/23799927.2021.1931455}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcmcst/FineKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/SharmaKAS21, author = {Sparsh Sharma and Ajay Kaul and Suhaib Ahmed and Surbhi Sharma}, title = {A detailed tutorial survey on VANETs: Emerging architectures, applications, security issues, and solutions}, journal = {Int. J. Commun. Syst.}, volume = {34}, number = {14}, year = {2021}, url = {https://doi.org/10.1002/dac.4905}, doi = {10.1002/DAC.4905}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/SharmaKAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcse/MarulliBM21, author = {Fiammetta Marulli and Emanuele Bellini and Stefano Marrone}, title = {On managing security in smart e-health applications}, journal = {Int. J. Comput. Sci. Eng.}, volume = {24}, number = {6}, pages = {639--652}, year = {2021}, url = {https://doi.org/10.1504/IJCSE.2021.119989}, doi = {10.1504/IJCSE.2021.119989}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcse/MarulliBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcvip/SoualmiAL21, author = {Abdallah Soualmi and Adel Alti and Lamri Laouamer}, title = {Multiple Blind Watermarking Framework for Security and Integrity of Medical Images in E-Health Applications}, journal = {Int. J. Comput. Vis. Image Process.}, volume = {11}, number = {1}, pages = {1--16}, year = {2021}, url = {https://doi.org/10.4018/IJCVIP.2021010101}, doi = {10.4018/IJCVIP.2021010101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcvip/SoualmiAL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/RussoVAM21, author = {Enrico Russo and Luca Verderame and Alessandro Armando and Alessio Merlo}, title = {{DIOXIN:} runtime security policy enforcement of fog applications}, journal = {Int. J. Grid Util. Comput.}, volume = {12}, number = {2}, pages = {126--138}, year = {2021}, url = {https://doi.org/10.1504/IJGUC.2021.114821}, doi = {10.1504/IJGUC.2021.114821}, timestamp = {Tue, 25 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/RussoVAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijim/AbozeidAE21, author = {Amr Abd Elawed Abozeid and AbdAllah A. AlHabshy and Kamal A. ElDahshan}, title = {A Software Security Optimization Architecture (SoSOA) and its Adaptation for Mobile Applications}, journal = {Int. J. Interact. Mob. Technol.}, volume = {15}, number = {11}, pages = {148}, year = {2021}, url = {https://doi.org/10.3991/ijim.v15i11.20133}, doi = {10.3991/IJIM.V15I11.20133}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijim/AbozeidAE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijim/HammoudehAAA21, author = {Mohammad Ali A. Hammoudeh and Ali Alobaid and Ali Alwabli and Faris Alabdulmunim}, title = {The Study on Assessment of Security Web Applications}, journal = {Int. J. Interact. Mob. Technol.}, volume = {15}, number = {23}, pages = {120--135}, year = {2021}, url = {https://doi.org/10.3991/ijim.v15i23.27357}, doi = {10.3991/IJIM.V15I23.27357}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijim/HammoudehAAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijim/MonalisaHFIM21, author = {Natasha Tanzila Monalisa and Shinthi Tasnim Himi and Nayeema Ferdous and Md. Ezharul Islam and Anup Majumder}, title = {"SuperWomen": {A} Smart Mobile Application for Social Security focusing Threats and Supports for Women}, journal = {Int. J. Interact. Mob. Technol.}, volume = {15}, number = {3}, pages = {97--112}, year = {2021}, url = {https://doi.org/10.3991/ijim.v15i03.17555}, doi = {10.3991/IJIM.V15I03.17555}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijim/MonalisaHFIM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijim/Reshan21, author = {Mana Saleh Al Reshan}, title = {IoT-based Application of Information Security Triad}, journal = {Int. J. Interact. Mob. Technol.}, volume = {15}, number = {24}, pages = {61--76}, year = {2021}, url = {https://doi.org/10.3991/ijim.v15i24.27333}, doi = {10.3991/IJIM.V15I24.27333}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijim/Reshan21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/ZhaoWWG21, author = {Mengwei Zhao and Guiwu Wei and Cun Wei and Yanfeng Guo}, title = {{CPT-TODIM} method for bipolar fuzzy multi-attribute group decision making and its application to network security service provider selection}, journal = {Int. J. Intell. Syst.}, volume = {36}, number = {5}, pages = {1943--1969}, year = {2021}, url = {https://doi.org/10.1002/int.22367}, doi = {10.1002/INT.22367}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/ZhaoWWG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/Elmorshidy21, author = {Ahmed Elmorshidy}, title = {M-Commerce Security: Assessing the Value of Mobile Applications Used in Controlling Internet Security Cameras at Home and Office - An Empirical Study}, journal = {Int. J. Inf. Secur. Priv.}, volume = {15}, number = {4}, pages = {79--97}, year = {2021}, url = {https://doi.org/10.4018/IJISP.2021100105}, doi = {10.4018/IJISP.2021100105}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisp/Elmorshidy21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijista/MattosMPFMMA21, author = {Diogo Menezes Ferrazani Mattos and Dianne Scherly Varela de Medeiros and Diego G. Passos and Natalia Castro Fernandes and D{\'{e}}bora Christina Muchaluat{-}Saade and Igor Monteiro Moraes and C{\'{e}}lio Vinicius N. de Albuquerque}, title = {Blockchain for smart grid security: applications, trends, and challenges}, journal = {Int. J. Intell. Syst. Technol. Appl.}, volume = {20}, number = {4}, pages = {296--309}, year = {2021}, url = {https://doi.org/10.1504/IJISTA.2021.121323}, doi = {10.1504/IJISTA.2021.121323}, timestamp = {Tue, 23 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijista/MattosMPFMMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/GranaLMHQC21, author = {Manuel Gra{\~{n}}a and Jos{\'{e}} Manuel L{\'{o}}pez{-}Guede and Jos{\'{e}} Ant{\'{o}}nio S{\'{a}}ez Mu{\~{n}}oz and {\'{A}}lvaro Herrero and H{\'{e}}ctor Quinti{\'{a}}n and Emilio Corchado}, title = {Special issue {SOCO-CISIS} 2018: New trends in soft computing and computational intelligence in security and its application in industrial and environmental problems}, journal = {Neurocomputing}, volume = {452}, pages = {414--415}, year = {2021}, url = {https://doi.org/10.1016/j.neucom.2020.09.058}, doi = {10.1016/J.NEUCOM.2020.09.058}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/GranaLMHQC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/Olvera-Martinez21, author = {L. Olvera{-}Martinez and T. Jimenez{-}Borgonio and T. Frias{-}Carmona and M. Abarca{-}Rodriguez and C. Diaz{-}Rodriguez and Manuel Cedillo{-}Hernandez and Mariko Nakano{-}Miyatake and H{\'{e}}ctor P{\'{e}}rez{-}Meana}, title = {First {SN} {P} visual cryptographic circuit with astrocyte control of structural plasticity for security applications}, journal = {Neurocomputing}, volume = {457}, pages = {67--73}, year = {2021}, url = {https://doi.org/10.1016/j.neucom.2021.05.057}, doi = {10.1016/J.NEUCOM.2021.05.057}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/Olvera-Martinez21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwin/AnanthiJ21, author = {J. Vijitha Ananthi and P. Subha Hency Jose}, title = {A Perspective Review of Security Challenges in Body Area Networks for Healthcare Applications}, journal = {Int. J. Wirel. Inf. Networks}, volume = {28}, number = {4}, pages = {451--466}, year = {2021}, url = {https://doi.org/10.1007/s10776-021-00538-3}, doi = {10.1007/S10776-021-00538-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwin/AnanthiJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/JingFHQ21, author = {Jing Wang and Fangfang Liu and Hongyan Liu and Qingqing Wang}, title = {Application of deep learning in network security fault diagnosis and prediction}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {20}, number = {4}, pages = {381--389}, year = {2021}, url = {https://doi.org/10.1504/IJWMC.2021.117570}, doi = {10.1504/IJWMC.2021.117570}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijwmc/JingFHQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/LaverdiereJM21, author = {Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and Karl Julien and Ettore Merlo}, title = {{RBAC} protection-impacting changes identification: {A} case study of the security evolution of two {PHP} applications}, journal = {Inf. Softw. Technol.}, volume = {139}, pages = {106630}, year = {2021}, url = {https://doi.org/10.1016/j.infsof.2021.106630}, doi = {10.1016/J.INFSOF.2021.106630}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/LaverdiereJM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/BhuiyanRBS21, author = {Mohammad Nuruzzaman Bhuiyan and Md. Mahbubur Rahman and Md Masum Billah and Dipanita Saha}, title = {Internet of Things (IoT): {A} Review of Its Enabling Technologies in Healthcare Applications, Standards Protocols, Security, and Market Opportunities}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {13}, pages = {10474--10498}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2021.3062630}, doi = {10.1109/JIOT.2021.3062630}, timestamp = {Fri, 20 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/BhuiyanRBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HassijaCGJG21, author = {Vikas Hassija and Vinay Chamola and Vatsal Gupta and Sarthak Jain and Nadra Guizani}, title = {A Survey on Supply Chain Security: Application Areas, Security Threats, and Solution Architectures}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {8}, pages = {6222--6246}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3025775}, doi = {10.1109/JIOT.2020.3025775}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/HassijaCGJG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiCCMM21, author = {Xinghua Li and Ting Chen and Qingfeng Cheng and Siqi Ma and Jianfeng Ma}, title = {Smart Applications in Edge Computing: Overview on Authentication and Data Security}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {6}, pages = {4063--4080}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3019297}, doi = {10.1109/JIOT.2020.3019297}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiCCMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotm/LiSZ21, author = {Weiwei Li and Zhou Su and Kuan Zhang}, title = {Security Solutions for IoT-Enabled Applications Against the Disease Pandemic}, journal = {{IEEE} Internet Things Mag.}, volume = {4}, number = {4}, pages = {100--106}, year = {2021}, url = {https://doi.org/10.1109/IOTM.001.2100056}, doi = {10.1109/IOTM.001.2100056}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotm/LiSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/AlbulayhiI21, author = {Mohammed S. Albulayhi and Dina M. Ibrahim}, title = {Open Web Application Security Project Components with Known Vulnerabilities: {A} Comprehensive Study}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {13}, number = {3}, pages = {59--67}, year = {2021}, url = {https://doi.org/10.22042/isecure.2021.0.0.0}, doi = {10.22042/ISECURE.2021.0.0.0}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/AlbulayhiI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AhmadKAKC21a, author = {Khaleel Ahmad and Afsar Kamal and Khairol Amali Bin Ahmad and Manju Khari and Rub{\'{e}}n Gonz{\'{a}}lez Crespo}, title = {Corrigendum to Fast hybrid-MixNet for security and privacy using {NTRU} algorithm: [Journal of Information Security and Applications, Volume 60, August 2021, Start page-End page/102872]}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102917}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102917}, doi = {10.1016/J.JISA.2021.102917}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AhmadKAKC21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HusseinSMO21, title = {Retraction notice to "A Hybrid Security Strategy {(HS2)} for Reliable Video Streaming in Fog Computing" Journal of Information Security and Applications 51 {(2020)} 102412}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102807}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102807}, doi = {10.1016/J.JISA.2021.102807}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HusseinSMO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VijayI21, author = {M. Vijay and G. Indumathi}, title = {Deep belief network-based hybrid model for multimodal biometric system for futuristic security applications}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102707}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102707}, doi = {10.1016/J.JISA.2020.102707}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/VijayI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/RoyRBB21, author = {Siddhartha Roy and Saptarshi Roy and Arpita Biswas and Krishna Lal Baishnab}, title = {{LCB:} Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained {IOT} Security Applications}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {15}, number = {11}, pages = {4122--4144}, year = {2021}, url = {https://doi.org/10.3837/tiis.2021.11.014}, doi = {10.3837/TIIS.2021.11.014}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/RoyRBB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jamia/TangariISIKB21, author = {Gioacchino Tangari and Muhammad Ikram and I Wayan Budi Sentana and Kiran Ijaz and Mohamed Ali K{\^{a}}afar and Shlomo Berkovsky}, title = {Analyzing security issues of android mobile health and medical applications}, journal = {J. Am. Medical Informatics Assoc.}, volume = {28}, number = {10}, pages = {2074--2084}, year = {2021}, url = {https://doi.org/10.1093/jamia/ocab131}, doi = {10.1093/JAMIA/OCAB131}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jamia/TangariISIKB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbcs/OliveiraMS21, author = {Mateus de Oliveira and Adriana Prest Mattedi and Rodrigo Duarte Seabra}, title = {Usability evaluation model of an application with emphasis on collaborative security: an approach from social dimensions}, journal = {J. Braz. Comput. Soc.}, volume = {27}, number = {1}, pages = {3}, year = {2021}, url = {https://doi.org/10.1186/s13173-021-00108-8}, doi = {10.1186/S13173-021-00108-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jbcs/OliveiraMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbd/AfizaMHWZIRS21, author = {Mat Razali Noor Afiza and Nur Atiqah Malizan and Nor Asiakin Hasbullah and Muslihah Wook and Norulzahrah Mohd Zainuddin and Khairul Khalil Ishak and Suzaimah Ramli and Sazali Sukardi}, title = {Opinion mining for national security: techniques, domain applications, challenges and research opportunities}, journal = {J. Big Data}, volume = {8}, number = {1}, pages = {150}, year = {2021}, url = {https://doi.org/10.1186/s40537-021-00536-5}, doi = {10.1186/S40537-021-00536-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jbd/AfizaMHWZIRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbi/ArshadAKP21, author = {Saadia Arshad and Junaid Arshad and Muhammad Mubashir Khan and Simon Parkinson}, title = {Analysis of security and privacy challenges for DNA-genomics applications and databases}, journal = {J. Biomed. Informatics}, volume = {119}, pages = {103815}, year = {2021}, url = {https://doi.org/10.1016/j.jbi.2021.103815}, doi = {10.1016/J.JBI.2021.103815}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jbi/ArshadAKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LiS0RKP21, author = {Guangjun Li and Preetpal Sharma and Lei Pan and Sutharshan Rajasegarar and Chandan K. Karmakar and Nicholas Charles Patterson}, title = {Deep learning algorithms for cyber security applications: {A} survey}, journal = {J. Comput. Secur.}, volume = {29}, number = {5}, pages = {447--471}, year = {2021}, url = {https://doi.org/10.3233/JCS-200095}, doi = {10.3233/JCS-200095}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LiS0RKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/UganyaV21, author = {G. Uganya and N. Vijayaraj}, title = {A Survey on Internet of Things: Applications, Recent Issues, Attacks, and Security Mechanisms}, journal = {J. Circuits Syst. Comput.}, volume = {30}, number = {5}, pages = {2130006:1--2130006:46}, year = {2021}, url = {https://doi.org/10.1142/S0218126621300063}, doi = {10.1142/S0218126621300063}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/UganyaV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/NicholasSJWS21, author = {Geraldine Shirley Nicholas and Ali Shuja Siddiqui and Sam Reji Joseph and Gregory Williams and Fareena Saqib}, title = {A Secure Boot Framework with Multi-security Features and Logic-Locking Applications for Reconfigurable Logic}, journal = {J. Hardw. Syst. Secur.}, volume = {5}, number = {3}, pages = {260--268}, year = {2021}, url = {https://doi.org/10.1007/s41635-021-00123-3}, doi = {10.1007/S41635-021-00123-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/NicholasSJWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jices/GhandourSS21, author = {Ahmad Ghandour and Viktor Shestak and Konstantin Sokolovskiy}, title = {Security and privacy of adolescents in social applications and networks: legislative aspects and legal practice of countering cyberbullying on example of developed and developing countries}, journal = {J. Inf. Commun. Ethics Soc.}, volume = {19}, number = {4}, pages = {433--445}, year = {2021}, url = {https://doi.org/10.1108/JICES-09-2020-0101}, doi = {10.1108/JICES-09-2020-0101}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jices/GhandourSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jikm/AhmedK21, author = {Mohammed Imtyaz Ahmed and G. Kannan}, title = {Cloud-Based Remote {RFID} Authentication for Security of Smart Internet of Things Applications}, journal = {J. Inf. Knowl. Manag.}, volume = {20}, number = {Supplement-1}, pages = {2140004:1--2140004:20}, year = {2021}, url = {https://doi.org/10.1142/S0219649221400049}, doi = {10.1142/S0219649221400049}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jikm/AhmedK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmihi/RajakumaranR21, author = {M. Rajakumaran and S. Ramabalan}, title = {Security for the Networked Robot Operating System for Biomedical Applications}, journal = {J. Medical Imaging Health Informatics}, volume = {11}, number = {12}, pages = {2937--2949}, year = {2021}, url = {https://doi.org/10.1166/jmihi.2021.3878}, doi = {10.1166/JMIHI.2021.3878}, timestamp = {Tue, 30 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmihi/RajakumaranR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmihi/WuX21, author = {Xiang Wu and Kaijian Xia}, title = {A Special Section on The Development and Application of Medical Data Processing and Security Sharing Technology}, journal = {J. Medical Imaging Health Informatics}, volume = {11}, number = {3}, pages = {869--870}, year = {2021}, url = {https://doi.org/10.1166/jmihi.2021.3409}, doi = {10.1166/JMIHI.2021.3409}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmihi/WuX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AmanHSAAL21, author = {Azana Hafizah Mohd Aman and Wan Haslina Hassan and Shilan Sameen and Zainab Senan Attarbashi and Mojtaba Alizadeh and Liza Abdul Latiff}, title = {IoMT amid {COVID-19} pandemic: Application, architecture, technology, and security}, journal = {J. Netw. Comput. Appl.}, volume = {174}, pages = {102886}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2020.102886}, doi = {10.1016/J.JNCA.2020.102886}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AmanHSAAL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/LabordeBWOB21, author = {Romain Laborde and Sravani Teja Bulusu and Ahmad Samer Wazan and Arnaud Oglaza and Abdelmalek Benzekri}, title = {A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the {IREHDO2} Project Context}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {3}, pages = {422--452}, year = {2021}, url = {https://doi.org/10.3390/jcp1030022}, doi = {10.3390/JCP1030022}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/LabordeBWOB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jois/ZhuGAAM21, author = {Yongkuan Zhu and Gurjot Singh Gaba and Fahad M. Almansour and Roobaea Alroobaea and Mehedi Masud}, title = {Application of data mining technology in detecting network intrusion and security maintenance}, journal = {J. Intell. Syst.}, volume = {30}, number = {1}, pages = {664--676}, year = {2021}, url = {https://doi.org/10.1515/jisys-2020-0146}, doi = {10.1515/JISYS-2020-0146}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jois/ZhuGAAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/SinghLSS21, author = {Akansha Singh and Ping Li and Krishna Kant Singh and Vijayalakshmi Saravana}, title = {Real-time intelligent image processing for security applications}, journal = {J. Real Time Image Process.}, volume = {18}, number = {5}, pages = {1787--1788}, year = {2021}, url = {https://doi.org/10.1007/s11554-021-01169-w}, doi = {10.1007/S11554-021-01169-W}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jrtip/SinghLSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/WangMSSGMB21, author = {Yajing Wang and Juan Ma and Ashutosh Sharma and Pradeep Kumar Singh and Gurjot Singh Gaba and Mehedi Masud and Mohammed Baz}, title = {An Exhaustive Research on the Application of Intrusion Detection Technology in Computer Network Security in Sensor Networks}, journal = {J. Sensors}, volume = {2021}, pages = {5558860:1--5558860:11}, year = {2021}, url = {https://doi.org/10.1155/2021/5558860}, doi = {10.1155/2021/5558860}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/js/WangMSSGMB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/BlochGYOPSS21, author = {Matthieu R. Bloch and Onur G{\"{u}}nl{\"{u}} and Aylin Yener and Fr{\'{e}}d{\'{e}}rique E. Oggier and H. Vincent Poor and Lalitha Sankar and Rafael F. Schaefer}, title = {An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {5--22}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3062755}, doi = {10.1109/JSAIT.2021.3062755}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/BlochGYOPSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/BernardiGMMN21, author = {Simona Bernardi and Ugo Gentile and Stefano Marrone and Jos{\'{e}} Merseguer and Roberto Nardone}, title = {Security modelling and formal verification of survivability properties: Application to cyber-physical systems}, journal = {J. Syst. Softw.}, volume = {171}, pages = {110746}, year = {2021}, url = {https://doi.org/10.1016/j.jss.2020.110746}, doi = {10.1016/J.JSS.2020.110746}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/BernardiGMMN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jus/DaiYP21, author = {Boyang Dai and Xiangfeng Yang and Gyei{-}Kark Park}, title = {The Core of Uncertain Coalitional Game Based on Hurwicz Criterion with Application to Cyber Security Information Sharing}, journal = {J. Uncertain Syst.}, volume = {14}, number = {1}, pages = {2150003}, year = {2021}, url = {https://doi.org/10.1142/s1752890921500033}, doi = {10.1142/S1752890921500033}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jus/DaiYP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/HomayCBSW21, author = {Aydin E. Homay and Christos Chrysoulas and Brahim El Boudani and M{\'{a}}rio de Sousa and Martin Wollschlaeger}, title = {A security and authentication layer for {SCADA/DCS} applications}, journal = {Microprocess. Microsystems}, volume = {87}, pages = {103479}, year = {2021}, url = {https://doi.org/10.1016/j.micpro.2020.103479}, doi = {10.1016/J.MICPRO.2020.103479}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/HomayCBSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/misq/SanyalMS21, author = {Pallab Sanyal and Nirup M. Menon and Mikko T. Siponen}, title = {An Empirical Examination of the Economics of Mobile Application Security}, journal = {{MIS} Q.}, volume = {45}, number = {4}, pages = {2235--2260}, year = {2021}, url = {https://doi.org/10.25300/misq/2021/15315}, doi = {10.25300/MISQ/2021/15315}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/misq/SanyalMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/AngaritaC21, author = {Maria Alejandra Osorio Angarita and Agust{\'{\i}}n Moreno Ca{\~{n}}adas}, title = {Brauer configuration algebras for multimedia based cryptography and security applications}, journal = {Multim. Tools Appl.}, volume = {80}, number = {15}, pages = {23485--23510}, year = {2021}, url = {https://doi.org/10.1007/s11042-020-10239-3}, doi = {10.1007/S11042-020-10239-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/AngaritaC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ShahSAHK21, author = {Dawood Shah and Tariq Shah and Imtiaz Ahamad and Muhammad Imran Haider and Ijaz Khalid}, title = {A three-dimensional chaotic map and their applications to digital audio security}, journal = {Multim. Tools Appl.}, volume = {80}, number = {14}, pages = {22251--22273}, year = {2021}, url = {https://doi.org/10.1007/s11042-021-10697-3}, doi = {10.1007/S11042-021-10697-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ShahSAHK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ThankiK21, author = {Rohit M. Thanki and Ashish Kothari}, title = {Multi-level security of medical images based on encryption and watermarking for telemedicine applications}, journal = {Multim. Tools Appl.}, volume = {80}, number = {3}, pages = {4307--4325}, year = {2021}, url = {https://doi.org/10.1007/s11042-020-09941-z}, doi = {10.1007/S11042-020-09941-Z}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ThankiK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/ZhaoZWLGS21, author = {Hongwei Zhao and Moli Zhang and Shi Wang and Entang Li and Zhenhua Guo and Dianmin Sun}, title = {Security risk and response analysis of typical application architecture of information and communication blockchain}, journal = {Neural Comput. Appl.}, volume = {33}, number = {13}, pages = {7661--7671}, year = {2021}, url = {https://doi.org/10.1007/s00521-020-05508-z}, doi = {10.1007/S00521-020-05508-Z}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nca/ZhaoZWLGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Valani21, author = {Altaz Valani}, title = {A multi-pronged approach to effective application security}, journal = {Netw. Secur.}, volume = {2021}, number = {8}, pages = {18--19}, year = {2021}, url = {https://doi.org/10.1016/S1353-4858(21)00092-1}, doi = {10.1016/S1353-4858(21)00092-1}, timestamp = {Fri, 10 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ns/Valani21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerj-cs/EduAA21, author = {Sampson Abeeku Edu and Mary Agoyi and Divine Quazie Agozie}, title = {Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: {FMEA} and {FTOPSIS} analysis}, journal = {PeerJ Comput. Sci.}, volume = {7}, pages = {e658}, year = {2021}, url = {https://doi.org/10.7717/peerj-cs.658}, doi = {10.7717/PEERJ-CS.658}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/peerj-cs/EduAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AlzoubiOJA21, author = {Yehia Ibrahim Alzoubi and Valmira H. Osmanaj and Ashraf Jaradat and Ahmad Salah Al{-}Ahmad}, title = {Fog computing security and privacy for the Internet of Thing applications: State-of-the-art}, journal = {Secur. Priv.}, volume = {4}, number = {2}, year = {2021}, url = {https://doi.org/10.1002/spy2.145}, doi = {10.1002/SPY2.145}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/AlzoubiOJA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangXYWLW21, author = {Binbin Huang and Yuanyuan Xiang and Dongjin Yu and Jiaojiao Wang and Zhongjin Li and Shangguang Wang}, title = {Reinforcement Learning for Security-Aware Workflow Application Scheduling in Mobile Edge Computing}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {5532410:1--5532410:13}, year = {2021}, url = {https://doi.org/10.1155/2021/5532410}, doi = {10.1155/2021/5532410}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuangXYWLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JalbaniYSOHM21, author = {Khuda Bux Jalbani and Muhammad Yousaf and Muhammad Shahzad Sarfraz and Rozita Jamili Oskouei and Akhtar Hussain and Zojan Memon}, title = {Poor Coding Leads to DoS Attack and Security Issues in Web Applications for Sensors}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {5523806:1--5523806:11}, year = {2021}, url = {https://doi.org/10.1155/2021/5523806}, doi = {10.1155/2021/5523806}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JalbaniYSOHM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YaoSZ21, author = {Zhi Yao and Hailing Sun and Guofu Zhou}, title = {Real-Time Facial Expression Recognition System for Video Big Sensor Data Security Application}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {9539022:1--9539022:10}, year = {2021}, url = {https://doi.org/10.1155/2021/9539022}, doi = {10.1155/2021/9539022}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YaoSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AbosataAIE21, author = {Nasr Abosata and Saba Al{-}Rubaye and G{\"{o}}khan Inalhan and Christos Emmanouilidis}, title = {Internet of Things for System Integrity: {A} Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications}, journal = {Sensors}, volume = {21}, number = {11}, pages = {3654}, year = {2021}, url = {https://doi.org/10.3390/s21113654}, doi = {10.3390/S21113654}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/AbosataAIE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/BastosRSRRFBRP21, author = {David Bastos and Jos{\'{e}} Ribeiro and Fernando Silva and M{\'{a}}rio Rodrigues and Carlos Rabad{\~{a}}o and Antonio Fern{\'{a}}ndez{-}Caballero and Jo{\~{a}}o Paulo Barraca and Nelson Pacheco da Rocha and Ant{\'{o}}nio Pereira}, title = {Security Mechanisms of a Mobile Health Application for Promoting Physical Activity among Older Adults}, journal = {Sensors}, volume = {21}, number = {21}, pages = {7323}, year = {2021}, url = {https://doi.org/10.3390/s21217323}, doi = {10.3390/S21217323}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/BastosRSRRFBRP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/CarvalhoG21, author = {Kevin Carvalho and Jorge Granjal}, title = {Security and Privacy for Mobile IoT Applications Using Blockchain}, journal = {Sensors}, volume = {21}, number = {17}, pages = {5931}, year = {2021}, url = {https://doi.org/10.3390/s21175931}, doi = {10.3390/S21175931}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/CarvalhoG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ShiehLH21, author = {Min{-}Zheng Shieh and Yi{-}Bing Lin and Ying Jui Hsu}, title = {VerificationTalk: {A} Verification and Security Mechanism for IoT Applications}, journal = {Sensors}, volume = {21}, number = {22}, pages = {7449}, year = {2021}, url = {https://doi.org/10.3390/s21227449}, doi = {10.3390/S21227449}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/ShiehLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/VulpeCDKPZ21, author = {Alexandru Vulpe and Razvan Craciunescu and Ana{-}Maria Dragulinescu and Sofoklis A. Kyriazakos and Ali Paikan and Pouyan Ziafati}, title = {Enabling Security Services in Socially Assistive Robot Scenarios for Healthcare Applications}, journal = {Sensors}, volume = {21}, number = {20}, pages = {6912}, year = {2021}, url = {https://doi.org/10.3390/s21206912}, doi = {10.3390/S21206912}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/VulpeCDKPZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/PathakPRC21, author = {Prabesh Pathak and Prabesh Poudel and Sankardas Roy and Doina Caragea}, title = {Leveraging attention-based deep neural networks for security vetting of Android applications}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {29}, pages = {e2}, year = {2021}, url = {https://doi.org/10.4108/eai.27-9-2021.171168}, doi = {10.4108/EAI.27-9-2021.171168}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/PathakPRC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/snam/NabiTY21, author = {Faisal Nabi and Xiaohui Tao and Jianming Yong}, title = {Security aspects in modern service component-oriented application logic for social e-commerce systems}, journal = {Soc. Netw. Anal. Min.}, volume = {11}, number = {1}, pages = {22}, year = {2021}, url = {https://doi.org/10.1007/s13278-020-00717-9}, doi = {10.1007/S13278-020-00717-9}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/snam/NabiTY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/SowmiyaASRTV21, author = {B. Sowmiya and V. S. Abhijith and S. Sudersan and Sakthi Jaya Sundar Rajasekar and M. Thangavel and P. Varalakshmi}, title = {A Survey on Security and Privacy Issues in Contact Tracing Application of Covid-19}, journal = {{SN} Comput. Sci.}, volume = {2}, number = {2}, pages = {136}, year = {2021}, url = {https://doi.org/10.1007/s42979-021-00520-z}, doi = {10.1007/S42979-021-00520-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/SowmiyaASRTV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/SimicRFI21, author = {Goran Simic and Mirjana Radovanovic and Sanja Filipovic and Olga Mirkovic Isaeva}, title = {Fuzzy logic approach in energy security decision-making: "ESecFuzzy" software application}, journal = {Soft Comput.}, volume = {25}, number = {16}, pages = {10813--10828}, year = {2021}, url = {https://doi.org/10.1007/s00500-021-05976-y}, doi = {10.1007/S00500-021-05976-Y}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/SimicRFI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sp/WangW21b, author = {Zhihui Wang and Jinyu Wang}, title = {Applications of Machine Learning in Public Security Information and Resource Management}, journal = {Sci. Program.}, volume = {2021}, pages = {4734187:1--4734187:9}, year = {2021}, url = {https://doi.org/10.1155/2021/4734187}, doi = {10.1155/2021/4734187}, timestamp = {Thu, 17 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sp/WangW21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/ChenLCW21, author = {Tzung{-}Her Chen and Wei{-}Bin Lee and Hsing{-}Bai Chen and Chien{-}Lung Wang}, title = {Revisited - The Subliminal Channel in Blockchain and Its Application to IoT Security}, journal = {Symmetry}, volume = {13}, number = {5}, pages = {855}, year = {2021}, url = {https://doi.org/10.3390/sym13050855}, doi = {10.3390/SYM13050855}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/ChenLCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/ShantaMHR21, author = {Aysha S. Shanta and Md. Badruddoja Majumder and Md Sakib Hasan and Garrett S. Rose}, title = {Physically Unclonable and Reconfigurable Computing System {(PURCS)} for Hardware Security Applications}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {40}, number = {3}, pages = {405--418}, year = {2021}, url = {https://doi.org/10.1109/TCAD.2020.2999907}, doi = {10.1109/TCAD.2020.2999907}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/ShantaMHR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/MengHYKLWQ21, author = {Shunmei Meng and Weijia Huang and Xiaochun Yin and Mohammad Reza Khosravi and Qianmu Li and Shaohua Wan and Lianyong Qi}, title = {Security-Aware Dynamic Scheduling for Real-Time Optimization in Cloud-Based Industrial Applications}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {6}, pages = {4219--4228}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.2995348}, doi = {10.1109/TII.2020.2995348}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/MengHYKLWQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/XieYWZXL21, author = {Guoqi Xie and Laurence T. Yang and Wei Wu and Keyu Zeng and Xiangzhen Xiao and Renfa Li}, title = {Security Enhancement for Real-Time Parallel In-Vehicle Applications by {CAN} {FD} Message Authentication}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {22}, number = {8}, pages = {5038--5049}, year = {2021}, url = {https://doi.org/10.1109/TITS.2020.3000783}, doi = {10.1109/TITS.2020.3000783}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/XieYWZXL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/BhartiBS21, author = {Vandana Bharti and Bhaskar Biswas and Kaushal Kumar Shukla}, title = {A Novel Multiobjective {GDWCN-PSO} Algorithm and Its Application to Medical Data Security}, journal = {{ACM} Trans. Internet Techn.}, volume = {21}, number = {2}, pages = {46:1--46:28}, year = {2021}, url = {https://doi.org/10.1145/3397679}, doi = {10.1145/3397679}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/BhartiBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/0001LK21, author = {Amit Kumar Singh and Zhihan Lv and Hoon Ko}, title = {Introduction to the Special Issue on Recent Trends in Medical Data Security for e-Health Applications}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {17}, number = {2s}, pages = {58:1--58:3}, year = {2021}, url = {https://doi.org/10.1145/3459601}, doi = {10.1145/3459601}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/0001LK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/KrishnanJJAB21, author = {Prabhakar Krishnan and Kurunandan Jain and Pramod George Jose and Krishnashree Achuthan and Rajkumar Buyya}, title = {{SDN} Enabled QoE and Security Framework for Multimedia Applications in 5G Networks}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {17}, number = {2}, pages = {39:1--39:29}, year = {2021}, url = {https://doi.org/10.1145/3377390}, doi = {10.1145/3377390}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/KrishnanJJAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/SharmaK21, author = {Surbhi Sharma and Baijnath Kaushik}, title = {Corrigendum to "A survey on internet of vehicles: Applications, security issues {\&} solutions" [Veh. Commun. 20 {(2019)} 100182]}, journal = {Veh. Commun.}, volume = {27}, pages = {100289}, year = {2021}, url = {https://doi.org/10.1016/j.vehcom.2020.100289}, doi = {10.1016/J.VEHCOM.2020.100289}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vcomm/SharmaK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/LiuGW21, author = {Xiangyu Liu and Lei Guo and Xuetao Wei}, title = {Indoor Visible Light Applications for Communication, Positioning, and Security}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2021}, pages = {1730655:1--1730655:10}, year = {2021}, url = {https://doi.org/10.1155/2021/1730655}, doi = {10.1155/2021/1730655}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/LiuGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/KambojJV21, author = {Anil Kumar Kamboj and Poonam Jindal and Pankaj Verma}, title = {Machine learning-based physical layer security: techniques, open challenges, and applications}, journal = {Wirel. Networks}, volume = {27}, number = {8}, pages = {5351--5383}, year = {2021}, url = {https://doi.org/10.1007/s11276-021-02781-1}, doi = {10.1007/S11276-021-02781-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/KambojJV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/RajendranDMB21, author = {Sujarani Rajendran and Manivannan Doraipandian and Ramachandran Manikandan and Vidhyacharan Bhaskar}, title = {Lightweight Bio-Chaos Crypt to Enhance the Security of Biometric Images in Internet of Things Applications}, journal = {Wirel. Pers. Commun.}, volume = {119}, number = {3}, pages = {2517--2537}, year = {2021}, url = {https://doi.org/10.1007/s11277-021-08342-1}, doi = {10.1007/S11277-021-08342-1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/RajendranDMB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aces/LeMM21, author = {Vu Le and Ramin Moazeni and Melody Moh}, editor = {Nibras Abdullah and Selvakumar Manickam and Mohammed Anbar}, title = {Improving Security and Performance of Distributed IPFS-Based Web Applications with Blockchain}, booktitle = {Advances in Cyber Security - Third International Conference, ACeS 2021, Penang, Malaysia, August 24-25, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1487}, pages = {114--127}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-8059-5\_8}, doi = {10.1007/978-981-16-8059-5\_8}, timestamp = {Fri, 26 Apr 2024 12:46:20 +0200}, biburl = {https://dblp.org/rec/conf/aces/LeMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Munch0Y21, author = {Jean{-}Pierre M{\"{u}}nch and Thomas Schneider and Hossein Yalame}, title = {{VASA:} Vector {AES} Instructions for Security Applications}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {131--145}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485897}, doi = {10.1145/3485832.3485897}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Munch0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ahfe/OravecHSSG21, author = {Milan Oravec and Frantisek Hesko and Zolt{\'{a}}n Szoke and Miroslav Smelko and Tomas Gazda}, editor = {Ravindra S. Goonetilleke and Shuping Xiong and Henrijs Kalkis and Zenija Roja and Waldemar Karwowski and Atsuo Murata}, title = {Magnetometry for Security Applications}, booktitle = {Advances in Physical, Social {\&} Occupational Ergonomics - Proceedings of the {AHFE} 2021 Virtual Conferences on Physical Ergonomics and Human Factors, Social {\&} Occupational Ergonomics, and Cross-Cultural Decision Making, July 25-29, 2021, {USA}}, series = {Lecture Notes in Networks and Systems}, volume = {273}, pages = {236--243}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-80713-9\_31}, doi = {10.1007/978-3-030-80713-9\_31}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ahfe/OravecHSSG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiam/LinYPB21, author = {Hongzhen Lin and Zhipan Yu and Shiqi Peng and Bo Bian}, title = {Security Issues in Commercial Application of Artificial Intelligence}, booktitle = {{AIAM} 2021: 3rd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 23 - 25, 2021}, pages = {1174--1177}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3495018.3495359}, doi = {10.1145/3495018.3495359}, timestamp = {Thu, 24 Mar 2022 09:42:53 +0100}, biburl = {https://dblp.org/rec/conf/aiam/LinYPB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiam/WanX21, author = {Biao Wan and Chunmei Xu}, title = {Application Analysis of Computer Software Security Vulnerability Detection Based on Web Crawler}, booktitle = {{AIAM} 2021: 3rd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 23 - 25, 2021}, pages = {1969--1973}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3495018.3495526}, doi = {10.1145/3495018.3495526}, timestamp = {Thu, 24 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aiam/WanX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/SanoS0K21, author = {Ayane Sano and Yukiko Sawaya and Akira Yamada and Ayumu Kubota}, editor = {Leonard Barolli and Isaac Woungang and Tomoya Enokido}, title = {SeBeST: Security Behavior Stage Model and Its Application to {OS} Update}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021, Volume 2}, series = {Lecture Notes in Networks and Systems}, volume = {226}, pages = {552--566}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75075-6\_45}, doi = {10.1007/978-3-030-75075-6\_45}, timestamp = {Thu, 12 Aug 2021 13:39:18 +0200}, biburl = {https://dblp.org/rec/conf/aina/SanoS0K21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/AlnsourJ21, author = {Yazan Alnsour and Ahmad H. Juma'h}, editor = {Yolande E. Chan and Maric Boudreau and Benoit Aubert and Guy Par{\'{e}} and Wynne Chin}, title = {Exploring the Effects of Information Security {\&} Privacy on Blockchain Mobile Applications Rating: Text Analytics Approach}, booktitle = {27th Americas Conference on Information Systems, {AMCIS} 2021, Virtual Conference, August 9-13, 2021}, publisher = {Association for Information Systems}, year = {2021}, url = {https://aisel.aisnet.org/amcis2021/sig\_acctinfosystem\_asys/sig\_acctinfosystem\_asys/3}, timestamp = {Mon, 05 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/AlnsourJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apwcs2/MuqtadirBQBNH21, author = {Muhammad Muqtadir and M. Haris Butt and Daniyal Qazi and Faran Awais Butt and Ijaz Haider Naqvi and Naveed Ul Hassan}, title = {Health Secure Radar: Use of Micro Doppler Signatures for Health Care and Security Applications}, booktitle = {2021 {IEEE} {VTS} 17th Asia Pacific Wireless Communications Symposium (APWCS), Osaka, Japan, August 30-31, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/APWCS50173.2021.9548761}, doi = {10.1109/APWCS50173.2021.9548761}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apwcs2/MuqtadirBQBNH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Zhandry21, author = {Mark Zhandry}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Redeeming Reset Indifferentiability and Applications to Post-quantum Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13090}, pages = {518--548}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92062-3\_18}, doi = {10.1007/978-3-030-92062-3\_18}, timestamp = {Mon, 28 Aug 2023 21:17:52 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Zhandry21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcca/PiriouBDPG21, author = {Pierre{-}Yves Piriou and Olivier Boudeville and Gilles Deleuze and Sara {Tucci Piergiovanni} and {\"{O}}nder G{\"{u}}rcan}, title = {Justifying the Dependability and Security of Business-Critical Blockchain-based Applications}, booktitle = {Third International Conference on Blockchain Computing and Applications, {BCCA} 2021, Tartu, Estonia, November 15-17, 2021}, pages = {97--104}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BCCA53669.2021.9656962}, doi = {10.1109/BCCA53669.2021.9656962}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bcca/PiriouBDPG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bic/Fang21, author = {Guo Fang}, title = {Application of Data Encryption Technology in Computer Network Security}, booktitle = {{BIC} 2021: International Conference on Bioinformatics and Intelligent Computing, Harbin, China, January, 2021}, pages = {220--225}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448748.3448783}, doi = {10.1145/3448748.3448783}, timestamp = {Wed, 22 Jun 2022 15:14:16 +0200}, biburl = {https://dblp.org/rec/conf/bic/Fang21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/ImtiazSV21, author = {Sayem Mohammad Imtiaz and Kazi Zakia Sultana and Aparna S. Varde}, editor = {Yixin Chen and Heiko Ludwig and Yicheng Tu and Usama M. Fayyad and Xingquan Zhu and Xiaohua Hu and Suren Byna and Xiong Liu and Jianping Zhang and Shirui Pan and Vagelis Papalexakis and Jianwu Wang and Alfredo Cuzzocrea and Carlos Ordonez}, title = {Mining Learner-friendly Security Patterns from Huge Published Histories of Software Applications for an Intelligent Tutoring System in Secure Coding}, booktitle = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando, FL, USA, December 15-18, 2021}, pages = {4869--4876}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigData52589.2021.9671757}, doi = {10.1109/BIGDATA52589.2021.9671757}, timestamp = {Fri, 13 Jan 2023 17:06:49 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/ImtiazSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/KhanN21, author = {Zulfiqar Ali Khan and Akbar Siami Namin}, editor = {Yixin Chen and Heiko Ludwig and Yicheng Tu and Usama M. Fayyad and Xingquan Zhu and Xiaohua Hu and Suren Byna and Xiong Liu and Jianping Zhang and Shirui Pan and Vagelis Papalexakis and Jianwu Wang and Alfredo Cuzzocrea and Carlos Ordonez}, title = {The Applications of Blockchains in Addressing the Integration and Security of IoT Systems: {A} Survey}, booktitle = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando, FL, USA, December 15-18, 2021}, pages = {2421--2426}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigData52589.2021.9671299}, doi = {10.1109/BIGDATA52589.2021.9671299}, timestamp = {Tue, 18 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/KhanN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bpm/0001M21, author = {Mubashar Iqbal and Raimundas Matulevicius}, editor = {Jos{\'{e}} Gonz{\'{a}}lez Enr{\'{\i}}quez and S{\o}ren Debois and Peter Fettke and Pierluigi Plebani and Inge van de Weerd and Ingo Weber}, title = {Blockchain as a Countermeasure Solution for Security Threats of Healthcare Applications}, booktitle = {Business Process Management: Blockchain and Robotic Process Automation Forum - {BPM} 2021 Blockchain and {RPA} Forum, Rome, Italy, September 6-10, 2021, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {428}, pages = {67--84}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85867-4\_6}, doi = {10.1007/978-3-030-85867-4\_6}, timestamp = {Wed, 28 Dec 2022 15:36:22 +0100}, biburl = {https://dblp.org/rec/conf/bpm/0001M21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cacre/JiaLSW21, author = {Xianfeng Jia and Tianyu Liu and Chunhui Sun and Zhi Wu}, editor = {Fumin Zhang and Ying Zhao}, title = {Analysis on the Application of Cryptographic Technology in the Communication Security of Intelligent Networked Vehicles}, booktitle = {6th International Conference on Automation, Control and Robotics Engineering, {CACRE} 2021, Dalian, China, July 15-17, 2021}, pages = {423--427}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CACRE52464.2021.9501303}, doi = {10.1109/CACRE52464.2021.9501303}, timestamp = {Fri, 13 Aug 2021 09:38:15 +0200}, biburl = {https://dblp.org/rec/conf/cacre/JiaLSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HanWCZWZYSY21, author = {Dongqi Han and Zhiliang Wang and Wenqi Chen and Ying Zhong and Su Wang and Han Zhang and Jiahai Yang and Xingang Shi and Xia Yin}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {3197--3217}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484589}, doi = {10.1145/3460120.3484589}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HanWCZWZYSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/clei/BetarteCDEGMMM21, author = {Gustavo Betarte and Juan Diego Campo and Andrea Delgado and Pablo Ezzatti and Laura Gonz{\'{a}}lez and {\'{A}}lvaro Mart{\'{\i}}n and Rodrigo Mart{\'{\i}}nez and B{\'{a}}rbara Muracciole}, title = {Proximity tracing applications for {COVID-19:} data privacy and security}, booktitle = {{XLVII} Latin American Computing Conference, {CLEI} 2021, Cartago, Costa Rica, October 25-29, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CLEI53233.2021.9640202}, doi = {10.1109/CLEI53233.2021.9640202}, timestamp = {Fri, 30 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/clei/BetarteCDEGMMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/clei/BrunoITCB21, author = {Marcelo Bruno and Pablo Ib{\'{a}}{\~{n}}ez and Tamara Techera and Daniel Calegari and Gustavo Betarte}, title = {Exploring the Application of Process Mining Techniques to Improve Web Application Security}, booktitle = {{XLVII} Latin American Computing Conference, {CLEI} 2021, Cartago, Costa Rica, October 25-29, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CLEI53233.2021.9640192}, doi = {10.1109/CLEI53233.2021.9640192}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/clei/BrunoITCB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/GranataRS21, author = {Daniele Granata and Massimiliano Rak and Giovanni Salzillo}, editor = {Donald Ferguson and Markus Helfert and Claus Pahl}, title = {Risk Analysis Automation Process in {IT} Security for Cloud Applications}, booktitle = {Cloud Computing and Services Science - 11th International Conference, {CLOSER} 2021, Virtual Event, April 28-30, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1607}, pages = {47--68}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-21637-4\_3}, doi = {10.1007/978-3-031-21637-4\_3}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/closer/GranataRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cncert/Wang21, author = {Zhanyu Wang}, editor = {Wei Lu and Yuqing Zhang and Weiping Wen and Hanbing Yan and Chao Li}, title = {Research and Application of Security Situation Awareness Platform for Large Enterprises}, booktitle = {Cyber Security - 18th China Annual Conference, {CNCERT} 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1506}, pages = {129--139}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-9229-1\_8}, doi = {10.1007/978-981-16-9229-1\_8}, timestamp = {Thu, 15 Dec 2022 13:09:15 +0100}, biburl = {https://dblp.org/rec/conf/cncert/Wang21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HoglundR21, author = {Joel H{\"{o}}glund and Shahid Raza}, title = {{LICE:} Lightweight certificate enrollment for IoT using application layer security}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {19--28}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705036}, doi = {10.1109/CNS53000.2021.9705036}, timestamp = {Fri, 18 Feb 2022 10:36:40 +0100}, biburl = {https://dblp.org/rec/conf/cns/HoglundR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/MinkevicsK21, author = {Vladislavs Minkevics and Janis Kampars}, editor = {Prosper Chemouil and Mehmet Ulema and Stuart Clayman and M{\"{u}}ge Sayit and Cihat {\c{C}}etinkaya and Stefano Secci}, title = {Artificial intelligence and big data driven {IS} security management solution with applications in higher education organizations}, booktitle = {17th International Conference on Network and Service Management, {CNSM} 2021, Izmir, Turkey, October 25-29, 2021}, pages = {340--344}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CNSM52442.2021.9615575}, doi = {10.23919/CNSM52442.2021.9615575}, timestamp = {Sun, 02 Oct 2022 15:57:41 +0200}, biburl = {https://dblp.org/rec/conf/cnsm/MinkevicsK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/HuWTXXLL21, author = {Yiwen Hu and Sihan Wang and Guan{-}Hua Tu and Li Xiao and Tian Xie and Xinyu Lei and Chi{-}Yu Li}, editor = {Anupam Joshi and Barbara Carminati and Rakesh M. Verma}, title = {Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures}, booktitle = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021}, pages = {89--100}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3422337.3447832}, doi = {10.1145/3422337.3447832}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/HuWTXXLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/TakefusaSFYAP21, author = {Atsuko Takefusa and Jingtao Sun and Ikki Fujiwara and Hiroshi Yoshida and Kento Aida and Calton Pu}, title = {SINETStream: Enabling Research IoT Applications with Portability, Security and Performance Requirements}, booktitle = {{IEEE} 45th Annual Computers, Software, and Applications Conference, {COMPSAC} 2021, Madrid, Spain, July 12-16, 2021}, pages = {482--492}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/COMPSAC51774.2021.00073}, doi = {10.1109/COMPSAC51774.2021.00073}, timestamp = {Thu, 23 Sep 2021 08:33:11 +0200}, biburl = {https://dblp.org/rec/conf/compsac/TakefusaSFYAP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/UdvarhelyiBS21, author = {Balazs Udvarhelyi and Olivier Bronchain and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Shivam Bhasin and Fabrizio De Santis}, title = {Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to {ISAP}}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 12th International Workshop, {COSADE} 2021, Lugano, Switzerland, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12910}, pages = {168--183}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89915-8\_8}, doi = {10.1007/978-3-030-89915-8\_8}, timestamp = {Fri, 29 Oct 2021 16:42:34 +0200}, biburl = {https://dblp.org/rec/conf/cosade/UdvarhelyiBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpits/BerestovKSKO21, author = {Denis Berestov and Oleg Kurchenko and Yuri Shcheblanin and Nataliia Korshun and Tetiana S. Opryshko}, editor = {Volodymyr Buriachok and Dmytro Ageyev and Valeriy Lahno and Volodymyr Sokolov}, title = {Analysis of Features and Prospects of Application of Dynamic Iterative Assessment of Information Security Risks (short paper)}, booktitle = {Paper Proceedings of the Selected Papers on Publishing Papers with {CEUR-WS} co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems {(CPITS} 2021), Kyiv, Ukraine, January 28, 2021 (online)}, series = {{CEUR} Workshop Proceedings}, volume = {2923}, pages = {329--335}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2923/paper36.pdf}, timestamp = {Sun, 24 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cpits/BerestovKSKO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csci/Rahimi21, author = {Nick Rahimi}, title = {A Study of the Landscape of Security Issues, Vulnerabilities, and Defense Mechanisms in Web Based Applications}, booktitle = {International Conference on Computational Science and Computational Intelligence, {CSCI} 2021, Las Vegas, NV, USA, December 15-17, 2021}, pages = {806--811}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSCI54926.2021.00194}, doi = {10.1109/CSCI54926.2021.00194}, timestamp = {Tue, 23 Apr 2024 12:44:18 +0200}, biburl = {https://dblp.org/rec/conf/csci/Rahimi21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/FengCEH21, author = {Xiaohua Feng and Marc Conrad and Elias Eze and Khalid Hussein}, title = {Artificial Intelligence and Blockchain for Future Cyber Security Application}, booktitle = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2021, Canada, October 25-28, 2021}, pages = {802--805}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00133}, doi = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH52372.2021.00133}, timestamp = {Wed, 23 Mar 2022 17:30:18 +0100}, biburl = {https://dblp.org/rec/conf/dasc/FengCEH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/ClaesenSVM21, author = {Thomas Claesen and Arish Sateesan and Jo Vliegen and Nele Mentens}, editor = {Francesco Leporati and Salvatore Vitabile and Amund Skavhaug}, title = {Novel Non-cryptographic Hash Functions for Networking and Security Applications on {FPGA}}, booktitle = {24th Euromicro Conference on Digital System Design, {DSD} 2021, Virtual Event / Palermo, Sicily, Italy, September 1-3, 2021}, pages = {347--354}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSD53832.2021.00059}, doi = {10.1109/DSD53832.2021.00059}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsd/ClaesenSVM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LuL21, author = {Xiaofeng Lu and Pietro Li{\`{o}}}, title = {International Workshop On Application of Intelligent Technology in Security - {AITS} 2021}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks Workshops, {DSN} Workshops 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {xiv--xv}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN-W52860.2021.00008}, doi = {10.1109/DSN-W52860.2021.00008}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LuL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/TebibAAG21, author = {Mohammed El Amin Tebib and Pascal Andr{\'{e}} and Oum{-}El{-}Kheir Aktouf and Mariem Graa}, editor = {Rasmus Adler and Amel Bennaceur and Simon Burton and Amleto Di Salle and Nicola Nostro and Rasmus L{\o}venstein Olsen and Selma Saidi and Philipp Schleiss and Daniel Schneider and Hans{-}Peter Schwefel}, title = {Assisting Developers in Preventing Permissions Related Security Issues in Android Applications}, booktitle = {Dependable Computing - {EDCC} 2021 Workshops - DREAMS, DSOGRI, {SERENE} 2021, Munich, Germany, September 13, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1462}, pages = {132--143}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86507-8\_13}, doi = {10.1007/978-3-030-86507-8\_13}, timestamp = {Sun, 25 Dec 2022 19:02:10 +0100}, biburl = {https://dblp.org/rec/conf/edcc/TebibAAG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emcis/TannerS21, author = {Maureen Tanner and Sujala Singh}, editor = {Marinos Themistocleous and Maria Papadaki}, title = {The Influence of Locus of Control in the Actualisation of Mobile Dating Applications Affordances to Mitigate Privacy and Security Concerns}, booktitle = {Information Systems - 18th European, Mediterranean, and Middle Eastern Conference, {EMCIS} 2021, Virtual Event, December 8-9, 2021, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {437}, pages = {333--345}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-95947-0\_23}, doi = {10.1007/978-3-030-95947-0\_23}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/emcis/TannerS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esem/CroftNCB21, author = {Roland Croft and Dominic Newlands and Ziyu Chen and Muhammad Ali Babar}, editor = {Filippo Lanubile and Marcos Kalinowski and Maria Teresa Baldassarre}, title = {An Empirical Study of Rule-Based and Learning-Based Approaches for Static Application Security Testing}, booktitle = {{ESEM} '21: {ACM} / {IEEE} International Symposium on Empirical Software Engineering and Measurement, Bari, Italy, October 11-15, 2021}, pages = {8:1--8:12}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3475716.3475781}, doi = {10.1145/3475716.3475781}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esem/CroftNCB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Mann21, author = {Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, editor = {Sokratis K. Katsikas and Costas Lambrinoudakis and Nora Cuppens and John Mylopoulos and Christos Kalloniatis and Weizhi Meng and Steven Furnell and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Jorge Maestre Vidal and Marco Antonio Sotelo Monge}, title = {Security- and Privacy-Aware IoT Application Placement and User Assignment}, booktitle = {Computer Security. {ESORICS} 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT{\&}SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13106}, pages = {296--316}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-95484-0\_18}, doi = {10.1007/978-3-030-95484-0\_18}, timestamp = {Wed, 09 Nov 2022 13:58:44 +0100}, biburl = {https://dblp.org/rec/conf/esorics/Mann21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etfa/KhanSS21, author = {Muhammad Taimoor Khan and Dimitrios Serpanos and Howard E. Shrobe}, title = {Towards Scalable Security of Real-time Applications: {A} Formally Certified Approach}, booktitle = {26th {IEEE} International Conference on Emerging Technologies and Factory Automation, {ETFA} 2021, Vasteras, Sweden, September 7-10, 2021}, pages = {1--4}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ETFA45728.2021.9613489}, doi = {10.1109/ETFA45728.2021.9613489}, timestamp = {Tue, 07 Dec 2021 09:17:59 +0100}, biburl = {https://dblp.org/rec/conf/etfa/KhanSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucnc/StavroulakiSCCM21, author = {Vera Stavroulaki and Emilio Calvanese Strinati and Fran{\c{c}}ois Carrez and Yannick Carlinet and Mickael Maman and Drasko Draskovic and Drazen Ribar and Arthur Lallet and Klaus M{\"{o}}{\ss}ner and Milenko Tosic and Mikko Uitto and Seilendria A. Hadiwardoyo and Johann M{\'{a}}rquez{-}Barja and Esther Garrido and Makis Stamatelatos and Khaled Sarayeddine and Pablo S{\'{a}}nchez Vivas and Aarne M{\"{a}}mmel{\"{a}} and Panagiotis Demestichas}, title = {{DEDICAT} 6G - Dynamic Coverage Extension and Distributed Intelligence for Human Centric Applications with Assured Security, Privacy and Trust: from 5G to 6G}, booktitle = {Joint European Conference on Networks and Communications {\&} 6G Summit, EuCNC/6G Summit 2021, Porto, Portugal, June 8-11, 2021}, pages = {556--561}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuCNC/6GSummit51104.2021.9482611}, doi = {10.1109/EUCNC/6GSUMMIT51104.2021.9482611}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eucnc/StavroulakiSCCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LaiLW21, author = {Qiqi Lai and Feng{-}Hao Liu and Zhedong Wang}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {New Lattice Two-Stage Sampling Technique and Its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {498--527}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_18}, doi = {10.1007/978-3-030-77870-5\_18}, timestamp = {Wed, 16 Jun 2021 11:49:32 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LaiLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fccm/GandhamSL21, author = {Sanjay Gandham and Rakin Muhammad Shadab and Mingjie Lin}, title = {{ARC:} Reconfigurable Cache Security Assurance with Application-Specific Randomized Mapping in FPGA-Based Heterogeneous Computing}, booktitle = {29th {IEEE} Annual International Symposium on Field-Programmable Custom Computing Machines, {FCCM} 2021, Orlando, FL, USA, May 9-12, 2021}, pages = {255}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/FCCM51124.2021.00042}, doi = {10.1109/FCCM51124.2021.00042}, timestamp = {Mon, 07 Jun 2021 17:13:01 +0200}, biburl = {https://dblp.org/rec/conf/fccm/GandhamSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdse/TranNPT21, author = {Anh{-}Duy Tran and Minh{-}Quan Nguyen and Gia{-}Hao Phan and Minh{-}Triet Tran}, editor = {Tran Khanh Dang and Josef K{\"{u}}ng and Tai M. Chung and Makoto Takizawa}, title = {Security Issues in Android Application Development and Plug-in for Android Studio to Support Secure Programming}, booktitle = {Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications - 8th International Conference, {FDSE} 2021, Virtual Event, November 24-26, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1500}, pages = {105--122}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-8062-5\_7}, doi = {10.1007/978-981-16-8062-5\_7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdse/TranNPT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fnc/Pal21, author = {Kamalendu Pal}, editor = {Elhadi M. Shakshuki and Ansar{-}Ul{-}Haque Yasar}, title = {Privacy, Security and Policies: {A} Review of Problems and Solutions with Blockchain-Based Internet of Things Applications in Manufacturing Industry}, booktitle = {The 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications {(FNC-2021)} / The 11th International Conference on Sustainable Energy Information Technology, Leuven, Belgium, August 9-12, 2021}, series = {Procedia Computer Science}, volume = {191}, pages = {176--183}, publisher = {Elsevier}, year = {2021}, url = {https://doi.org/10.1016/j.procs.2021.07.022}, doi = {10.1016/J.PROCS.2021.07.022}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fnc/Pal21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fnc/TariqKA21, author = {Noshina Tariq and Farrukh Aslam Khan and Muhammad Asim}, editor = {Elhadi M. Shakshuki and Ansar{-}Ul{-}Haque Yasar}, title = {Security Challenges and Requirements for Smart Internet of Things Applications: {A} Comprehensive Analysis}, booktitle = {The 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications {(FNC-2021)} / The 11th International Conference on Sustainable Energy Information Technology, Leuven, Belgium, August 9-12, 2021}, series = {Procedia Computer Science}, volume = {191}, pages = {425--430}, publisher = {Elsevier}, year = {2021}, url = {https://doi.org/10.1016/j.procs.2021.07.053}, doi = {10.1016/J.PROCS.2021.07.053}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fnc/TariqKA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcaiot/ZingirianS21, author = {Nicola Zingirian and Girolamo Marco Salierno}, title = {IoT Application for the Physical Security in Gas Transportation}, booktitle = {{IEEE} Global Conference on Artificial Intelligence and Internet of Things, GCAIoT 2021, Dubai, United Arab Emirates, December 12-16, 2021}, pages = {122--129}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/GCAIoT53516.2021.9692917}, doi = {10.1109/GCAIOT53516.2021.9692917}, timestamp = {Fri, 18 Feb 2022 10:36:45 +0100}, biburl = {https://dblp.org/rec/conf/gcaiot/ZingirianS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/AbdulgadirLFKG21, author = {Abubakr Abdulgadir and Sammy Lin and Farnoud Farahmand and Jens{-}Peter Kaps and Kris Gaj}, editor = {Yiran Chen and Victor V. Zhirnov and Avesta Sasan and Ioannis Savidis}, title = {Side-channel Resistant Implementations of a Novel Lightweight Authenticated Cipher with Application to Hardware Security}, booktitle = {{GLSVLSI} '21: Great Lakes Symposium on {VLSI} 2021, Virtual Event, USA, June 22-25, 2021}, pages = {229--234}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3453688.3461761}, doi = {10.1145/3453688.3461761}, timestamp = {Mon, 04 Jul 2022 14:19:34 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/AbdulgadirLFKG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/Orlando21, author = {Pompei Len Orlando}, editor = {Yiran Chen and Victor V. Zhirnov and Avesta Sasan and Ioannis Savidis}, title = {An Air Force Perspective on the Application of Machine Learning for Microelectronics Design and Security}, booktitle = {{GLSVLSI} '21: Great Lakes Symposium on {VLSI} 2021, Virtual Event, USA, June 22-25, 2021}, pages = {319}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3453688.3462233}, doi = {10.1145/3453688.3462233}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/Orlando21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/IslamC21, author = {Muhammad Usama Islam and Beenish M. Chaudhry}, editor = {Constantine Stephanidis and Margherita Antona and Stavroula Ntoa}, title = {DoAR: An Augmented Reality Based Door Security Prototype Application}, booktitle = {{HCI} International 2021 - Late Breaking Posters - 23rd {HCI} International Conference, {HCII} 2021, Virtual Event, July 24-29, 2021, Proceedings, Part {I}}, series = {Communications in Computer and Information Science}, volume = {1498}, pages = {126--134}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90176-9\_18}, doi = {10.1007/978-3-030-90176-9\_18}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hci/IslamC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/SchaferKS21, author = {Gertraud Sch{\"{a}}fer and Andreas Kreisel and Ulrike Stopka}, editor = {Heidi Kr{\"{o}}mker}, title = {Usability Study of an Innovative Application in Public Transport by Using Hardware-Based Security Technology}, booktitle = {{HCI} in Mobility, Transport, and Automotive Systems - Third International Conference, MobiTAS 2021, Held as Part of the 23rd {HCI} International Conference, {HCII} 2021, Virtual Event, July 24-29, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12791}, pages = {105--125}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78358-7\_7}, doi = {10.1007/978-3-030-78358-7\_7}, timestamp = {Tue, 20 Jul 2021 15:09:55 +0200}, biburl = {https://dblp.org/rec/conf/hci/SchaferKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/ShenCCZZZ21, author = {Yufan Shen and Kun Cao and Yangguang Cui and Chengliang Zhou and Gongxuan Zhang and Junlong Zhou}, title = {Lifetime-Driven Scheduling of Security-Critical Internet-of-Things Applications on Real-Time Heterogeneous Multicore Systems}, booktitle = {2021 {IEEE} 23rd Int Conf on High Performance Computing {\&} Communications; 7th Int Conf on Data Science {\&} Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud {\&} Big Data Systems {\&} Application (HPCC/DSS/SmartCity/DependSys), Haikou, Hainan, China, December 20-22, 2021}, pages = {1466--1474}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00219}, doi = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS53884.2021.00219}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/ShenCCZZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/GoffinetSZLR21, author = {Stanley Goffinet and Donatien Schmitz and Igor Zavalyshyn and Axel Legay and Etienne Rivi{\`{e}}re}, editor = {Afsaneh Doryab and Qin Lv and Michael Beigl}, title = {Controlling Security Rules Using Natural Dialogue: an Application to Smart Home Care}, booktitle = {UbiComp/ISWC '21: 2021 {ACM} International Joint Conference on Pervasive and Ubiquitous Computing and 2021 {ACM} International Symposium on Wearable Computers, Virtual Event, September 21-25, 2021}, pages = {194--197}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460418.3479331}, doi = {10.1145/3460418.3479331}, timestamp = {Wed, 15 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/huc/GoffinetSZLR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i2mtc/UllahSKW21, author = {Abdul Wahab Usman Ullah and Jawad Ali Shah and Kushsairy Abdul Kadir and Abdul Wahid}, title = {Development of Smart Surveillance System using Cloud for Security Application}, booktitle = {{IEEE} International Instrumentation and Measurement Technology Conference, {I2MTC} 2021, Glasgow, United Kingdom, May 17-20, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/I2MTC50364.2021.9459817}, doi = {10.1109/I2MTC50364.2021.9459817}, timestamp = {Tue, 06 Jul 2021 14:44:37 +0200}, biburl = {https://dblp.org/rec/conf/i2mtc/UllahSKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3k/Thuraisingham21, author = {Bhavani Thuraisingham}, editor = {Rita Cucchiara and Ana L. N. Fred and Joaquim Filipe}, title = {Integrating Big Data, Data Science and Cyber Security with Applications in Cloud and Internet of Things}, booktitle = {Proceedings of the 13th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, {IC3K} 2021, Volume 1: KDIR, Online Streaming, October 25-27, 2021}, pages = {7}, publisher = {{SCITEPRESS}}, year = {2021}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/ic3k/Thuraisingham21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/AdibanSS21, author = {Mohammad Adiban and Arash Safari and Giampiero Salvi}, title = {{STEP-GAN:} {A} One-Class Anomaly Detection Model with Applications to Power System Security}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2021, Toronto, ON, Canada, June 6-11, 2021}, pages = {2605--2609}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICASSP39728.2021.9415102}, doi = {10.1109/ICASSP39728.2021.9415102}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/AdibanSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ChenZT21, author = {Yu Chen and Ziqian Zhang and Ning Tang}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {Application of Digital Twin in the Security Protection of the Internet of Things in Power System}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {218--229}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_17}, doi = {10.1007/978-981-19-0852-1\_17}, timestamp = {Fri, 08 Sep 2023 09:43:24 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ChenZT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/YangMZ21, author = {Yu{-}qing Yang and Weiwei Miao and Zeng Zeng}, editor = {Yuan Tian and Tinghuai Ma and Muhammad Khurram Khan and Victor S. Sheng and Zhaoqing Pan}, title = {The Application of Beidou and Ultra-Broadband Positioning Technology in the Power Security Protection System}, booktitle = {Big Data and Security - Third International Conference, {ICBDS} 2021, Shenzhen, China, November 26-28, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1563}, pages = {171--182}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0852-1\_13}, doi = {10.1007/978-981-19-0852-1\_13}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbds/YangMZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/JellenCF21, author = {Isabel Jellen and Joseph Callenes{-}Sloan and Dongfeng Fang}, title = {Heterogeneous System Model for Security in E-Health Applications}, booktitle = {{IEEE} International Conference on Communications Workshops, {ICC} Workshops 2021, Montreal, QC, Canada, June 14-23, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCWorkshops50388.2021.9473543}, doi = {10.1109/ICCWORKSHOPS50388.2021.9473543}, timestamp = {Tue, 13 Jul 2021 14:57:20 +0200}, biburl = {https://dblp.org/rec/conf/icc/JellenCF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/GaikwadPK21, author = {Bipin Gaikwad and PVBSS Prakash and Abhijit Karmakar}, title = {Edge-based real-time face logging system for security applications}, booktitle = {12th International Conference on Computing Communication and Networking Technologies, {ICCCNT} 2021, Kharagpur, India, July 6-8, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCCNT51525.2021.9579758}, doi = {10.1109/ICCCNT51525.2021.9579758}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/GaikwadPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/SheikhKDLJA21, author = {Ayesha Sameer Sheikh and Annem Keerthi and Sateeshkrishna Dhuli and Guntakala Likhita and B. S. V. Naga Jahnavi and Fouzul Atik}, title = {A Novel Security System for IoT Applications}, booktitle = {12th International Conference on Computing Communication and Networking Technologies, {ICCCNT} 2021, Kharagpur, India, July 6-8, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCCNT51525.2021.9579502}, doi = {10.1109/ICCCNT51525.2021.9579502}, timestamp = {Thu, 25 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/SheikhKDLJA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdh/MigiroSS21, author = {Lorna Migiro and Hossain Shahriar and Sweta Sneha}, title = {Analyzing Security and Privacy Concerns of Contact Tracing Applications}, booktitle = {{IEEE} International Conference on Digital Health, {ICDH} 2021, Chicago, IL, USA, September 5-10, 2021}, pages = {283--292}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICDH52753.2021.00052}, doi = {10.1109/ICDH52753.2021.00052}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdh/MigiroSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icebe/UrbanczykW21, author = {Wojciech Urbanczyk and Jan Werewka}, title = {Application of a Government Data Center {(GDC)} Reference Model for Security Management Analysis}, booktitle = {{IEEE} International Conference on e-Business Engineering, {ICEBE} 2021, Guangzhou, China, November 12-14, 2021}, pages = {112--119}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICEBE52470.2021.00021}, doi = {10.1109/ICEBE52470.2021.00021}, timestamp = {Fri, 22 Apr 2022 19:18:39 +0200}, biburl = {https://dblp.org/rec/conf/icebe/UrbanczykW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/Schlegel21, author = {Marius Schlegel}, editor = {Pierangela Samarati and Marten van Sinderen and Sabrina De Capitani di Vimercati and Fons Wijnhoven}, title = {Trusted Implementation and Enforcement of Application Security Policies}, booktitle = {E-Business and Telecommunications - 18th International Conference, {ICETE} 2021, Virtual Event, July 6-9, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1795}, pages = {362--388}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-36840-0\_16}, doi = {10.1007/978-3-031-36840-0\_16}, timestamp = {Tue, 07 May 2024 20:08:51 +0200}, biburl = {https://dblp.org/rec/conf/icete/Schlegel21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciscae/SongC21, author = {Yufei Song and Mingde Chu}, title = {Research on the Application of Data Encryption Technology in Computer Network Security Based on Machine Learning}, booktitle = {4th International Conference on Information Systems and Computer Aided Education, {ICISCAE} 2021, Dalian, China, September 24-26, 2021}, pages = {399--403}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICISCAE52414.2021.9590794}, doi = {10.1109/ICISCAE52414.2021.9590794}, timestamp = {Thu, 02 Dec 2021 14:50:28 +0100}, biburl = {https://dblp.org/rec/conf/iciscae/SongC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JacobQL21, author = {Stephen Jacob and Yuansong Qiao and Brian Lee}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Detecting Cyber Security Attacks against a Microservices Application using Distributed Tracing}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {588--595}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010308905880595}, doi = {10.5220/0010308905880595}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/JacobQL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcis/TomaCDFF21, author = {Andrea Toma and Niccol{\`{o}} Cecchinato and Carlo Drioli and Gian Luca Foresti and Giovanni Ferrin}, title = {CNN-based processing of radio frequency signals for augmenting acoustic source localization and enhancement in {UAV} security applications}, booktitle = {International Conference on Military Communication and Information Systems, {ICMCIS} 2021, The Hague, The Netherlands, May 4-5, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICMCIS52405.2021.9486424}, doi = {10.1109/ICMCIS52405.2021.9486424}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcis/TomaCDFF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/ElderZKSMW21, author = {Sarah Elder and Nusrat Zahan and Valeri Kozarev and Rui Shu and Tim Menzies and Laurie A. Williams}, title = {Structuring a Comprehensive Software Security Course Around the {OWASP} Application Security Verification Standard}, booktitle = {43rd {IEEE/ACM} International Conference on Software Engineering: Software Engineering Education and Training, {ICSE} {(SEET)} 2021, Madrid, Spain, May 25-28, 2021}, pages = {95--104}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICSE-SEET52601.2021.00019}, doi = {10.1109/ICSE-SEET52601.2021.00019}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/ElderZKSMW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icta3/XiFKGLZC21, author = {Yifang Xi and Xiaotong Fang and Yachen Kong and Yifan Guo and Hongzhe Lin and Xuepeng Zhan and Jiezhi Chen}, title = {Bits Mapping in Triple-level-cell {(TLC)} Charge-trap {(CT)} 3D {NAND} Flash Memory and its Applications to IoT Security}, booktitle = {2021 {IEEE} International Conference on Integrated Circuits, Technologies and Applications, {ICTA} 2021, Zhuhai, China, November 24-26, 2021}, pages = {69--71}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICTA53157.2021.9661687}, doi = {10.1109/ICTA53157.2021.9661687}, timestamp = {Mon, 06 Nov 2023 08:19:56 +0100}, biburl = {https://dblp.org/rec/conf/icta3/XiFKGLZC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idaacs/KuznetsovK21a, author = {Alexandr Kuznetsov and Kateryna Kuznetsova}, title = {Comment on "Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications"}, booktitle = {2021 11th {IEEE} International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Cracow, Poland, September 22-25, 2021}, pages = {485--488}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IDAACS53288.2021.9660983}, doi = {10.1109/IDAACS53288.2021.9660983}, timestamp = {Fri, 07 Jan 2022 10:36:47 +0100}, biburl = {https://dblp.org/rec/conf/idaacs/KuznetsovK21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iecon/MeyerHEK21, author = {Dominik Meyer and Jan Haase and Marcel Eckert and Bernd Klauer}, title = {A Modern Approach to Application Specific Processors for Improving the Security of Embedded Devices}, booktitle = {{IECON} 2021 - 47th Annual Conference of the {IEEE} Industrial Electronics Society, Toronto, ON, Canada, October 13-16, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IECON48115.2021.9589730}, doi = {10.1109/IECON48115.2021.9589730}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iecon/MeyerHEK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieeesec/ReuschP21, author = {Niklas Reusch and Paul Pop}, title = {Scheduling Real-Time Applications on Edge Computing Platforms with Remote Attestation for Security}, booktitle = {6th {IEEE/ACM} Symposium on Edge Computing, {SEC} 2021, San Jose, CA, USA, December 14-17, 2021}, pages = {403--408}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1145/3453142.3493510}, doi = {10.1145/3453142.3493510}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ieeesec/ReuschP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifipiot/Zingirian21, author = {Nicola Zingirian}, editor = {Luis M. Camarinha{-}Matos and Geert Heijenk and Srinivas Katkoori and Leon Strous}, title = {Cyber-Physical Application for the Safety and Security Enforcement in Oil and Gas Transportation}, booktitle = {Internet of Things. Technology and Applications - 4th {IFIP} International Cross-Domain Conference, IFIPIoT 2021, Virtual Event, November 4-5, 2021, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {641}, pages = {180--196}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-96466-5\_12}, doi = {10.1007/978-3-030-96466-5\_12}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifipiot/Zingirian21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indin/ColelliFFPP21, author = {Riccardo Colelli and Chiara Foglietta and Roberto Fusacchia and Stefano Panzieri and Federica Pascucci}, title = {Blockchain application in simulated environment for Cyber-Physical Systems Security}, booktitle = {19th {IEEE} International Conference on Industrial Informatics, {INDIN} 2021, Palma de Mallorca, Spain, July 21-23, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/INDIN45523.2021.9557446}, doi = {10.1109/INDIN45523.2021.9557446}, timestamp = {Mon, 18 Oct 2021 17:08:58 +0200}, biburl = {https://dblp.org/rec/conf/indin/ColelliFFPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipaw/SchreiberSHKGP21, author = {Andreas Schreiber and Tim Sonnekalb and Thomas S. Heinze and Lynn von Kurnatowski and Jes{\'{u}}s M. Gonz{\'{a}}lez{-}Barahona and Heather S. Packer}, editor = {Boris Glavic and Vanessa Braganholo and David Koop}, title = {Provenance-Based Security Audits and Its Application to {COVID-19} Contact Tracing Apps}, booktitle = {Provenance and Annotation of Data and Processes - 8th and 9th International Provenance and Annotation Workshop, {IPAW} 2020 + {IPAW} 2021, Virtual Event, July 19-22, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12839}, pages = {88--105}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-80960-7\_6}, doi = {10.1007/978-3-030-80960-7\_6}, timestamp = {Wed, 21 Jul 2021 15:51:06 +0200}, biburl = {https://dblp.org/rec/conf/ipaw/SchreiberSHKGP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SunKHP21, author = {Ying Sun and Qingchao Kong and Luwen Huangfu and Jin Pan}, title = {Domain-oriented News Recommendation in Security Applications}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624817}, doi = {10.1109/ISI53945.2021.9624817}, timestamp = {Tue, 07 Dec 2021 17:02:14 +0100}, biburl = {https://dblp.org/rec/conf/isi/SunKHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/TanCC21, author = {Vincent Tan and Carmen Cheh and Binbin Chen}, title = {From Application Security Verification Standard {(ASVS)} to Regulation Compliance: {A} Case Study in Financial Services Sector}, booktitle = {{IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2021 - Workshops, Wuhan, China, October 25-28, 2021}, pages = {69--76}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISSREW53611.2021.00046}, doi = {10.1109/ISSREW53611.2021.00046}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/TanCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/NielsenTM21, author = {Benjamin Barslev Nielsen and Martin Toldam Torp and Anders M{\o}ller}, editor = {Cristian Cadar and Xiangyu Zhang}, title = {Modular call graph construction for security scanning of Node.js applications}, booktitle = {{ISSTA} '21: 30th {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, Virtual Event, Denmark, July 11-17, 2021}, pages = {29--41}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460319.3464836}, doi = {10.1145/3460319.3464836}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issta/NielsenTM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/Rahkema21, author = {Kristiina Rahkema}, title = {Quality analysis of mobile applications with special focus on security aspects}, booktitle = {36th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2021, Melbourne, Australia, November 15-19, 2021}, pages = {1087--1089}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ASE51524.2021.9678681}, doi = {10.1109/ASE51524.2021.9678681}, timestamp = {Mon, 24 Jan 2022 16:18:34 +0100}, biburl = {https://dblp.org/rec/conf/kbse/Rahkema21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec2/TaoDHYQLM21, author = {Haoran Tao and Ning Ding and Tianhui Huang and Kehan Yu and Dongsheng Qian and Yan Luo and Yuyin Ma}, editor = {Ilsun You and Hwankuk Kim and Taek{-}Young Youn and Francesco Palmieri and Igor V. Kotenko}, title = {Security Association Model: Interdisciplinary Application of 5G Positioning Technology and Social Network}, booktitle = {Mobile Internet Security - 5th International Symposium, MobiSec 2021, Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1544}, pages = {408--419}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-9576-6\_28}, doi = {10.1007/978-981-16-9576-6\_28}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisec2/TaoDHYQLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mwscas/TengbergF21, author = {Tanner Tengberg and Ayman A. Fayed}, title = {A Dual-Frequency Single-Inductor Single-Output {DC-DC} Converter Topology with Spur-Free Switching for Security Applications}, booktitle = {64th {IEEE} International Midwest Symposium on Circuits and Systems, {MWSCAS} 2021, Lansing, MI, USA, August 9-11, 2021}, pages = {974--977}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/MWSCAS47672.2021.9531746}, doi = {10.1109/MWSCAS47672.2021.9531746}, timestamp = {Sun, 03 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mwscas/TengbergF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Barradas00SRM21, author = {Diogo Barradas and Nuno Santos and Lu{\'{\i}}s Rodrigues and Salvatore Signorello and Fernando M. V. Ramos and Andr{\'{e}} Madeira}, title = {FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/flowlens-enabling-efficient-flow-classification-for-ml-based-network-security-applications/}, timestamp = {Thu, 17 Jun 2021 15:42:26 +0200}, biburl = {https://dblp.org/rec/conf/ndss/Barradas00SRM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/HerbautCRM21, author = {Nicolas Herbaut and Camilo Correa and Jacques Robin and Ra{\'{u}}l Mazo}, editor = {Kohei Shiomoto and Young{-}Tak Kim and Christian Esteve Rothenberg and Barbara Martini and Eiji Oki and Baek{-}Young Choi and Noriaki Kamiyama and Stefano Secci}, title = {{SDN} Intent-based conformance checking: application to security policies}, booktitle = {7th {IEEE} International Conference on Network Softwarization, NetSoft 2021, Tokyo, Japan, June 28 - July 2, 2021}, pages = {181--185}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/NetSoft51509.2021.9492679}, doi = {10.1109/NETSOFT51509.2021.9492679}, timestamp = {Mon, 02 Aug 2021 16:43:02 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/HerbautCRM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/McNieceLR21, author = {Matthew R. McNiece and Ruidan Li and Bradley Reaves}, editor = {Oliver Hohlfeld and Andra Lutu and Dave Levin}, title = {Characterizing the Security of Endogenous and Exogenous Desktop Application Network Flows}, booktitle = {Passive and Active Measurement - 22nd International Conference, {PAM} 2021, Virtual Event, March 29 - April 1, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12671}, pages = {531--546}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-72582-2\_31}, doi = {10.1007/978-3-030-72582-2\_31}, timestamp = {Tue, 30 Mar 2021 18:55:05 +0200}, biburl = {https://dblp.org/rec/conf/pam/McNieceLR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/PaulLMR21, author = {Pangkaj Chandra Paul and John Loane and Fergal McCaffery and Gilbert Regan}, title = {A Data Security And Privacy Risk Management Framework For {WBAN} Based Healthcare Applications}, booktitle = {19th {IEEE} International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2021, Kassel, Germany, March 22-26, 2021}, pages = {704--710}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/PerComWorkshops51409.2021.9431069}, doi = {10.1109/PERCOMWORKSHOPS51409.2021.9431069}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/percom/PaulLMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/LudtkeKBS21, author = {Steffen L{\"{u}}dtke and Roman Kraus and Ramon Barakat and Martin A. Schneider}, title = {Attack-based Automation of Security Testing for IoT Applications with Genetic Algorithms and Fuzzing}, booktitle = {21st {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2021 - Companion, Hainan, China, December 6-10, 2021}, pages = {92--100}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/QRS-C55045.2021.00023}, doi = {10.1109/QRS-C55045.2021.00023}, timestamp = {Tue, 12 Apr 2022 17:57:49 +0200}, biburl = {https://dblp.org/rec/conf/qrs/LudtkeKBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/Sasaki21, author = {Ry{\^{o}}ichi Sasaki}, title = {Application of Risk Assessment Method to Local Government Security Models}, booktitle = {21st {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2021 - Companion, Hainan, China, December 6-10, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/QRS-C55045.2021.00121}, doi = {10.1109/QRS-C55045.2021.00121}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/qrs/Sasaki21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rcar/HuZX021, author = {Jia Hu and Chuanshen Zhang and Sheng Xu and Chunjie Chen}, title = {An Invasive Target Detection and Localization Strategy Using Pan-Tilt-Zoom Cameras for Security Applications}, booktitle = {{IEEE} International Conference on Real-time Computing and Robotics, {RCAR} 2021, Xining, China, July 15-19, 2021}, pages = {1236--1241}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/RCAR52367.2021.9517521}, doi = {10.1109/RCAR52367.2021.9517521}, timestamp = {Thu, 23 Sep 2021 11:37:41 +0200}, biburl = {https://dblp.org/rec/conf/rcar/HuZX021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/roedunet/ContaselTP21, author = {Cristian Contasel and Dumitru{-}Cristian Tranca and Alexandru{-}Viorel Palacean}, title = {Cloud based mobile application security enforcement using device attestation {API}}, booktitle = {2021 20th RoEduNet Conference: Networking in Education and Research (RoEduNet), Iasi, Romania, November 4-6, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/RoEduNet54112.2021.9638302}, doi = {10.1109/ROEDUNET54112.2021.9638302}, timestamp = {Thu, 16 Dec 2021 10:06:47 +0100}, biburl = {https://dblp.org/rec/conf/roedunet/ContaselTP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/roedunet/ZahariaSD21, author = {Corneliu Zaharia and Florin Sandu and Gabriel Danciu}, title = {Adaptive Scaling for Image Sensors in Embedded Security Applications}, booktitle = {2021 20th RoEduNet Conference: Networking in Education and Research (RoEduNet), Iasi, Romania, November 4-6, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/RoEduNet54112.2021.9638265}, doi = {10.1109/ROEDUNET54112.2021.9638265}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/roedunet/ZahariaSD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtss/JiangLZJ21, author = {Wei Jiang and Xinke Liao and Jinyu Zhan and Ke Jiang}, title = {Work-in-Progress: Improving Resilience of Distributed Real-Time Applications via Security and Fault Tolerance Co-Design}, booktitle = {42nd {IEEE} Real-Time Systems Symposium, {RTSS} 2021, Dortmund, Germany, December 7-10, 2021}, pages = {536--539}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/RTSS52674.2021.00059}, doi = {10.1109/RTSS52674.2021.00059}, timestamp = {Mon, 25 Jul 2022 07:51:00 +0200}, biburl = {https://dblp.org/rec/conf/rtss/JiangLZJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Schlegel21, author = {Marius Schlegel}, editor = {Jorge Lobo and Roberto Di Pietro and Omar Chowdhury and Hongxin Hu}, title = {Poster: Shielding AppSPEAR - Enhancing Memory Safety for Trusted Application-level Security Policy Enforcement}, booktitle = {{SACMAT} '21: The 26th {ACM} Symposium on Access Control Models and Technologies, Virtual Event, Spain, June 16-18, 2021}, pages = {99--101}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3450569.3464396}, doi = {10.1145/3450569.3464396}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/Schlegel21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/KloibhoferKE21, author = {Reinhard Kloibhofer and Erwin Kristen and Afshin Ameri E}, editor = {Ibrahim Habli and Mark Sujan and Simos Gerasimou and Erwin Schoitsch and Friedemann Bitsch}, title = {LoRaWAN with {HSM} as a Security Improvement for Agriculture Applications - Evaluation}, booktitle = {Computer Safety, Reliability, and Security. {SAFECOMP} 2021 Workshops - DECSoS, MAPSOD, DepDevOps, USDAI, and WAISE, York, UK, September 7, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12853}, pages = {128--140}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-83906-2\_10}, doi = {10.1007/978-3-030-83906-2\_10}, timestamp = {Thu, 26 Aug 2021 14:31:10 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/KloibhoferKE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PernprunerSR21, author = {Marco Pernpruner and Giada Sciarretta and Silvio Ranise}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Framework for Security and Risk Analysis of Enrollment Procedures: Application to Fully-remote Solutions based on eDocuments}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {222--233}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010554502220233}, doi = {10.5220/0010554502220233}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PernprunerSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Schlegel21, author = {Marius Schlegel}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Trusted Enforcement of Application-specific Security Policies}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {343--355}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010579703430355}, doi = {10.5220/0010579703430355}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Schlegel21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sera/JosephZE21, author = {Ryan B. Joseph and Minhaz F. Zibran and Farjana Z. Eishita}, title = {Choosing the Weapon: {A} Comparative Study of Security Analyzers for Android Applications}, booktitle = {19th {IEEE/ACIS} International Conference on Software Engineering Research, Management and Applications, {SERA} 2021, Kanazawa, Japan, June 20-22, 2021}, pages = {51--57}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SERA51205.2021.9509271}, doi = {10.1109/SERA51205.2021.9509271}, timestamp = {Fri, 13 Aug 2021 10:40:52 +0200}, biburl = {https://dblp.org/rec/conf/sera/JosephZE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartiot/ChaSLH21, author = {Shi{-}Cho Cha and Chuang{-}Ming Shiung and Gwan{-}Yen Lin and Yi{-}Hsuan Hung}, title = {A Security Risk Management Framework for Permissioned Blockchain Applications}, booktitle = {{IEEE} International Conference on Smart Internet of Things, SmartIoT 2021, Jeju, Republic of Korea, August 13-15, 2021}, pages = {301--310}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SmartIoT52359.2021.00055}, doi = {10.1109/SMARTIOT52359.2021.00055}, timestamp = {Sat, 25 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smartiot/ChaSLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/GravinGKL21, author = {Nick Gravin and Siyao Guo and Tsz Chiu Kwok and Pinyan Lu}, editor = {D{\'{a}}niel Marx}, title = {Concentration bounds for almost \emph{k}-wise independence with applications to non-uniform security}, booktitle = {Proceedings of the 2021 {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2021, Virtual Conference, January 10 - 13, 2021}, pages = {2404--2423}, publisher = {{SIAM}}, year = {2021}, url = {https://doi.org/10.1137/1.9781611976465.143}, doi = {10.1137/1.9781611976465.143}, timestamp = {Thu, 15 Jul 2021 13:48:55 +0200}, biburl = {https://dblp.org/rec/conf/soda/GravinGKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/somet/ZiadiaMF21, author = {Marwa Ziadia and Mohamed Mejri and Jaouhar Fattahi}, editor = {Hamido Fujita and H{\'{e}}ctor P{\'{e}}rez{-}Meana}, title = {Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting}, booktitle = {New Trends in Intelligent Software Methodologies, Tools and Techniques - Proceedings of the 20th International Conference on New Trends in Intelligent Software Methodologies, Tools and Techniques, SoMeT 202, Cancun, Mexico, 21-23 September, 2021}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {337}, pages = {85--98}, publisher = {{IOS} Press}, year = {2021}, url = {https://doi.org/10.3233/FAIA210011}, doi = {10.3233/FAIA210011}, timestamp = {Fri, 24 Sep 2021 11:30:21 +0200}, biburl = {https://dblp.org/rec/conf/somet/ZiadiaMF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CecchettiYNM21, author = {Ethan Cecchetti and Siqiu Yao and Haobin Ni and Andrew C. Myers}, title = {Compositional Security for Reentrant Applications}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {1249--1267}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00084}, doi = {10.1109/SP40001.2021.00084}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/CecchettiYNM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BrinzaCP21, author = {Mihail Brinza and Miguel Correia and Jo{\~{a}}o Pereira}, title = {Virtual Static Security Analyzer for Web Applications}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {840--848}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00119}, doi = {10.1109/TRUSTCOM53373.2021.00119}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BrinzaCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Poniszewska-Maranda21a, author = {Aneta Poniszewska{-}Maranda and Lukasz Chomatek and Joanna Ochelska{-}Mierzejewska}, title = {Secure Development Strategy Model Framework for Security of Mobile Applications}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {1294--1299}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00178}, doi = {10.1109/TRUSTCOM53373.2021.00178}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Poniszewska-Maranda21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uemcom/DasS21, author = {Saikat Das and Sajjan G. Shiva}, title = {Machine Learning application lifecycle augmented with explanation and security}, booktitle = {12th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile Communication Conference, {UEMCON} 2021, New York, NY, USA, December 1-4, 2021}, pages = {171--177}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/UEMCON53757.2021.9666619}, doi = {10.1109/UEMCON53757.2021.9666619}, timestamp = {Tue, 18 Jan 2022 17:38:45 +0100}, biburl = {https://dblp.org/rec/conf/uemcom/DasS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BrinkmannDMP0SS21, author = {Marcus Brinkmann and Christian Dresen and Robert Merget and Damian Poddebniak and Jens M{\"{u}}ller and Juraj Somorovsky and J{\"{o}}rg Schwenk and Sebastian Schinzel}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{ALPACA:} Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in {TLS} Authentication}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4293--4310}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/brinkmann}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/BrinkmannDMP0SS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BulekovJE21, author = {Alexander Bulekov and Rasoul Jahanshahi and Manuel Egele}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Saphire: Sandboxing {PHP} Applications with Tailored System Call Allowlists}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2881--2898}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/bulekov}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BulekovJE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Chen0JCJ21, author = {Yizheng Chen and Shiqi Wang and Weifan Jiang and Asaf Cidon and Suman Jana}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Cost-Aware Robust Tree Ensembles for Security Applications}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2291--2308}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-yizheng}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Chen0JCJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KimKRCKKXT21, author = {Taegyu Kim and Vireshwar Kumar and Junghwan Rhee and Jizhou Chen and Kyungtae Kim and Chung Hwan Kim and Dongyan Xu and Dave (Jing) Tian}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{PASAN:} Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {249--266}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/kim}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KimKRCKKXT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OltroggeHAA0F21, author = {Marten Oltrogge and Nicolas Huaman and Sabrina Amft and Yasemin Acar and Michael Backes and Sascha Fahl}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Why Eve and Mallory Still Love Android: Revisiting {TLS} (In)Security in Android Applications}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4347--4364}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/oltrogge}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/OltroggeHAA0F21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SuSDL0XL21, author = {Liya Su and Xinyue Shen and Xiangyu Du and Xiaojing Liao and XiaoFeng Wang and Luyi Xing and Baoxu Liu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1307--1324}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/su}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SuSDL0XL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TolleyKKVC21, author = {William J. Tolley and Beau Kujath and Mohammad Taha Khan and Narseo Vallina{-}Rodriguez and Jedidiah R. Crandall}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Blind In/On-Path Attacks and Applications to VPNs}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3129--3146}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/tolley}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/TolleyKKVC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TychalasBM21, author = {Dimitrios Tychalas and Hadjer Benkraouda and Michail Maniatakos}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in {ICS} Control Applications}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2847--2862}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/tychalas}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/TychalasBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/UzunCKBL21, author = {Erkam Uzun and Simon P. Chung and Vladimir Kolesnikov and Alexandra Boldyreva and Wenke Lee}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {911--928}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/uzun}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/UzunCKBL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Weng0XK021, author = {Chenkai Weng and Kang Yang and Xiang Xie and Jonathan Katz and Xiao Wang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {501--518}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/weng}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Weng0XK021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Yang0HCAX021, author = {Limin Yang and Wenbo Guo and Qingying Hao and Arridhana Ciptadi and Ali Ahmadzadeh and Xinyu Xing and Gang Wang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{CADE:} Detecting and Explaining Concept Drift Samples for Security Applications}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2327--2344}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/yang-limin}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Yang0HCAX021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SchreiberSK21, author = {Andreas Schreiber and Tim Sonnekalb and Lynn von Kurnatowski}, title = {Towards Visual Analytics Dashboards for Provenance-driven Static Application Security Testing}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021, New Orleans, LA, USA, October 27, 2021}, pages = {42--46}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VizSec53666.2021.00010}, doi = {10.1109/VIZSEC53666.2021.00010}, timestamp = {Mon, 13 Dec 2021 16:21:38 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/SchreiberSK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/ChangC0W21, author = {Wei{-}Chun Chang and Yao Chiang and Yi Zhang and Hung{-}Yu Wei}, title = {Edge Computing Dynamic Resource Management: Tradeoffs Between Security and Application QoE}, booktitle = {94th {IEEE} Vehicular Technology Conference, {VTC} Fall 2021, Norman, OK, USA, September 27-30, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VTC2021-Fall52928.2021.9625050}, doi = {10.1109/VTC2021-FALL52928.2021.9625050}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vtc/ChangC0W21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/21/KhanR21, author = {Firoz Khan and Lakshmana Kumar Ramasamy}, editor = {Mostafa Al{-}Emran and Khaled Shaalan and Aboul Ella Hassanien}, title = {Web Services Security Using Semantic Technology}, booktitle = {Recent Advances in Intelligent Systems and Smart Applications}, series = {Studies in Systems, Decision and Control}, volume = {295}, pages = {403--427}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-47411-9\_22}, doi = {10.1007/978-3-030-47411-9\_22}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/21/KhanR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/21/MaitraGS21, author = {Tanmoy Maitra and Debasis Giri and Arup Sarkar}, title = {Security in Critical Communication for Mobile Edge Computing Based IoE Applications}, booktitle = {Mobile Edge Computing}, pages = {315--332}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-69893-5\_13}, doi = {10.1007/978-3-030-69893-5\_13}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/21/MaitraGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2021, title = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832}, doi = {10.1145/3485832}, isbn = {978-1-4503-8579-4}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2021-1, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13090}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92062-3}, doi = {10.1007/978-3-030-92062-3}, isbn = {978-3-030-92061-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2021-2, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13091}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92075-3}, doi = {10.1007/978-3-030-92075-3}, isbn = {978-3-030-92074-6}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2021-3, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13092}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92078-4}, doi = {10.1007/978-3-030-92078-4}, isbn = {978-3-030-92077-7}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2021-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2021-4, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13093}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92068-5}, doi = {10.1007/978-3-030-92068-5}, isbn = {978-3-030-92067-8}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2021-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2021, editor = {Anupam Joshi and Barbara Carminati and Rakesh M. Verma}, title = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3422337}, doi = {10.1145/3422337}, isbn = {978-1-4503-8143-7}, timestamp = {Wed, 21 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/conext/2021daisnac, title = {DAI-SNAC@CoNEXT 2021: Proceedings of the 2021 Workshop on Descriptive Approaches to IoT Security, Network, and Application Configuration, Virtual Event, Munich, Germany, 7 December 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3488661}, doi = {10.1145/3488661}, isbn = {978-1-4503-9136-8}, timestamp = {Wed, 08 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/2021daisnac.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2021, editor = {Ken Barker and Kambiz Ghazinour}, title = {Data and Applications Security and Privacy {XXXV} - 35th Annual {IFIP} {WG} 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12840}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81242-3}, doi = {10.1007/978-3-030-81242-3}, isbn = {978-3-030-81241-6}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fdse/2021ccis, editor = {Tran Khanh Dang and Josef K{\"{u}}ng and Tai M. Chung and Makoto Takizawa}, title = {Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications - 8th International Conference, {FDSE} 2021, Virtual Event, November 24-26, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1500}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-8062-5}, doi = {10.1007/978-981-16-8062-5}, isbn = {978-981-16-8061-8}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdse/2021ccis.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tpsisa/2021, title = {3rd {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta, GA, USA, December 13-15, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TPS-ISA52974.2021}, doi = {10.1109/TPS-ISA52974.2021}, isbn = {978-1-6654-1623-8}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2021, editor = {Hyoungshick Kim}, title = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0}, doi = {10.1007/978-3-030-89432-0}, isbn = {978-3-030-89431-3}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-03253, author = {Guosong Yang and Radha Poovendran and Jo{\~{a}}o P. Hespanha}, title = {Adaptive Learning in Two-Player Stackelberg Games with Application to Network Security}, journal = {CoRR}, volume = {abs/2101.03253}, year = {2021}, url = {https://arxiv.org/abs/2101.03253}, eprinttype = {arXiv}, eprint = {2101.03253}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-03253.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-05088, author = {Sarah Elder and Nusrat Zahan and Val Kozarev and Rui Shu and Tim Menzies and Laurie A. Williams}, title = {Structuring a Comprehensive Software Security Course Around the {OWASP} Application Security Verification Standard}, journal = {CoRR}, volume = {abs/2103.05088}, year = {2021}, url = {https://arxiv.org/abs/2103.05088}, eprinttype = {arXiv}, eprint = {2103.05088}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-05088.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-08577, author = {Ethan Cecchetti and Siqiu Yao and Haobin Ni and Andrew C. Myers}, title = {Compositional Security for Reentrant Applications}, journal = {CoRR}, volume = {abs/2103.08577}, year = {2021}, url = {https://arxiv.org/abs/2103.08577}, eprinttype = {arXiv}, eprint = {2103.08577}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-08577.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-01970, author = {Marius Schlegel}, title = {Trusted Enforcement of Application-specific Security Policies}, journal = {CoRR}, volume = {abs/2105.01970}, year = {2021}, url = {https://arxiv.org/abs/2105.01970}, eprinttype = {arXiv}, eprint = {2105.01970}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-01970.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-04773, author = {Rajat Gupta and Madhu Viswanatham V. and Manikandan K}, title = {An Innovative Security Strategy using Reactive Web Application Honeypot}, journal = {CoRR}, volume = {abs/2105.04773}, year = {2021}, url = {https://arxiv.org/abs/2105.04773}, eprinttype = {arXiv}, eprint = {2105.04773}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-04773.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-05937, author = {Vladimir Vakhter and Betul Soysal and Patrick Schaumont and Ulkuhan Guler}, title = {Security for Emerging Miniaturized Wireless Biomedical Devices: Threat Modeling with Application to Case Studies}, journal = {CoRR}, volume = {abs/2105.05937}, year = {2021}, url = {https://arxiv.org/abs/2105.05937}, eprinttype = {arXiv}, eprint = {2105.05937}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-05937.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-13634, author = {Eman Alashwali and Fatimah Alashwali}, title = {Saudi Parents' Security and Privacy Concerns about their Children's Smart Device Applications}, journal = {CoRR}, volume = {abs/2105.13634}, year = {2021}, url = {https://arxiv.org/abs/2105.13634}, eprinttype = {arXiv}, eprint = {2105.13634}, timestamp = {Fri, 16 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-13634.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-13524, author = {Jagruti Sahoo}, title = {Cost-efficient, QoS and Security aware Placement of Smart Farming IoT Applications in Cloud-Fog Infrastructure}, journal = {CoRR}, volume = {abs/2106.13524}, year = {2021}, url = {https://arxiv.org/abs/2106.13524}, eprinttype = {arXiv}, eprint = {2106.13524}, timestamp = {Wed, 30 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-13524.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-01921, author = {Roland Croft and Dominic Newlands and Ziyu Chen and Muhammad Ali Babar}, title = {An Empirical Study of Rule-Based and Learning-Based Approaches for Static Application Security Testing}, journal = {CoRR}, volume = {abs/2107.01921}, year = {2021}, url = {https://arxiv.org/abs/2107.01921}, eprinttype = {arXiv}, eprint = {2107.01921}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-01921.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-07300, author = {Angel Luis Scull Pupo and Jens Nicolay and Elisa Gonzalez Boix}, title = {Deriving Static Security Testing from Runtime Security Protection for Web Applications}, journal = {CoRR}, volume = {abs/2107.07300}, year = {2021}, url = {https://arxiv.org/abs/2107.07300}, eprinttype = {arXiv}, eprint = {2107.07300}, timestamp = {Wed, 21 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-07300.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-13754, author = {I Wayan Budi Sentana and Muhammad Ikram and Mohamed Ali K{\^{a}}afar and Shlomo Berkovsky}, title = {Empirical Security and Privacy Analysis of Mobile Symptom Checking Applications on Google Play}, journal = {CoRR}, volume = {abs/2107.13754}, year = {2021}, url = {https://arxiv.org/abs/2107.13754}, eprinttype = {arXiv}, eprint = {2107.13754}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-13754.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-02352, author = {Sotirios Brotsis and Konstantinos Limniotis and Gueltoum Bendiab and Nicholas Kolokotronis and Stavros Shiaeles}, title = {On the Suitability of Blockchain Platforms for IoT Applications: Architectures, Security, Privacy, and Performance}, journal = {CoRR}, volume = {abs/2109.02352}, year = {2021}, url = {https://arxiv.org/abs/2109.02352}, eprinttype = {arXiv}, eprint = {2109.02352}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-02352.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-03621, author = {Sotirios Brotsis and Nicholas Kolokotronis and Konstantinos Limniotis and Stavros Shiaeles}, title = {On the Security of Permissioned Blockchain Solutions for IoT Applications}, journal = {CoRR}, volume = {abs/2109.03621}, year = {2021}, url = {https://arxiv.org/abs/2109.03621}, eprinttype = {arXiv}, eprint = {2109.03621}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-03621.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-11495, author = {Dongqi Han and Zhiliang Wang and Wenqi Chen and Ying Zhong and Su Wang and Han Zhang and Jiahai Yang and Xingang Shi and Xia Yin}, title = {DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications}, journal = {CoRR}, volume = {abs/2109.11495}, year = {2021}, url = {https://arxiv.org/abs/2109.11495}, eprinttype = {arXiv}, eprint = {2109.11495}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-11495.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-05562, author = {Manar H. Alalfi and Sajeda Parveen and Bara' Nazzal}, title = {A Mutation Framework for Evaluating Security Analysis tools in IoT Applications}, journal = {CoRR}, volume = {abs/2110.05562}, year = {2021}, url = {https://arxiv.org/abs/2110.05562}, eprinttype = {arXiv}, eprint = {2110.05562}, timestamp = {Thu, 21 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-05562.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-12974, author = {Riccardo Colelli and Chiara Foglietta and Roberto Fusacchia and Stefano Panzieri and Federica Pascucci}, title = {Blockchain application in simulated environment for Cyber-Physical Systems Security}, journal = {CoRR}, volume = {abs/2110.12974}, year = {2021}, url = {https://arxiv.org/abs/2110.12974}, eprinttype = {arXiv}, eprint = {2110.12974}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-12974.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-02268, author = {Liang Wang and Prateek Mittal and Jennifer Rexford}, title = {Data-Plane Security Applications in Adversarial Settings}, journal = {CoRR}, volume = {abs/2111.02268}, year = {2021}, url = {https://arxiv.org/abs/2111.02268}, eprinttype = {arXiv}, eprint = {2111.02268}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-02268.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-03573, author = {David G. Balash and Xiaoyuan Wu and Miles Grant and Irwin Reyes and Adam J. Aviv}, title = {Security and Privacy Perceptions of Third-Party Application Access for Google Accounts (Extended Version)}, journal = {CoRR}, volume = {abs/2111.03573}, year = {2021}, url = {https://arxiv.org/abs/2111.03573}, eprinttype = {arXiv}, eprint = {2111.03573}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-03573.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-04778, author = {Pierre{-}Yves Piriou and Olivier Boudeville and Gilles Deleuze and Sara {Tucci Piergiovanni} and {\"{O}}nder G{\"{u}}rcan}, title = {Justifying the Dependability and Security of Business-Critical Blockchain-based Applications}, journal = {CoRR}, volume = {abs/2112.04778}, year = {2021}, url = {https://arxiv.org/abs/2112.04778}, eprinttype = {arXiv}, eprint = {2112.04778}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-04778.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-09296, author = {Zulfiqar Ali Khan and Akbar Siami Namin}, title = {A Survey on the Applications of Blockchains in Security of IoT Systems}, journal = {CoRR}, volume = {abs/2112.09296}, year = {2021}, url = {https://arxiv.org/abs/2112.09296}, eprinttype = {arXiv}, eprint = {2112.09296}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-09296.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/Han21, author = {Hui Han}, title = {Standardisation for Security Applications and Technologies}, journal = {{ERCIM} News}, volume = {2021}, number = {126}, year = {2021}, url = {https://ercim-news.ercim.eu/en126/r-i/standardisation-for-security-applications-and-technologies}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/Han21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Huguenin-Dumittan21, author = {Lo{\"{\i}}s Huguenin{-}Dumittan and Serge Vaudenay}, title = {A note on IND-qCCA security in the {ROM} and its applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {844}, year = {2021}, url = {https://eprint.iacr.org/2021/844}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Huguenin-Dumittan21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MunchSY21, author = {Jean{-}Pierre M{\"{u}}nch and Thomas Schneider and Hossein Yalame}, title = {{VASA:} Vector {AES} Instructions for Security Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1493}, year = {2021}, url = {https://eprint.iacr.org/2021/1493}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MunchSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SeresHB21, author = {Istv{\'{a}}n Andr{\'{a}}s Seres and M{\'{a}}t{\'{e}} Horv{\'{a}}th and P{\'{e}}ter Burcsi}, title = {The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2021}, url = {https://eprint.iacr.org/2021/182}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SeresHB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/MayuranathanMD21a, title = {Enhanced security in cloud applications using emerging blockchain security algorithm}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {12}, number = {7}, pages = {6933--6945}, year = {2021}, note = {Withdrawn.}, url = {https://doi.org/10.1007/s12652-020-02339-7}, doi = {10.1007/S12652-020-02339-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/MayuranathanMD21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/MishraSA21, title = {Analysis of security issues of cloud-based web applications}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {12}, number = {7}, pages = {7051--7062}, year = {2021}, note = {Withdrawn.}, url = {https://doi.org/10.1007/s12652-020-02370-8}, doi = {10.1007/S12652-020-02370-8}, timestamp = {Fri, 20 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/MishraSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/SikkaAS21, title = {High-throughput field-programable gate array implementation of the advanced encryption standard algorithm for automotive security applications}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {12}, number = {7}, pages = {7273--7279}, year = {2021}, note = {Withdrawn.}, url = {https://doi.org/10.1007/s12652-020-02403-2}, doi = {10.1007/S12652-020-02403-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/SikkaAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/JamaliBHAN20, author = {Mohammad Ali Jabraeil Jamali and Bahareh Bahrami and Arash Heidari and Parisa Allahverdizadeh and Farhad Norouzi}, title = {Towards the Internet of Things - Architectures, Security, and Applications}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-18468-1}, doi = {10.1007/978-3-030-18468-1}, isbn = {978-3-030-18467-4}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/JamaliBHAN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Damir20, author = {Mohamed Taoufiq Damir}, title = {Well-Rounded Lattices and Applications to Physical Layer Security}, school = {Aalto University, Espoo, Finland}, year = {2020}, url = {https://aaltodoc.aalto.fi/handle/123456789/47215}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Damir20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Erozan20, author = {Ahmet Turan Erozan}, title = {Security Aspects of Printed Electronics Applications}, school = {Karlsruhe University, Germany}, year = {2020}, url = {https://publikationen.bibliothek.kit.edu/1000121179}, doi = {10.5445/IR/1000121179}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Erozan20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Ramnath20a, author = {Vishalini R. Laguduva}, title = {Machine Learning for the Internet of Things: Applications, Implementation, and Security}, school = {University of South Florida, Tampa, {USA}}, year = {2020}, url = {https://digitalcommons.usf.edu/etd/8240}, timestamp = {Thu, 29 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Ramnath20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Brasser20, author = {Franz Ferdinand Peter Brasser}, title = {Enclave Computing Paradigm: Hardware-assisted Security Architectures {\&} Applications}, school = {Technical University of Darmstadt, Germany}, year = {2020}, url = {http://tuprints.ulb.tu-darmstadt.de/11912/}, urn = {urn:nbn:de:tuda-tuprints-119123}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Brasser20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Hecker20, author = {Martin Hecker}, title = {Timing Sensitive Dependency Analysis and its Application to Software Security}, school = {Karlsruhe Institute of Technology, Germany}, year = {2020}, url = {https://nbn-resolving.org/urn:nbn:de:101:1-2020093004585089743391}, urn = {urn:nbn:de:101:1-2020093004585089743391}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Hecker20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Staicu20, author = {Cristian{-}Alexandru Staicu}, title = {Enhancing the Security and Privacy of Full-Stack JavaScript Web Applications}, school = {Darmstadt University of Technology, Germany}, year = {2020}, url = {http://tuprints.ulb.tu-darmstadt.de/11808/}, urn = {urn:nbn:de:tuda-tuprints-118087}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Staicu20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/AlAni20a, author = {Ruqayah Al{-}Ani}, title = {A pseudonym-based solution for efficient security and enhanced privacy in {VANET} safety applications}, school = {Liverpool John Moores University, {UK}}, year = {2020}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.815674}, doi = {10.24377/LJMU.T.00013661}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/AlAni20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Mitev20, author = {Miroslav Mitev}, title = {Physical layer security for IoT applications}, school = {University of Essex, Colchester, {UK}}, year = {2020}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.821990}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/ethos/Mitev20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Brejon20, author = {Jean{-}Baptiste Br{\'{e}}jon}, title = {Quantification de la s{\'{e}}curit{\'{e}} des applications en pr{\'{e}}sence d'attaques physiques et d{\'{e}}tection de chemins d'attaques. (Software security quantifcation before physical attacks and detection of attack paths)}, school = {Pierre and Marie Curie University, Paris, France}, year = {2020}, url = {https://tel.archives-ouvertes.fr/tel-03140951}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/hal/Brejon20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Mai20, author = {Hoang Long Mai}, title = {Towards a Content-oriented Security Plane for Named Data Networking : Application to Content Poisoning Attack. (S{\'{e}}curit{\'{e}} orient{\'{e}}e contenu pour les r{\'{e}}seaux {NDN} - application aux attaques par empoisonnement de type {CPA)}}, school = {University of Technology of Troyes, France}, year = {2020}, url = {https://tel.archives-ouvertes.fr/tel-03808702}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/hal/Mai20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Rasoamiaramanana20, author = {Sandra Rasoamiaramanana}, title = {Design of white-box encryption schemes for mobile applications security. (Conception de sch{\'{e}}mas de chiffrement bo{\^{\i}}te blanche pour la s{\'{e}}curit{\'{e}} des applications mobiles)}, school = {University of Lorraine, Nancy, France}, year = {2020}, url = {https://tel.archives-ouvertes.fr/tel-02949394}, timestamp = {Tue, 03 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/hal/Rasoamiaramanana20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/tr/Demirci20, author = {Sedef Demirci}, title = {Sanal a{\u{g}} g{\"{u}}venli{\u{g}}i fonksiyonlar{\i}n{\i}n enerji etkinyerle{\c{s}}tirilmesi: Y{\"{o}}ntem {\"{o}}nerileri ve uygulama (Energy efficient placement of virtual security functions:Method proposals and application)}, school = {Gazi University, Turkey}, year = {2020}, url = {https://tez.yok.gov.tr/UlusalTezMerkezi/tezDetay.jsp?id=ent3Mo1UqSZIiX13Ajs7HQ\&no=xg9mTZ0f6b2ux20wvZFnZw}, timestamp = {Sun, 19 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/tr/Demirci20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Mirzamohammadi20, author = {Saeed Mirzamohammadi}, title = {Security Monitor for Mobile Devices: Design and Applications}, school = {University of California, Irvine, {USA}}, year = {2020}, url = {https://www.escholarship.org/uc/item/2rx8j3s0}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Mirzamohammadi20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/AlrabaeeDSWYRNMHH20, author = {Saed Alrabaee and Mourad Debbabi and Paria Shirani and Lingyu Wang and Amr M. Youssef and Ashkan Rahimian and Lina Nouh and Djedjiga Mouheb and He Huang and Aiman Hanna}, title = {Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting}, series = {Advances in Information Security}, volume = {78}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-34238-8}, doi = {10.1007/978-3-030-34238-8}, isbn = {978-3-030-34237-1}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/AlrabaeeDSWYRNMHH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/synthesis/2020Pasareanu, author = {Corina S. Pasareanu}, title = {Symbolic Execution and Quantitative Reasoning: Applications to Software Safety and Security}, series = {Synthesis Lectures on Software Engineering}, publisher = {Morgan {\&} Claypool Publishers}, year = {2020}, url = {https://doi.org/10.2200/S01010ED2V01Y202005SWE006}, doi = {10.2200/S01010ED2V01Y202005SWE006}, isbn = {978-3-031-01423-9}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/synthesis/2020Pasareanu.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AgrawalPBAAKK20, author = {Alka Agrawal and Abhishek Kumar Pandey and Abdullah Baz and Hosam Alhakami and Wajdi Alhakami and Rajeev Kumar and Raees Ahmad Khan}, title = {Evaluating the Security Impact of Healthcare Web Applications Through Fuzzy Based Hybrid Approach of Multi-Criteria Decision-Making Analysis}, journal = {{IEEE} Access}, volume = {8}, pages = {135770--135783}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3010729}, doi = {10.1109/ACCESS.2020.3010729}, timestamp = {Sat, 05 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AgrawalPBAAKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AhmadKBAA20, author = {Musheer Ahmad and Ishfaq Ahmad Khaja and Abdullah Baz and Hosam Alhakami and Wajdi Alhakami}, title = {Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications}, journal = {{IEEE} Access}, volume = {8}, pages = {116132--116147}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3004449}, doi = {10.1109/ACCESS.2020.3004449}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AhmadKBAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AhsanGNPKM20, author = {Md. Manjurul Ahsan and Kishor Datta Gupta and Abhijit Kumar Nag and Subash Poudyal and Abbas Z. Kouzani and M. A. Parvez Mahmud}, title = {Applications and Evaluations of Bio-Inspired Approaches in Cloud Security: {A} Review}, journal = {{IEEE} Access}, volume = {8}, pages = {180799--180814}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3027841}, doi = {10.1109/ACCESS.2020.3027841}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AhsanGNPKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AleneziAKK20, author = {Mamdouh Alenezi and Alka Agrawal and Rajeev Kumar and Raees Ahmad Khan}, title = {Evaluating Performance of Web Application Security Through a Fuzzy Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective}, journal = {{IEEE} Access}, volume = {8}, pages = {25543--25556}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2970784}, doi = {10.1109/ACCESS.2020.2970784}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AleneziAKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Bagheri-Sanjareh20, author = {Mehrdad Bagheri{-}Sanjareh and Mohammad Hassan Nazari and Gevork B. Gharehpetian}, title = {A Novel and Optimal Battery Sizing Procedure Based on {MG} Frequency Security Criterion Using Coordinated Application of BESS, {LED} Lighting Loads, and Photovoltaic Systems}, journal = {{IEEE} Access}, volume = {8}, pages = {95345--95359}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2995461}, doi = {10.1109/ACCESS.2020.2995461}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/Bagheri-Sanjareh20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KumarKAAAK20, author = {Rajeev Kumar and Asif Irshad Khan and Yoosef B. Abushark and Md. Mottahir Alam and Alka Agrawal and Raees Ahmad Khan}, title = {A Knowledge-Based Integrated System of Hesitant Fuzzy Set, {AHP} and {TOPSIS} for Evaluating Security-Durability of Web Applications}, journal = {{IEEE} Access}, volume = {8}, pages = {48870--48885}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2978038}, doi = {10.1109/ACCESS.2020.2978038}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KumarKAAAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KumarKAAAK20a, author = {Rajeev Kumar and Asif Irshad Khan and Yoosef B. Abushark and Md. Mottahir Alam and Alka Agrawal and Raees Ahmad Khan}, title = {An Integrated Approach of Fuzzy Logic, {AHP} and {TOPSIS} for Estimating Usable-Security of Web Applications}, journal = {{IEEE} Access}, volume = {8}, pages = {50944--50957}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2970245}, doi = {10.1109/ACCESS.2020.2970245}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KumarKAAAK20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiuLLGS20, author = {Yuzhou Liu and Lei Liu and Huaxiao Liu and Shanquan Gao and Guohang Song}, title = {Recommending Security Requirements for the Development of Android Applications Based on Sensitive APIs}, journal = {{IEEE} Access}, volume = {8}, pages = {101591--101606}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2997335}, doi = {10.1109/ACCESS.2020.2997335}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiuLLGS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/NurgalievaOD20, author = {Leysan Nurgalieva and David O'Callaghan and Gavin Doherty}, title = {Security and Privacy of mHealth Applications: {A} Scoping Review}, journal = {{IEEE} Access}, volume = {8}, pages = {104247--104268}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2999934}, doi = {10.1109/ACCESS.2020.2999934}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/NurgalievaOD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SaleemAAAIR20, author = {Kashif Saleem and Ghadah Majid Alabduljabbar and Nouf Alrowais and Jalal Al{-}Muhtadi and Muhammad Imran and Joel J. P. C. Rodrigues}, title = {Bio-Inspired Network Security for 5G-Enabled IoT Applications}, journal = {{IEEE} Access}, volume = {8}, pages = {229152--229160}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3046325}, doi = {10.1109/ACCESS.2020.3046325}, timestamp = {Tue, 11 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/SaleemAAAIR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YohanandhanEMM20, author = {Rajaa Vikhram Yohanandhan and Rajvikram Madurai Elavarasan and Premkumar Manoharan and Lucian Mihet{-}Popa}, title = {Cyber-Physical Power System {(CPPS):} {A} Review on Modeling, Simulation, and Analysis With Cyber Security Applications}, journal = {{IEEE} Access}, volume = {8}, pages = {151019--151064}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3016826}, doi = {10.1109/ACCESS.2020.3016826}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YohanandhanEMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangLDD20, author = {Hongzhou Zhang and Peiyue Li and Zhiguo Du and Wei Dou}, title = {Risk Entropy Modeling of Surveillance Camera for Public Security Application}, journal = {{IEEE} Access}, volume = {8}, pages = {45343--45355}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2978247}, doi = {10.1109/ACCESS.2020.2978247}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangLDD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/candie/NoltingSRAP20, author = {Lars Nolting and Thomas Spiegel and Marius Reich and Mario Adam and Aaron Praktiknjo}, title = {Can energy system modeling benefit from artificial neural networks? Application of two-stage metamodels to reduce computation of security of supply assessments}, journal = {Comput. Ind. Eng.}, volume = {142}, pages = {106334}, year = {2020}, url = {https://doi.org/10.1016/j.cie.2020.106334}, doi = {10.1016/J.CIE.2020.106334}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/candie/NoltingSRAP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhongH20, author = {Sheng Zhong and Xinyi Huang}, title = {Special focus on security and privacy in blockchain-based applications}, journal = {Sci. China Inf. Sci.}, volume = {63}, number = {3}, year = {2020}, url = {https://doi.org/10.1007/s11432-020-2781-0}, doi = {10.1007/S11432-020-2781-0}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/ZhongH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LatifaKG20, author = {Latifa Er{-}Rajy and My Ahmed El Kiram and Mohamed El Ghazouani}, title = {New Security Risk Value Estimate Method for Android Applications}, journal = {Comput. J.}, volume = {63}, number = {4}, pages = {593--603}, year = {2020}, url = {https://doi.org/10.1093/comjnl/bxz109}, doi = {10.1093/COMJNL/BXZ109}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LatifaKG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/SinghBT20, author = {Surendra Singh and Suvadip Batabyal and Sachin Tripathi}, title = {Security aware dynamic scheduling algorithm {(SADSA)} for real-time applications on grid}, journal = {Clust. Comput.}, volume = {23}, number = {2}, pages = {989--1005}, year = {2020}, url = {https://doi.org/10.1007/s10586-019-02970-w}, doi = {10.1007/S10586-019-02970-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/SinghBT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/SudhakarR20, author = {Rayapati Venkata Sudhakar and T. Ch. Malleswara Rao}, title = {Security aware index based quasi-identifier approach for privacy preservation of data sets for cloud applications}, journal = {Clust. Comput.}, volume = {23}, number = {4}, pages = {2579--2589}, year = {2020}, url = {https://doi.org/10.1007/s10586-019-03028-7}, doi = {10.1007/S10586-019-03028-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/SudhakarR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/KimKYJKHYOKHD20, author = {Jinyong Tim Kim and Eunsoo Kim and Jinhyuk Yang and Jaehoon Jeong and Hyoungshick Kim and Sangwon Hyun and Hyunsik Yang and Jaewook Oh and Younghan Kim and Susan Hares and Linda Dunbar}, title = {{IBCS:} Intent-Based Cloud Services for Security Applications}, journal = {{IEEE} Commun. Mag.}, volume = {58}, number = {4}, pages = {45--51}, year = {2020}, url = {https://doi.org/10.1109/MCOM.001.1900476}, doi = {10.1109/MCOM.001.1900476}, timestamp = {Wed, 26 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cm/KimKYJKHYOKHD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cmmm/SuGZLL20, author = {Xin Su and Qingbo Gong and Yi Zheng and Xuchong Liu and Kuan{-}Ching Li}, title = {An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing}, journal = {Comput. Math. Methods Medicine}, volume = {2020}, pages = {3658795:1--3658795:14}, year = {2020}, url = {https://doi.org/10.1155/2020/3658795}, doi = {10.1155/2020/3658795}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cmmm/SuGZLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cogcom/Faundez-ZanuyFF20, author = {Marcos Fa{\'{u}}ndez{-}Zanuy and Julian Fi{\'{e}}rrez and Miguel A. Ferrer and Mois{\'{e}}s D{\'{\i}}az Cabrera and Ruben Tolosana and R{\'{e}}jean Plamondon}, title = {Handwriting Biometrics: Applications and Future Trends in e-Security and e-Health}, journal = {Cogn. Comput.}, volume = {12}, number = {5}, pages = {940--953}, year = {2020}, url = {https://doi.org/10.1007/s12559-020-09755-z}, doi = {10.1007/S12559-020-09755-Z}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cogcom/Faundez-ZanuyFF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/JingGLZXJSTZ20, author = {Zhengjun Jing and Chunsheng Gu and Yong Li and Mengshi Zhang and Guangquan Xu and Alireza Jolfaei and Peizhong Shi and Chenkai Tan and James Xi Zheng}, title = {Security analysis of indistinguishable obfuscation for internet of medical things applications}, journal = {Comput. Commun.}, volume = {161}, pages = {202--211}, year = {2020}, url = {https://doi.org/10.1016/j.comcom.2020.07.033}, doi = {10.1016/J.COMCOM.2020.07.033}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/JingGLZXJSTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuZG20, author = {Kexin Hu and Zhenfeng Zhang and Kaiwen Guo}, title = {Corrigendum to "Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications" [Computers {\&} Security, Volume 87, 2019, 101585]}, journal = {Comput. Secur.}, volume = {94}, pages = {101878}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101878}, doi = {10.1016/J.COSE.2020.101878}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuZG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LandauerSWR20, author = {Max Landauer and Florian Skopik and Markus Wurzenberger and Andreas Rauber}, title = {System log clustering approaches for cyber security applications: {A} survey}, journal = {Comput. Secur.}, volume = {92}, pages = {101739}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101739}, doi = {10.1016/J.COSE.2020.101739}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LandauerSWR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RochaSE20, author = {Thiago S. Rocha and Eduardo Souto and Khalil El{-}Khatib}, title = {Functionality-based mobile application recommendation system with security and privacy awareness}, journal = {Comput. Secur.}, volume = {97}, pages = {101972}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101972}, doi = {10.1016/J.COSE.2020.101972}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RochaSE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShiHLKKC20, author = {Shuyun Shi and Debiao He and Li Li and Neeraj Kumar and Muhammad Khurram Khan and Kim{-}Kwang Raymond Choo}, title = {Applications of blockchain in ensuring the security and privacy of electronic health record systems: {A} survey}, journal = {Comput. Secur.}, volume = {97}, pages = {101966}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101966}, doi = {10.1016/J.COSE.2020.101966}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ShiHLKKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/ChangMR20, author = {Victor Chang and V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and Muthu Ramachandran}, title = {Emerging applications of internet of things, big data, security, and complexity: special issue on collaboration opportunity for IoTBDS and {COMPLEXIS}}, journal = {Computing}, volume = {102}, number = {6}, pages = {1301--1304}, year = {2020}, url = {https://doi.org/10.1007/s00607-020-00811-y}, doi = {10.1007/S00607-020-00811-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/ChangMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/CasalicchioI20, author = {Emiliano Casalicchio and Stefano Iannucci}, title = {The state-of-the-art in container technologies: Application, orchestration and security}, journal = {Concurr. Comput. Pract. Exp.}, volume = {32}, number = {17}, year = {2020}, url = {https://doi.org/10.1002/cpe.5668}, doi = {10.1002/CPE.5668}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/CasalicchioI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/OgielaO20, author = {Lidia Ogiela and Marek R. Ogiela}, title = {Cognitive security paradigm for cloud computing applications}, journal = {Concurr. Comput. Pract. Exp.}, volume = {32}, number = {8}, year = {2020}, url = {https://doi.org/10.1002/cpe.5316}, doi = {10.1002/CPE.5316}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/OgielaO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eInformatica/JabangweN20, author = {Ronald Jabangwe and Anh Nguyen{-}Duc}, title = {SIoT Framework: Towards an Approach for Early Identification of Security Requirements for Internet-of-things Applications}, journal = {e Informatica Softw. Eng. J.}, volume = {14}, number = {1}, year = {2020}, url = {https://doi.org/10.37190/e-inf200103}, doi = {10.37190/E-INF200103}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eInformatica/JabangweN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/el/ZhuSM20, author = {Shanying Zhu and Vijayalakshmi Saravanan and BalaAnand Muthu}, title = {Achieving data security and privacy across healthcare applications using cyber security mechanisms}, journal = {Electron. Libr.}, volume = {38}, number = {5/6}, pages = {979--995}, year = {2020}, url = {https://doi.org/10.1108/EL-07-2020-0219}, doi = {10.1108/EL-07-2020-0219}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/el/ZhuSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/AlgarniBISES20, author = {Abeer D. Algarni and Ghada M. El Banby and Sahar Ismail and Walid El Shafai and Fathi E. Abd El{-}Samie and Naglaa F. Soliman}, title = {Discrete Transforms and Matrix Rotation Based Cancelable Face and Fingerprint Recognition for Biometric Security Applications}, journal = {Entropy}, volume = {22}, number = {12}, pages = {1361}, year = {2020}, url = {https://doi.org/10.3390/e22121361}, doi = {10.3390/E22121361}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/AlgarniBISES20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AlbaneseBMM20, author = {Massimiliano Albanese and Alessandra De Benedictis and Douglas D. J. de Macedo and Fabrizio Messina}, title = {Security and trust in cloud application life-cycle management}, journal = {Future Gener. Comput. Syst.}, volume = {111}, pages = {934--936}, year = {2020}, url = {https://doi.org/10.1016/j.future.2020.01.025}, doi = {10.1016/J.FUTURE.2020.01.025}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/AlbaneseBMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/CinqueCP20, author = {Marcello Cinque and Raffaele Della Corte and Antonio Pecchia}, title = {Contextual filtering and prioritization of computer application logs for security situational awareness}, journal = {Future Gener. Comput. Syst.}, volume = {111}, pages = {668--680}, year = {2020}, url = {https://doi.org/10.1016/j.future.2019.09.005}, doi = {10.1016/J.FUTURE.2019.09.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/CinqueCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/GargKBKKB20, author = {Sahil Garg and Kuljeet Kaur and Shalini Batra and Georges Kaddoum and Neeraj Kumar and Azzedine Boukerche}, title = {A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications}, journal = {Future Gener. Comput. Syst.}, volume = {104}, pages = {105--118}, year = {2020}, url = {https://doi.org/10.1016/j.future.2019.09.038}, doi = {10.1016/J.FUTURE.2019.09.038}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/GargKBKKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/NebbioneC20, author = {Giuseppe Nebbione and Maria Carla Calzarossa}, title = {Security of IoT Application Layer Protocols: Challenges and Findings}, journal = {Future Internet}, volume = {12}, number = {3}, pages = {55}, year = {2020}, url = {https://doi.org/10.3390/fi12030055}, doi = {10.3390/FI12030055}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/NebbioneC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gpem/OReillyTPSGLKH20, author = {Una{-}May O'Reilly and Jamal Toutouh and Marcos A. Pertierra and Daniel Prado Sanchez and Dennis Garcia and Anthony Erb Lugo and Jonathan Kelly and Erik Hemberg}, title = {Adversarial genetic programming for cyber security: a rising application domain where {GP} matters}, journal = {Genet. Program. Evolvable Mach.}, volume = {21}, number = {1-2}, pages = {219--250}, year = {2020}, url = {https://doi.org/10.1007/s10710-020-09389-y}, doi = {10.1007/S10710-020-09389-Y}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gpem/OReillyTPSGLKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/grid/SodhroPML20, author = {Ali Hassan Sodhro and Sandeep Pirbhulal and Muhammad Muzammal and Zongwei Luo}, title = {Towards Blockchain-Enabled Security Technique for Industrial Internet of Things Based Decentralized Applications}, journal = {J. Grid Comput.}, volume = {18}, number = {4}, pages = {615--628}, year = {2020}, url = {https://doi.org/10.1007/s10723-020-09527-x}, doi = {10.1007/S10723-020-09527-X}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/grid/SodhroPML20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeenl/SalmanGUJ20, author = {Tara Salman and Ali Ghubaish and Devrim Unal and Raj Jain}, title = {Safety Score as an Evaluation Metric for Machine Learning Models of Security Applications}, journal = {{IEEE} Netw. Lett.}, volume = {2}, number = {4}, pages = {207--211}, year = {2020}, url = {https://doi.org/10.1109/lnet.2020.3016583}, doi = {10.1109/LNET.2020.3016583}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeenl/SalmanGUJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cds/NingFUM20, author = {Huansheng Ning and Fadi Farha and Ata Ullah and Lingfeng Mao}, title = {Physical unclonable function: architectures, applications and challenges for dependable security}, journal = {{IET} Circuits Devices Syst.}, volume = {14}, number = {4}, pages = {407--424}, year = {2020}, url = {https://doi.org/10.1049/iet-cds.2019.0175}, doi = {10.1049/IET-CDS.2019.0175}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-cds/NingFUM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/AhmadianSS20, author = {Mohammad Mehdi Ahmadian and Mehdi Shajari and Mohammad Ali Shafiee}, title = {Industrial control system security taxonomic framework with application to a comprehensive incidents survey}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {29}, pages = {100356}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100356}, doi = {10.1016/J.IJCIP.2020.100356}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/AhmadianSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/AbdullahAA20, author = {Hamsa A. Abdullah and Hikmat N. Abdullah and Waleed A. Mahmoud Al{-}Jawher}, title = {A hybrid chaotic map for communication security applications}, journal = {Int. J. Commun. Syst.}, volume = {33}, number = {4}, year = {2020}, url = {https://doi.org/10.1002/dac.4236}, doi = {10.1002/DAC.4236}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/AbdullahAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijeb/SavolaKA20, author = {Reijo M. Savola and Markku Kyl{\"{a}}np{\"{a}}{\"{a}} and Habtamu Abie}, title = {Risk-driven security metrics for an Android smartphone application}, journal = {Int. J. Electron. Bus.}, volume = {15}, number = {4}, pages = {297--324}, year = {2020}, url = {https://doi.org/10.1504/IJEB.2020.111059}, doi = {10.1504/IJEB.2020.111059}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijeb/SavolaKA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesma/Elsantil20, author = {Yasmeen Elsantil}, title = {User Perceptions of the Security of Mobile Applications}, journal = {Int. J. {E} Serv. Mob. Appl.}, volume = {12}, number = {4}, pages = {24--41}, year = {2020}, url = {https://doi.org/10.4018/IJESMA.2020100102}, doi = {10.4018/IJESMA.2020100102}, timestamp = {Fri, 08 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijesma/Elsantil20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfogcomp/NewareS20, author = {Rahul Neware and Urmila Shrawankar}, title = {Fog Computing Architecture, Applications and Security Issues}, journal = {Int. J. Fog Comput.}, volume = {3}, number = {1}, pages = {75--105}, year = {2020}, url = {https://doi.org/10.4018/ijfc.2020010105}, doi = {10.4018/IJFC.2020010105}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijfogcomp/NewareS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijim/Alghamdi20, author = {Mohammed I. Alghamdi}, title = {Survey on Applications of Deep Learning and Machine Learning Techniques for Cyber Security}, journal = {Int. J. Interact. Mob. Technol.}, volume = {14}, number = {16}, pages = {210--224}, year = {2020}, url = {https://doi.org/10.3991/ijim.v14i16.16953}, doi = {10.3991/IJIM.V14I16.16953}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijim/Alghamdi20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/BalapourNS20, author = {Ali Balapour and Hamid Reza Nikkhah and Rajiv Sabherwal}, title = {Mobile application security: Role of perceived privacy as the predictor of security perceptions}, journal = {Int. J. Inf. Manag.}, volume = {52}, pages = {102063}, year = {2020}, url = {https://doi.org/10.1016/j.ijinfomgt.2019.102063}, doi = {10.1016/J.IJINFOMGT.2019.102063}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijinfoman/BalapourNS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/WarkentinO20, author = {Merrill Warkentin and Craig P. Orgeron}, title = {Using the security triad to assess blockchain technology in public sector applications}, journal = {Int. J. Inf. Manag.}, volume = {52}, pages = {102090}, year = {2020}, url = {https://doi.org/10.1016/j.ijinfomgt.2020.102090}, doi = {10.1016/J.IJINFOMGT.2020.102090}, timestamp = {Tue, 17 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijinfoman/WarkentinO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsssp/NabiYT20, author = {Faisal Nabi and Jianming Yong and Xiaohui Tao}, title = {A Security Review of Event-Based Application Function and Service Component Architecture}, journal = {Int. J. Syst. Softw. Secur. Prot.}, volume = {11}, number = {2}, pages = {58--70}, year = {2020}, url = {https://doi.org/10.4018/ijsssp.2020070104}, doi = {10.4018/IJSSSP.2020070104}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsssp/NabiYT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/NabilKH20, author = {Mohamed Nabil and Ashraf A. M. Khalaf and Sara M. Hassan}, title = {A new-one-time-pad stream cipher: new design, hardware implementation and its application in security of UAVs}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {19}, number = {4}, pages = {352--366}, year = {2020}, url = {https://doi.org/10.1504/IJWMC.2020.112548}, doi = {10.1504/IJWMC.2020.112548}, timestamp = {Mon, 01 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijwmc/NabilKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/WahshehL20, author = {Heider A. M. Wahsheh and Flaminia L. Luccio}, title = {Security and Privacy of {QR} Code Applications: {A} Comprehensive Study, General Guidelines and Solutions}, journal = {Inf.}, volume = {11}, number = {4}, pages = {217}, year = {2020}, url = {https://doi.org/10.3390/info11040217}, doi = {10.3390/INFO11040217}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/information/WahshehL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/TaoGH20, author = {Chuanqi Tao and Hongjing Guo and Zhiqiu Huang}, title = {Identifying security issues for mobile applications based on user review summarization}, journal = {Inf. Softw. Technol.}, volume = {122}, pages = {106290}, year = {2020}, url = {https://doi.org/10.1016/j.infsof.2020.106290}, doi = {10.1016/J.INFSOF.2020.106290}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/TaoGH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/NisarJHWHASPK20, author = {Kashif Nisar and Emilia Rosa Jimson and Mohd. Hanafi Ahmad Hijazi and Ian Welch and Rosilah Hassan and Azana Hafizah Mohd Aman and Ali Hassan Sodhro and Sandeep Pirbhulal and Sohrab Khan}, title = {A survey on the architecture, application, and security of software defined networking: Challenges and open issues}, journal = {Internet Things}, volume = {12}, pages = {100289}, year = {2020}, url = {https://doi.org/10.1016/j.iot.2020.100289}, doi = {10.1016/J.IOT.2020.100289}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iot/NisarJHWHASPK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/AbdalzaherM20, author = {Mohamed S. Abdalzaher and Osamu Muta}, title = {A Game-Theoretic Approach for Enhancing Security and Data Trustworthiness in IoT Applications}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {11}, pages = {11250--11261}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2996671}, doi = {10.1109/JIOT.2020.2996671}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/AbdalzaherM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/DiegoSFR20, author = {Jorge David de Hoz Diego and Jose Saldana and Juli{\'{a}}n Fern{\'{a}}ndez{-}Navajas and Jos{\'{e}} Ru{\'{\i}}z{-}Mas}, title = {Decoupling Security From Applications in CoAP-Based IoT Devices}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {1}, pages = {467--476}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2951306}, doi = {10.1109/JIOT.2019.2951306}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/DiegoSFR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/Park20, author = {Chang{-}Seop Park}, title = {Security Architecture for Secure Multicast CoAP Applications}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {4}, pages = {3441--3452}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2970175}, doi = {10.1109/JIOT.2020.2970175}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/Park20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/PerezRRS20, author = {Salvador P{\'{e}}rez and Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and Shahid Raza and Antonio F. Skarmeta}, title = {Application Layer Key Establishment for End-to-End Security in IoT}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {3}, pages = {2117--2128}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2959428}, doi = {10.1109/JIOT.2019.2959428}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/PerezRRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/SovynKP20, author = {Yaroslav Sovyn and Volodymyr Khoma and Michal Podpora}, title = {Comparison of Three CPU-Core Families for IoT Applications in Terms of Security and Performance of {AES-GCM}}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {1}, pages = {339--348}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2953230}, doi = {10.1109/JIOT.2019.2953230}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/SovynKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isi/MurtyR20, author = {Maturi Sreerama Murty and Nallamothu Nagamalleswara Rao}, title = {Stalking the Resources for Security in Linked Data Applications Using Resource Description Framework}, journal = {Ing{\'{e}}nierie des Syst{\`{e}}mes d Inf.}, volume = {25}, number = {6}, pages = {793--801}, year = {2020}, url = {https://doi.org/10.18280/isi.250609}, doi = {10.18280/ISI.250609}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isi/MurtyR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JonesJMX20, author = {Kevin I. Jones and Helge Janicke and Leandros A. Maglaras and Christos Xenakis}, title = {Introduction to the special issue of the journal of information security and applications on" cyber security in {ICS} {\&} {SCADA} systems"}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102542}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102542}, doi = {10.1016/J.JISA.2020.102542}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/JonesJMX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SenM20, author = {Amartya Sen and Sanjay Madria}, title = {Application design phase risk assessment framework using cloud security domains}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102617}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102617}, doi = {10.1016/J.JISA.2020.102617}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SenM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangZZX20, author = {Min Yang and Shibin Zhang and Hang Zhang and Jinyue Xia}, title = {Corrigendum to "A New User Behavior Evaluation Method in Online Social Network" Journal of Information Security and Applications Volume 48 {(2019)} 102371}, journal = {J. Inf. Secur. Appl.}, volume = {50}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102405}, doi = {10.1016/J.JISA.2019.102405}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YangZZX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/Sykes20, author = {Edward R. Sykes}, title = {A context-aware system using mobile applications and beacons for on-premise security environments}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {11}, number = {11}, pages = {5487--5511}, year = {2020}, url = {https://doi.org/10.1007/s12652-020-01906-2}, doi = {10.1007/S12652-020-01906-2}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/Sykes20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Schoinianakis20, author = {Dimitrios Schoinianakis}, title = {Residue arithmetic systems in cryptography: a survey on modern security applications}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {3}, pages = {249--267}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00231-w}, doi = {10.1007/S13389-020-00231-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Schoinianakis20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/LiYMLY20, author = {Qianmu Li and XiaoChun Yin and Shunmei Meng and Yaozong Liu and Zijian Ying}, title = {A security event description of intelligent applications in edge-cloud environment}, journal = {J. Cloud Comput.}, volume = {9}, pages = {23}, year = {2020}, url = {https://doi.org/10.1186/s13677-020-00171-0}, doi = {10.1186/S13677-020-00171-0}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcloudc/LiYMLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/FangTW20, author = {Weijian Fang and Xiaoling Tan and Dominic Wilbur}, title = {Research on machine learning method and its application technology in intrusion information security detection}, journal = {J. Intell. Fuzzy Syst.}, volume = {38}, number = {2}, pages = {1549--1558}, year = {2020}, url = {https://doi.org/10.3233/JIFS-179518}, doi = {10.3233/JIFS-179518}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/FangTW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/Tang20b, author = {Yongjun Tang}, title = {Security design and application of Internet of things based on asymmetric encryption algorithm and neural network for {COVID-19}}, journal = {J. Intell. Fuzzy Syst.}, volume = {39}, number = {6}, pages = {8703--8711}, year = {2020}, url = {https://doi.org/10.3233/JIFS-189266}, doi = {10.3233/JIFS-189266}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/Tang20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/RjaibiH20, author = {Walid Rjaibi and Mohammad Hammoudeh}, title = {Enhancing and simplifying data security and privacy for multitiered applications}, journal = {J. Parallel Distributed Comput.}, volume = {139}, pages = {53--64}, year = {2020}, url = {https://doi.org/10.1016/j.jpdc.2020.01.006}, doi = {10.1016/J.JPDC.2020.01.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/RjaibiH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/StylianopoulosA20, author = {Charalampos Stylianopoulos and Magnus Almgren and Olaf Landsiedel and Marina Papatriantafilou}, title = {Multiple pattern matching for network security applications: Acceleration through vectorization}, journal = {J. Parallel Distributed Comput.}, volume = {137}, pages = {34--52}, year = {2020}, url = {https://doi.org/10.1016/j.jpdc.2019.10.011}, doi = {10.1016/J.JPDC.2019.10.011}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/StylianopoulosA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/AhmadCCBZ20, author = {Maqsood Ahmad and Valerio Costamagna and Bruno Crispo and Francesco Bergadano and Yury Zhauniarovich}, title = {StaDART: Addressing the problem of dynamic code updates in the security analysis of android applications}, journal = {J. Syst. Softw.}, volume = {159}, year = {2020}, url = {https://doi.org/10.1016/j.jss.2019.07.088}, doi = {10.1016/J.JSS.2019.07.088}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/AhmadCCBZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/MadhavapandianM20, author = {S. Madhavapandian and P. Maruthupandi}, title = {{FPGA} implementation of highly scalable {AES} algorithm using modified mix column with gate replacement technique for security application in {TCP/IP}}, journal = {Microprocess. Microsystems}, volume = {73}, pages = {102972}, year = {2020}, url = {https://doi.org/10.1016/j.micpro.2019.102972}, doi = {10.1016/J.MICPRO.2019.102972}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/MadhavapandianM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/SucasasMAM20, author = {Victor Sucasas and Georgios Mantas and Saud Althunibat and Jos{\'{e}}{-}Fern{\'{a}}n Mart{\'{\i}}nez{-}Ortega}, title = {Editorial: Security and Privacy Protection for Mobile Applications and Platforms}, journal = {Mob. Networks Appl.}, volume = {25}, number = {1}, pages = {151--152}, year = {2020}, url = {https://doi.org/10.1007/s11036-019-01438-w}, doi = {10.1007/S11036-019-01438-W}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/SucasasMAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/El-BendaryKHE20, author = {Mohsen A. M. Mohamed Kaseem El{-}Bendary and Hany Kasban and Ayman Haggag and Mostafa A. R. Eltokhy}, title = {Investigating of nodes and personal authentications utilizing multimodal biometrics for medical application of WBANs security}, journal = {Multim. Tools Appl.}, volume = {79}, number = {33-34}, pages = {24507--24535}, year = {2020}, url = {https://doi.org/10.1007/s11042-020-08926-2}, doi = {10.1007/S11042-020-08926-2}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/El-BendaryKHE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/PraveenaR20, author = {D. Praveena and P. Rangarajan}, title = {A machine learning application for reducing the security risks in hybrid cloud networks}, journal = {Multim. Tools Appl.}, volume = {79}, number = {7-8}, pages = {5161--5173}, year = {2020}, url = {https://doi.org/10.1007/s11042-018-6339-0}, doi = {10.1007/S11042-018-6339-0}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/PraveenaR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhaoLCOL20, author = {Xiaofang Zhao and Shengxin Lin and Xuefang Chen and Chaochao Ou and Chunping Liao}, title = {Application of face image detection based on deep learning in privacy security of intelligent cloud platform}, journal = {Multim. Tools Appl.}, volume = {79}, number = {23-24}, pages = {16707--16718}, year = {2020}, url = {https://doi.org/10.1007/s11042-019-08014-0}, doi = {10.1007/S11042-019-08014-0}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ZhaoLCOL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/WuPL20, author = {Wanqing Wu and Sandeep Pirbhulal and Guanglin Li}, title = {Adaptive computing-based biometric security for intelligent medical applications}, journal = {Neural Comput. Appl.}, volume = {32}, number = {15}, pages = {11055--11064}, year = {2020}, url = {https://doi.org/10.1007/s00521-018-3855-9}, doi = {10.1007/S00521-018-3855-9}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/WuPL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeLLZCMG20, author = {Daojing He and Shihao Li and Cong Li and Sencun Zhu and Sammy Chan and Weidong Min and Nadra Guizani}, title = {Security Analysis of Cryptocurrency Wallets in Android-Based Applications}, journal = {{IEEE} Netw.}, volume = {34}, number = {6}, pages = {114--119}, year = {2020}, url = {https://doi.org/10.1109/MNET.011.2000025}, doi = {10.1109/MNET.011.2000025}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeLLZCMG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/KimBMSL20, author = {Hyunbum Kim and Jalel Ben{-}Othman and Lynda Mokdad and Junggab Son and Chunguo Li}, title = {Research Challenges and Security Threats to AI-Driven 5G Virtual Emotion Applications Using Autonomous Vehicles, Drones, and Smart Devices}, journal = {{IEEE} Netw.}, volume = {34}, number = {6}, pages = {288--294}, year = {2020}, url = {https://doi.org/10.1109/MNET.011.2000245}, doi = {10.1109/MNET.011.2000245}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/KimBMSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/LiSLZW20, author = {Weiwei Li and Zhou Su and Ruidong Li and Kuan Zhang and Yuntao Wang}, title = {Blockchain-Based Data Security for Artificial Intelligence Applications in 6G Networks}, journal = {{IEEE} Netw.}, volume = {34}, number = {6}, pages = {31--37}, year = {2020}, url = {https://doi.org/10.1109/MNET.021.1900629}, doi = {10.1109/MNET.021.1900629}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/LiSLZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/PirbhulalWMMLA20, author = {Sandeep Pirbhulal and Wanqing Wu and Khan Muhammad and Irfan Mehmood and Guanglin Li and Victor Hugo C. de Albuquerque}, title = {Mobility Enabled Security for Optimizing IoT based Intelligent Applications}, journal = {{IEEE} Netw.}, volume = {34}, number = {2}, pages = {72--77}, year = {2020}, url = {https://doi.org/10.1109/MNET.001.1800547}, doi = {10.1109/MNET.001.1800547}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/PirbhulalWMMLA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/Blake20, author = {Cindy Blake}, title = {Reducing risk with end-to-end application security automation}, journal = {Netw. Secur.}, volume = {2020}, number = {2}, pages = {6--8}, year = {2020}, url = {https://doi.org/10.1016/S1353-4858(20)30019-2}, doi = {10.1016/S1353-4858(20)30019-2}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/Blake20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/HanKM20, author = {Songyang Han and Walter O. Krawec and Fei Miao}, title = {A game-theoretic security framework for quantum cryptography: Performance analysis and application}, journal = {Quantum Inf. Process.}, volume = {19}, number = {9}, pages = {349}, year = {2020}, url = {https://doi.org/10.1007/s11128-020-02861-9}, doi = {10.1007/S11128-020-02861-9}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/HanKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/VillamizarKGM20, author = {Hugo Villamizar and Marcos Kalinowski and Alessandro F. Garcia and Daniel M{\'{e}}ndez}, title = {An efficient approach for reviewing security-related aspects in agile requirements specifications of web applications}, journal = {Requir. Eng.}, volume = {25}, number = {4}, pages = {439--468}, year = {2020}, url = {https://doi.org/10.1007/s00766-020-00338-w}, doi = {10.1007/S00766-020-00338-W}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/VillamizarKGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/LombardiLPBJL20, author = {Federico Lombardi and Maurizio Lualdi and Francesco Picetti and Paolo Bestagini and Gerardus Janszen and Luca Angelo Di Landro}, title = {Ballistic Ground Penetrating Radar Equipment for Blast-Exposed Security Applications}, journal = {Remote. Sens.}, volume = {12}, number = {4}, pages = {717}, year = {2020}, url = {https://doi.org/10.3390/rs12040717}, doi = {10.3390/RS12040717}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/remotesensing/LombardiLPBJL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/MarotMLLBB20, author = {Julien Marot and Claire Migliaccio and J{\'{e}}r{\^{o}}me Lant{\'{e}}ri and Paul Lauga and Salah Bourennane and Laurent Brochier}, title = {Joint Design of the Hardware and the Software of a Radar System with the Mixed Grey Wolf Optimizer: Application to Security Check}, journal = {Remote. Sens.}, volume = {12}, number = {18}, pages = {3097}, year = {2020}, url = {https://doi.org/10.3390/rs12183097}, doi = {10.3390/RS12183097}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/remotesensing/MarotMLLBB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KhwajaMA20, author = {Amir A. Khwaja and Muniba Murtaza and Hafiz F. Ahmed}, title = {A security feature framework for programming languages to minimize application layer vulnerabilities}, journal = {Secur. Priv.}, volume = {3}, number = {1}, year = {2020}, url = {https://doi.org/10.1002/spy2.95}, doi = {10.1002/SPY2.95}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KhwajaMA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AslanAS20, author = {Bora Aslan and F{\"{u}}sun Yavuzer Aslan and M. Tolga Sakalli}, title = {Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {8837671:1--8837671:15}, year = {2020}, url = {https://doi.org/10.1155/2020/8837671}, doi = {10.1155/2020/8837671}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AslanAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/MartinVBAS20, author = {Peter G. Martin and Yannick Verbelen and Elia Sciama Bandel and Mark Andrews and Thomas B. Scott}, title = {Project Gatekeeper: An Entrance Control System Embedded Radiation Detection Capability for Security Applications}, journal = {Sensors}, volume = {20}, number = {10}, pages = {2957}, year = {2020}, url = {https://doi.org/10.3390/s20102957}, doi = {10.3390/S20102957}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/MartinVBAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/OwohS20, author = {Nsikak Pius Owoh and Manmeet Mahinderjit Singh}, title = {SenseCrypt: {A} Security Framework for Mobile Crowd Sensing Applications}, journal = {Sensors}, volume = {20}, number = {11}, pages = {3280}, year = {2020}, url = {https://doi.org/10.3390/s20113280}, doi = {10.3390/S20113280}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/OwohS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/BashirJZ20, author = {Reem Bashir and Helge Janicke and Wen Zeng}, title = {Evaluating the Impact of Sandbox Applications on Live Digital Forensics Investigation}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {25}, pages = {e2}, year = {2020}, url = {https://doi.org/10.4108/eai.8-4-2021.169179}, doi = {10.4108/EAI.8-4-2021.169179}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/BashirJZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ParkKPK20, author = {SooHyun Park and Yeongeun Kang and Jeman Park and Joongheon Kim}, title = {Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {23}, pages = {e5}, year = {2020}, url = {https://doi.org/10.4108/eai.30-6-2020.165502}, doi = {10.4108/EAI.30-6-2020.165502}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/ParkKPK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.