Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysisHaverkamp, Indy ; Sarmah, Dipti K.International journal of information security, 2024-08, Vol.23 (4), p.2607-2635 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
IoT cybersecurity in 5G and beyond: a systematic literature reviewPirbhulal, Sandeep ; Chockalingam, Sabarathinam ; Shukla, Ankur ; Abie, HabtamuInternational journal of information security, 2024-08, Vol.23 (4), p.2827-2879 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Data management and selectivity in collaborative pervasive edge computingPapathanasiou, Dimitrios ; Kolomvatsos, KostasComputing, 2024-08, Vol.106 (8), p.2561-2584 [Periódico revisado por pares]Vienna: Springer ViennaTexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
Quickcent: a fast and frugal heuristic for harmonic centrality estimation on scale-free networksPlana, Francisco ; Abeliuk, Andrés ; Pérez, JorgeComputing, 2024-08, Vol.106 (8), p.2675-2705 [Periódico revisado por pares]Vienna: Springer ViennaTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Dynamic vulnerability severity calculator for industrial control systemsCheimonidis, Pavlos ; Rantos, KonstantinosInternational journal of information security, 2024-08, Vol.23 (4), p.2655-2676 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
A dynamic C-V2X anonymous authentication and group key agreement protocolCui, Beibei ; He, Wei ; Cui, YanInternational journal of information security, 2024-08, Vol.23 (4), p.2977-2989 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Model-Agnostic Utility-Preserving Biometric Information AnonymizationChen, Chun-Fu ; Moriarty, Bill ; Hu, Shaohan ; Moran, Sean ; Pistoia, Marco ; Piuri, Vincenzo ; Samarati, PierangelaInternational journal of information security, 2024-08, Vol.23 (4), p.2809-2826 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanismsBajaj, Ashish ; Vishwakarma, Dinesh KumarInternational journal of information security, 2024-08, Vol.23 (4), p.2711-2737 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycleZacharis, Alexandros ; Katos, Vasilios ; Patsakis, ConstantinosInternational journal of information security, 2024-08, Vol.23 (4), p.2691-2710 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalabilityPaya, Antonio ; Vicente-García ; Gómez, AlbertoInternational journal of information security, 2024-08, Vol.23 (4), p.2793-2808 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |