Certificateless cloud storage auditing supporting data ownership transfer (Englisch)
- Neue Suche nach: Huang, Yinghui
- Neue Suche nach: Shen, Wenting
- Weitere Informationen zu Shen, Wenting:
- https://orcid.org/0000-0003-1467-9619
- Neue Suche nach: Qin, Jing
- Neue Suche nach: Huang, Yinghui
- Neue Suche nach: Shen, Wenting
- Neue Suche nach: Qin, Jing
In:
Computers and Security
;
139
;
2024
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Certificateless cloud storage auditing supporting data ownership transfer
-
Beteiligte:
-
Erschienen in:Computers and Security ; 139
-
Verlag:
- Neue Suche nach: Elsevier Ltd
-
Erscheinungsdatum:18.01.2024
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 139
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
-
The human factor in phishing: Collecting and analyzing user behavior when reading emailsGallo, Luigi / Gentile, Danilo / Ruggiero, Saverio / Botta, Alessio / Ventre, Giorgio et al. | 2023
-
A review on security implementations in soft-processors for IoT applicationsCaraveo-Cacep, Miguel Antonio / Vázquez-Medina, Rubén / Hernández Zavala, Antonio et al. | 2023
-
XRan: Explainable deep learning-based ransomware detection using dynamic analysisGulmez, Sibel / Gorgulu Kakisim, Arzu / Sogukpinar, Ibrahim et al. | 2024
-
Cyber-Secure SDN: A CNN-Based Approach for Efficient Detection and Mitigation of DDoS attacksNajar, Ashfaq Ahmad / Manohar Naik, S. et al. | 2024
-
DAmpADF: A framework for DNS amplification attack defense based on Bloom filters and NAmpKeeperDai, Yunwei / Huang, Tao / Wang, Shuo et al. | 2024
-
ABAC policy mining method based on hierarchical clustering and relationship extractionShang, Siyuan / Wang, Xiaohan / Liu, Aodi et al. | 2024
-
Unravelling the three lines model in cybersecurity: a systematic literature reviewValkenburg, Bert / Bongiovanni, Ivano et al. | 2024
-
DDOS attack detection in SDN: Method of attacks, detection techniques, challenges and research gapsWabi, Abdullahi Aishatu / Idris, Ismaila / Olaniyi, Olayemi Mikail / Ojeniyi, Joseph A. et al. | 2023
-
Smart homes under siege: Assessing the robustness of physical security against wireless network attacksAllen, Ashley / Mylonas, Alexios / Vidalis, Stilianos / Gritzalis, Dimitris et al. | 2023
-
Cybercrime during the COVID-19 pandemic: Prevalence, nature and impact of cybercrime for citizens and SME owners in the Netherlandsvan de Weijer, Steve / Leukfeldt, Rutger / Moneva, Asier et al. | 2023
-
DivaCAN: Detecting in-vehicle intrusion attacks on a controller area network using ensemble learningKhan, Muneeb Hassan / Javed, Abdul Rehman / Iqbal, Zafar / Asim, Muhammad / Awad, Ali Ismail et al. | 2024
-
Hybrid rat swarm hunter prey optimization trained deep learning for network intrusion detection using CNN featuresParameswari, A. / Ganeshan, R. / Ragavi, V. / Shereesha, M. et al. | 2023
-
Toward enhancing web privacy on HTTPS traffic: A novel SuperLearner attack model and an efficient defense approach with adversarial examplesAbolfathi, Masoumeh / Inturi, Srivani / Banaei-Kashani, Farnoush / Jafarian, J. Haadi et al. | 2023
-
A threshold traceable delegation authorization scheme for data sharing in healthcareZhao, Jing / Su, Qianqian et al. | 2023
-
Exploring the evidence for email phishing training: A scoping reviewMarshall, Nina / Sturman, Daniel / Auton, Jaime C. et al. | 2023
-
GAPBAS: Genetic algorithm-based privacy budget allocation strategy in differential privacy K-means clustering algorithmLi, Yong / Song, Xiao / Tu, Yuchun / Liu, Ming et al. | 2023
-
Multi-motion sensor behavior based continuous authentication on smartphones using gated two-tower transformer fusion networksZhao, Chengmei / Gao, Feng / Shen, Zhihao et al. | 2023
-
“I don't think we're there yet”: The practices and challenges of organisational learning from cyber security incidentsPatterson, Clare M. / Nurse, Jason R.C. / Franqueira, Virginia N.L. et al. | 2023
-
Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systemsSnehi, Manish / Bhandari, Abhinav / Verma, Jyoti et al. | 2024
-
Machine learning in identity and access management systems: Survey and deep diveAboukadri, Sara / Ouaddah, Aafaf / Mezrioui, Abdellatif et al. | 2024
-
The applicability of a hybrid framework for automated phishing detectionvan Geest, R.J. / Cascavilla, G. / Hulstijn, J. / Zannone, N. et al. | 2024
-
Exploring perceptions of decision-makers and specialists in defensive machine learning cybersecurity applications: The need for a standardised approachAlshaikh, Omar / Parkinson, Simon / Khan, Saad et al. | 2023
-
Local aggressive and physically realizable adversarial attacks on 3D point cloudChen, Zhiyu / Chen, Feng / Sun, Yiming / Wang, Mingjie / Liu, Shangdong / Ji, Yimu et al. | 2023
-
EvadeDroid: A practical evasion attack on machine learning for black-box Android malware detectionBostani, Hamid / Moonsamy, Veelasha et al. | 2023
-
Anomaly detection for space information networks: A survey of challenges, techniques, and future directionsDiro, Abebe / Kaisar, Shahriar / Vasilakos, Athanasios V. / Anwar, Adnan / Nasirian, Araz / Olani, Gaddisa et al. | 2024
-
BenchMFC: A benchmark dataset for trustworthy malware family classification under concept driftJiang, Yongkang / Li, Gaolei / Li, Shenghong / Guo, Ying et al. | 2024
-
An active learning framework using deep Q-network for zero-day attack detectionWu, Yali / Hu, Yanghu / Wang, Junhu / Feng, Mengqi / Dong, Ang / Yang, Yanxi et al. | 2024
-
MAlign: Explainable static raw-byte based malware family classification using sequence alignmentSaha, Shoumik / Afroz, Sadia / Rahman, Atif Hasan et al. | 2024
-
Gradient-based defense methods for data leakage in vertical federated learningChang, Wenhan / Zhu, Tianqing et al. | 2024
-
Editorial Board| 2024
-
PVFL: Verifiable federated learning and prediction with privacy-preservingYin, Benxin / Zhang, Hanlin / Lin, Jie / Kong, Fanyu / Yu, Leyun et al. | 2024
-
HSTW: A robust network flow watermarking method based on hybrid packet sequence-timingFeng, Wangxin / Luo, Xiangyang / Li, Tengyao / Yang, Chunfang et al. | 2024
-
RCVaR: An economic approach to estimate cyberattacks costs using data from industry reportsFranco, Muriel F. / Künzler, Fabian / von der Assen, Jan / Feng, Chao / Stiller, Burkhard et al. | 2024
-
Certificateless cloud storage auditing supporting data ownership transferHuang, Yinghui / Shen, Wenting / Qin, Jing et al. | 2024
-
ROSTAM: A passwordless web single sign-on solution mitigating server breaches and integrating credential manager and federated identity systemsMahnamfar, Amin / Bicakci, Kemal / Uzunay, Yusuf et al. | 2024
-
An adversarial attack approach for eXplainable AI evaluation on deepfake detection modelsGowrisankar, Balachandar / Thing, Vrizlynn L.L. et al. | 2023
-
Countering ARP spoofing attacks in software-defined networks using a game-theoretic approachMvah, Fabrice / Kengne Tchendji, Vianney / Tayou Djamegni, Clémentin / Anwar, Ahmed H. / Tosh, Deepak K. / Kamhoua, Charles et al. | 2023
-
VDTriplet: Vulnerability detection with graph semantics using triplet modelSun, Hao / Cui, Lei / Li, Lun / Ding, Zhenquan / Li, Siyuan / Hao, Zhiyu / Zhu, Hongsong et al. | 2024
-
Exploring compiler optimization space for control flow obfuscationAhmed, Hameeza / Hyder, Muhammad Faraz / Haque, Muhammad Fahim ul / Santos, Paulo Cesar et al. | 2024
-
Formal threat analysis of machine learning-based control systems: A study on smart healthcare systemsHaque, Nur Imtiazul / Rahman, Mohammad Ashiqur / Uluagac, Selcuk et al. | 2024
-
MAGIC: Malware behaviour analysis and impact quantification through signature co-occurrence and regressionS, Rohini / Ramesh, Gowtham / Nair, Anand R. et al. | 2024
-
MTS-DVGAN: Anomaly detection in cyber-physical systems using a dual variational generative adversarial networkSun, Haili / Huang, Yan / Han, Lansheng / Fu, Cai / Liu, Hongle / Long, Xiang et al. | 2023
-
Vulnerability impact analysis in software project dependencies based on Satisfiability Modulo Theories (SMT)Germán Márquez, A. / Varela-Vaca, Ángel Jesús / Gómez López, María Teresa / Galindo, José A. / Benavides, David et al. | 2023
-
A study on vulnerability of the Wickr login system in windows from a live forensics perspectiveKim, Giyoon / Kang, Soojin / Hur, Uk / Kim, Jongsung et al. | 2023
-
A feature selection based on genetic algorithm for intrusion detection of industrial control systemsFang, Yushan / Yao, Yu / Lin, Xiaoli / Wang, Jiaxuan / Zhai, Hao et al. | 2023
-
Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deceptionRehman, Zubaida / Gondal, Iqbal / Ge, Mengmeng / Dong, Hai / Gregory, Mark / Tari, Zahir et al. | 2023
-
A system dynamics approach to building counterfeit avoidance programsVepraskas, Matthew J / Stirgwolt, Benjamin W et al. | 2024
-
Future of generative adversarial networks (GAN) for anomaly detection in network security: A reviewLim, Willone / Yong, Kelvin Sheng Chek / Lau, Bee Theng / Tan, Colin Choon Lin et al. | 2024
-
Shadow backdoor attack: Multi-intensity backdoor attack against federated learningRen, Qixian / Zheng, Yu / Yang, Chao / Li, Yue / Ma, Jianfeng et al. | 2024
-
Examining usable security features and user perceptions of Physical Authentication DevicesNanda, Ashish / Jeong, Jongkil Jay / Shah, Syed Wajid Ali / Nosouhi, Mohammad / Doss, Robin et al. | 2023
-
Influences of displaying permission-related information on web single sign-on login decisionsMorkonda, Srivathsan G. / Chiasson, Sonia / van Oorschot, Paul C. et al. | 2023
-
Efficient federated learning privacy preservation method with heterogeneous differential privacyLing, Jie / Zheng, Junchang / Chen, Jiahui et al. | 2024
-
BiTCN-TAEfficientNet malware classification approach based on sequence and RGB fusionXuan, Bona / Li, Jin / Song, Yafei et al. | 2024
-
Improving adversarial transferability through hybrid augmentationZhu, Peican / Fan, Zepeng / Guo, Sensen / Tang, Keke / Li, Xingyu et al. | 2023
-
Federated learning for 5G and beyond, a blessing and a curse- an experimental study on intrusion detection systemsDjaidja, Taki Eddine Toufik / Brik, Bouziane / Boualouache, Abdelwahab / Senouci, Sidi Mohammed / Ghamri-Doudane, Yacine et al. | 2024
-
Expanding analytical capabilities in intrusion detection through ensemble-based multi-label classificationHallaji, Ehsan / Razavi-Far, Roozbeh / Saif, Mehrdad et al. | 2024
-
Wasm-Mutate: Fast and effective binary diversification for WebAssemblyCabrera-Arteaga, Javier / Fitzgerald, Nicholas / Monperrus, Martin / Baudry, Benoit et al. | 2024