-
21
Building a large, realistic and labeled HTTP URI dataset for anomaly-based intrusion detection systems: Biblio-US17
Published 2025-06-01“…Cybersecurity…”
Get full text
Article -
22
CGTS: graph transformer-based anomaly detection in controller area networks
Published 2025-08-01“…Cybersecurity…”
Get full text
Article -
23
Integral cryptanalysis on reduce-round SAILFISH-I
Published 2025-03-01“…Cybersecurity…”
Get full text
Article -
24
The secret behind instant messaging: video identification attack against complex protocols
Published 2025-02-01“…Cybersecurity…”
Get full text
Article -
25
Enhanced anomaly traffic detection framework using BiGAN and contrastive learning
Published 2024-11-01“…Cybersecurity…”
Get full text
Article -
26
Preimage and collision attacks on reduced Ascon using algebraic strategies
Published 2025-05-01“…Cybersecurity…”
Get full text
Article -
27
A hot-repair method for the running software with zero suspends
Published 2025-08-01“…Cybersecurity…”
Get full text
Article -
28
Image encryption scheme based on compressed sensing and fractional quantum logistic-tent map
Published 2025-04-01“…Cybersecurity…”
Get full text
Article -
29
Cocoon: certificateless blockchain wallet supporting both stealth address and revocation
Published 2025-06-01“…Cybersecurity…”
Get full text
Article -
30
Analysis on dendritic deep learning model for AMR task
Published 2024-12-01“…Cybersecurity…”
Get full text
Article -
31
Efficient network attack path optimization method based on prior knowledge-based PPO algorithm
Published 2025-03-01“…Cybersecurity…”
Get full text
Article -
32
Ctta: a novel chain-of-thought transfer adversarial attacks framework for large language models
Published 2025-06-01“…Cybersecurity…”
Get full text
Article -
33
SCAN-C: a lightweight cryptographic algorithm to secure CAN communications in modern vehicles
Published 2025-07-01“…Cybersecurity…”
Get full text
Article -
34
A network intrusion detection method based on contrastive learning and Bayesian Gaussian Mixture Model
Published 2025-06-01“…Cybersecurity…”
Get full text
Article -
35
Privacy preserving federated learning with convolutional variational bottlenecks
Published 2025-05-01“…Cybersecurity…”
Get full text
Article -
36
An efficient video slice encryption scheme and its application
Published 2025-06-01“…Cybersecurity…”
Get full text
Article -
37
Quantum commitments from structured one-way quantum state generators, and more
Published 2025-05-01“…Cybersecurity…”
Get full text
Article -
38
Efficient inner product arguments with sublogarithmic proof and sub-square-root verifier
Published 2025-07-01“…Cybersecurity…”
Get full text
Article -
39
A novel oversampling method based on Wasserstein CGAN for imbalanced classification
Published 2025-02-01“…Cybersecurity…”
Get full text
Article -
40
Deep neural network modeling attacks on arbiter-PUF-based designs
Published 2025-02-01“…Cybersecurity…”
Get full text
Article