-
1
Speedup signing: pre-rejection sampling towards dilithium
Published 2025-02-01“…Cybersecurity…”
Get full text
Article -
2
A novel approach for detecting malicious hosts based on RE-GCN in intranet
Published 2024-12-01“…Cybersecurity…”
Get full text
Article -
3
Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method
Published 2025-01-01“…Cybersecurity…”
Get full text
Article -
4
When LLMs meet cybersecurity: a systematic literature review
Published 2025-02-01“…Cybersecurity…”
Get full text
Article -
5
Angus: efficient active learning strategies for provenance based intrusion detection
Published 2025-01-01“…Cybersecurity…”
Get full text
Article -
6
A graph backdoor detection method for data collection scenarios
Published 2025-01-01“…Cybersecurity…”
Get full text
Article -
7
A novel oversampling method based on Wasserstein CGAN for imbalanced classification
Published 2025-02-01“…Cybersecurity…”
Get full text
Article -
8
-
9
The SEIRS-NIMFA epidemiological model for malware propagation analysis in IoT networks
Published 2025-01-01“…Cybersecurity…”
Get full text
Article -
10
IRMAOC: an interpretable role mining algorithm based on overlapping clustering
Published 2025-01-01“…Cybersecurity…”
Get full text
Article -
11
Reusable and robust fuzzy extractor for CRS-dependent sources
Published 2025-01-01“…Cybersecurity…”
Get full text
Article -
12
A privacy-enhanced framework with deep learning for botnet detection
Published 2025-01-01“…Cybersecurity…”
Get full text
Article -
13
Privacy-preserving attribute-based access control using homomorphic encryption
Published 2025-01-01“…Cybersecurity…”
Get full text
Article