Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Frontmatter
Does Query Blocking Improve DNS Privacy?
Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks
SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN
Slowloris DoS Countermeasure over WebSocket
Detecting Encrypted Traffic: A Machine Learning Approach
Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks
A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks
Influence Evaluation of Centrality-Based Random Scanning Strategy on Early Worm Propagation Rate
Analysis on South Korean Cybersecurity Readiness Regarding North Korean Cyber Capabilities
A Practical Analysis of TLS Vulnerabilities in Korea Web Environment
Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack
Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach
Pay as You Want: Bypassing Charging System in Operational Cellular Networks
Towards Automated Exploit Generation for Embedded Systems
Empirical Analysis of SSL/TLS Weaknesses in Real Websites: Who Cares?
Development of Information Security Management Assessment Model for the Financial Sector
A Practical Approach to Constructing Triple-Blind Review Process with Maximal Anonymity and Fairness
GIS Vector Map Perceptual Encryption Scheme Using Geometric Objects
Efficient Scalar Multiplication for Ate Based Pairing over KSS Curve of Embedding Degree 18
LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation)
Revocable Group Signatures with Compact Revocation List Using Vector Commitments
The Quantum-Safe Revolution
New Integral Characteristics of KASUMI Derived by Division Property
On Pseudorandomness in Stateless Sources
Algebraic Degree Estimation for Integral Attack by Randomized Algorithm
Applications of Soft Computing in Cryptology
Parallel Implementations of LEA, Revisited
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward
A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation
Exploration of 3D Texture and Projection for New CAPTCHA Design
A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment
Geocasting-Based Almanac Synchronization Method for Secure Maritime Cloud
The Vessel Trajectory Mechanism for Marine Accidents Analysis
Backmatter
← Prev
Back
Next →
← Prev
Back
Next →