Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Frontmatter Does Query Blocking Improve DNS Privacy? Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN Slowloris DoS Countermeasure over WebSocket Detecting Encrypted Traffic: A Machine Learning Approach Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks Influence Evaluation of Centrality-Based Random Scanning Strategy on Early Worm Propagation Rate Analysis on South Korean Cybersecurity Readiness Regarding North Korean Cyber Capabilities A Practical Analysis of TLS Vulnerabilities in Korea Web Environment Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach Pay as You Want: Bypassing Charging System in Operational Cellular Networks Towards Automated Exploit Generation for Embedded Systems Empirical Analysis of SSL/TLS Weaknesses in Real Websites: Who Cares? Development of Information Security Management Assessment Model for the Financial Sector A Practical Approach to Constructing Triple-Blind Review Process with Maximal Anonymity and Fairness GIS Vector Map Perceptual Encryption Scheme Using Geometric Objects Efficient Scalar Multiplication for Ate Based Pairing over KSS Curve of Embedding Degree 18 LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation) Revocable Group Signatures with Compact Revocation List Using Vector Commitments The Quantum-Safe Revolution New Integral Characteristics of KASUMI Derived by Division Property On Pseudorandomness in Stateless Sources Algebraic Degree Estimation for Integral Attack by Randomized Algorithm Applications of Soft Computing in Cryptology Parallel Implementations of LEA, Revisited Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation Exploration of 3D Texture and Projection for New CAPTCHA Design A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment Geocasting-Based Almanac Synchronization Method for Secure Maritime Cloud The Vessel Trajectory Mechanism for Marine Accidents Analysis Backmatter
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion