books search
books
articles search
articles
Donate
Log In
Log In
to access more features
personal recommendations
Telegram Bot
download history
send to Email or Kindle
manage booklists
save to favorites
Explore
Journals
Contribution
Donate
Litera Library
Donate paper books
Add paper books
Open LITERA Point
Volume 2; Issue 1
Main
Cybersecurity
Volume 2; Issue 1
Cybersecurity
Volume 2; Issue 1
1
Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies
Alohaly, Manar
,
Takabi, Hassan
,
Blanco, Eduardo
Journal:
Cybersecurity
Year:
2019
File:
PDF, 1.99 MB
Your tags:
2019
2
The privacy protection mechanism of Hyperledger Fabric and its application in supply chain finance
Ma, Chaoqun
,
Kong, Xiaolin
,
Lan, Qiujun
,
Zhou, Zhongding
Journal:
Cybersecurity
Year:
2019
File:
PDF, 1.65 MB
Your tags:
2019
3
Comprehensive evaluation of key management hierarchies for outsourced data
Kumar, Naveen
,
Mathuria, Anish
Journal:
Cybersecurity
Year:
2019
File:
PDF, 3.23 MB
Your tags:
2019
4
Group topic-author model for efficient discovery of latent social astroturfing groups in tourism domain
Alallaq, Noora
,
Al-khiza’ay, Muhmmad
,
Han, Xin
Journal:
Cybersecurity
Year:
2019
File:
PDF, 1.09 MB
Your tags:
2019
5
Group topic-author model for efficient discovery of latent social astroturfing groups in tourism domain
Alallaq, Noora
,
Al-khiza’ay, Muhmmad
,
Han, Xin
Journal:
Cybersecurity
Year:
2019
Language:
english
File:
PDF, 1.09 MB
Your tags:
english, 2019
6
Creeper: a tool for detecting permission creep in file system access controls
Parkinson, Simon
,
Khan, Saad
,
Bray, James
,
Shreef, Daiyaan
Journal:
Cybersecurity
Year:
2019
Language:
english
File:
PDF, 841 KB
Your tags:
english, 2019
7
Privacy-preserving decision tree for epistasis detection
Chen, Qingfeng
,
Zhang, Xu
,
Zhang, Ruchang
Journal:
Cybersecurity
Year:
2019
Language:
english
File:
PDF, 1.37 MB
Your tags:
english, 2019
8
Adversarial attack and defense in reinforcement learning-from AI security view
Chen, Tong
,
Liu, Jiqiang
,
Xiang, Yingxiao
,
Niu, Wenjia
,
Tong, Endong
,
Han, Zhen
Journal:
Cybersecurity
Year:
2019
File:
PDF, 3.40 MB
Your tags:
2019
9
From proof-of-concept to exploitable
Wang, Yan
,
Wu, Wei
,
Zhang, Chao
,
Xing, Xinyu
,
Gong, Xiaorui
,
Zou, Wei
Journal:
Cybersecurity
Year:
2019
Language:
english
File:
PDF, 1.90 MB
Your tags:
english, 2019
10
From proof-of-concept to exploitable
Wang, Yan
,
Wu, Wei
,
Zhang, Chao
,
Xing, Xinyu
,
Gong, Xiaorui
,
Zou, Wei
Journal:
Cybersecurity
Year:
2019
File:
PDF, 1.90 MB
Your tags:
2019
11
ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense
Okutan, Ahmet
,
Yang, Shanchieh Jay
Journal:
Cybersecurity
Year:
2019
Language:
english
File:
PDF, 3.48 MB
Your tags:
english, 2019
12
An efficient full dynamic group signature scheme over ring
Sun, Yiru
,
Liu, Yanyan
,
Wu, Bo
Journal:
Cybersecurity
Year:
2019
Language:
english
File:
PDF, 685 KB
Your tags:
english, 2019
13
Survey of intrusion detection systems: techniques, datasets and challenges
Khraisat, Ansam
,
Gondal, Iqbal
,
Vamplew, Peter
,
Kamruzzaman, Joarder
Journal:
Cybersecurity
Year:
2019
Language:
english
File:
PDF, 1.65 MB
Your tags:
english, 2019
14
Survey of intrusion detection systems: techniques, datasets and challenges
Khraisat, Ansam
,
Gondal, Iqbal
,
Vamplew, Peter
,
Kamruzzaman, Joarder
Journal:
Cybersecurity
Year:
2019
File:
PDF, 1.65 MB
Your tags:
2019
15
Semi Markov process inspired selfish aware co-operative scheme for wireless sensor networks (SMPISCS)
V, Kanchana Devi
,
R, Ganesan
Journal:
Cybersecurity
Year:
2019
Language:
english
File:
PDF, 1.63 MB
Your tags:
english, 2019
16
PathMarker: protecting web contents against inside crawlers
Wan, Shengye
,
Li, Yue
,
Sun, Kun
Journal:
Cybersecurity
Year:
2019
Language:
english
File:
PDF, 1.33 MB
Your tags:
english, 2019
17
A framework for the extended evaluation of ABAC policies
Morisset, Charles
,
Willemse, Tim A. C.
,
Zannone, Nicola
Journal:
Cybersecurity
Year:
2019
Language:
english
File:
PDF, 1.32 MB
Your tags:
english, 2019
18
On the use of Max-SAT and PDDL in RBAC maintenance
Benedetti, Marco
,
Mori, Marco
Journal:
Cybersecurity
Year:
2019
Language:
english
File:
PDF, 2.35 MB
Your tags:
english, 2019
19
Correction to: Human-as-a-security-sensor for harvesting threat intelligence
Vielberth, Manfred
,
Menges, Florian
,
Pernul, Günther
Journal:
Cybersecurity
Year:
2019
File:
PDF, 210 KB
Your tags:
2019
1
Follow
this link
or find "@BotFather" bot on Telegram
2
Send /newbot command
3
Specify a name for your chatbot
4
Choose a username for the bot
5
Copy an entire last message from BotFather and paste it here
×
×