Issue 4/2022
Content (12 Articles)
Scalable, password-based and threshold authentication for smart homes
Andrea Huszti, Szabolcs Kovács, Norbert Oláh
MAPAS: a practical deep learning-based android malware detection system
Jinsung Kim, Younghoon Ban, Eunbyeol Ko, Haehyun Cho, Jeong Hyun Yi
A first look at references from the dark to the surface web world: a case study in Tor
Mahdieh Zabihimayvan, Derek Doran
IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core
Kazuki Koike, Ryotaro Kobayashi, Masahiko Katoh
Developing non-interactive MPC with trusted hardware for enhanced security
Ryan Karl, Hannah Burchfield, Jonathan Takeshita, Taeho Jung
ThunderSecure: deploying real-time intrusion detection for 100G research networks by leveraging stream-based features and one-class classification network
Qian Gong, Phil DeMar, Mine Altunay
A multi-objective cost–benefit optimization algorithm for network hardening
Kengo Zenitani
A systematic literature review on wearable health data publishing under differential privacy
Munshi Saifuzzaman, Tajkia Nuri Ananna, Mohammad Jabed Morshed Chowdhury, Md Sadek Ferdous, Farida Chowdhury
A survey on analyzing encrypted network traffic of mobile devices
Ankit Agrawal, Ashutosh Bhatia, Ayush Bahuguna, Kamlesh Tiwari, K. Haribabu, Deepak Vishwakarma, Rekha Kaushik
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains
Unsub Zia, Mark McCartney, Bryan Scotney, Jorge Martinez, Mamun AbuTair, Jamshed Memon, Ali Sajjad
Challenges of post-quantum digital signing in real-world applications: a survey
Teik Guan Tan, Pawel Szalachowski, Jianying Zhou