Ausgabe 1/2024
Inhalt (15 Artikel)
Networking and cryptography library with a non-repudiation flavor for blockchain
Mohamed Rasslan, Mahmoud M. Nasreldin, Doaa Abdelrahman, Aya Elshobaky, Heba Aslan
DHCP DoS and starvation attacks on SDN controllers and their mitigation
Hafiz Usama Ishtiaq, Areeb Ahmed Bhutta, Adnan Noor Mian
Persistent MobileApp-in-the-Middle (MAitM) attack
Christian Catalano, Franco Tommasi
Exploiting number theory for dynamic software watermarking
Mila Dalla Preda, Michele Ianni
A comparison of graph neural networks for malware classification
Vrinda Malhotra, Katerina Potika, Mark Stamp
Android ransomware detection using a novel hamming distance based feature selection
Hashida Haidros Rahima Manzil, S. Manohar Naik
Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights
Omid Kargarnovin, Amir Mahdi Sadeghzadeh, Rasool Jalili
Provably minimum data complexity integral distinguisher based on conventional division property
Akram Khalesi, Zahra Ahmadian
Protection against adversarial attacks with randomization of recognition algorithm
Grigory Marshalko, Svetlana Koreshkova
Use of cryptography in malware obfuscation
Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia
Using deep graph learning to improve dynamic analysis-based malware detection in PE files
Minh Tu Nguyen, Viet Hung Nguyen, Nathan Shone
A natural language processing approach to Malware classification
Ritik Mehta, Olha Jurečková, Mark Stamp
Partial key exposure attack on RSA using some private key blocks
Santosh Kumar Ravva, K. L. N. C. Prakash, S. R. M. Krishna
Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes
R. Santosh Kumar, K. L. N. C. Prakash, S. R. M. Krishna