Search

Your search keyword '"Computer Science - Cryptography and Security"' showing total 87,575 results

Search Constraints

Start Over You searched for: Descriptor "Computer Science - Cryptography and Security" Remove constraint Descriptor: "Computer Science - Cryptography and Security"
87,575 results on '"Computer Science - Cryptography and Security"'

Search Results

1. Forget to Flourish: Leveraging Machine-Unlearning on Pretrained Language Models for Privacy Leakage

2. C-RADAR: A Centralized Deep Learning System for Intrusion Detection in Software Defined Networks

3. On Computational Indistinguishability and Logical Relations

4. Hybridizing Base-Line 2D-CNN Model with Cat Swarm Optimization for Enhanced Advanced Persistent Threat Detection

5. Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution

6. Further Investigation on Differential Properties of the Generalized Ness-Helleseth Function

7. Privacy-Preserving Set-Based Estimation Using Differential Privacy and Zonotopes

8. DeTRAP: RISC-V Return Address Protection With Debug Triggers

9. AI-Driven Intrusion Detection Systems (IDS) on the ROAD dataset: A Comparative Analysis for automotive Controller Area Network (CAN)

10. Secure Ownership Management and Transfer of Consumer Internet of Things Devices with Self-sovereign Identity

11. Investigating Privacy Leakage in Dimensionality Reduction Methods via Reconstruction Attack

12. Leveraging Digital Twin Technologies for Public Space Protection and Vulnerability Assessment

13. Traceable AI-driven Avatars Using Multi-factors of Physical World and Metaverse

14. Wireless Integrated Authenticated Communication System (WIA-Comm)

15. Dual JPEG Compatibility: a Reliable and Explainable Tool for Image Forensics

16. SIMD-Aware Homomorphic Compression and Application to Private Database Query

17. Secure Integrated Sensing and Communication Under Correlated Rayleigh Fading

18. SPOQchain: Platform for Secure, Scalable, and Privacy-Preserving Supply Chain Tracing and Counterfeit Protection

19. Colaboot: A Cloud-based Diskless PC Booting Mechanism

20. Meta-UAD: A Meta-Learning Scheme for User-level Network Traffic Anomaly Detection

21. Safety Layers of Aligned Large Language Models: The Key to LLM Security

22. RLCP: A Reinforcement Learning-based Copyright Protection Method for Text-to-Image Diffusion Model

23. FastForensics: Efficient Two-Stream Design for Real-Time Image Manipulation Detection

24. Android Malware Detection Based on RGB Images and Multi-feature Fusion

25. S3C2 Summit 2023-11: Industry Secure Supply Chain Summit

26. CanCal: Towards Real-time and Lightweight Ransomware Detection and Response in Industrial Environments

27. Branch-and-cut algorithms for colorful components problems

28. Quantum Sieving for Code-Based Cryptanalysis and Its Limitations for ISD

29. Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection

30. Enhancing MOTION2NX for Efficient, Scalable and Secure Image Inference using Convolutional Neural Networks

31. DetectBERT: Towards Full App-Level Representation Learning to Detect Android Malware

32. Understanding Privacy Norms through Web Forms

33. A Persistent Hierarchical Bloom Filter-based Framework for Authentication and Tracking of ICs

34. Different Victims, Same Layout: Email Visual Similarity Detection for Enhanced Email Protection

35. Manipulating OpenFlow Link Discovery Packet Forwarding for Topology Poisoning

36. Analyzing Inference Privacy Risks Through Gradients in Machine Learning

37. A Prototype Model of Zero-Trust Architecture Blockchain with EigenTrust-Based Practical Byzantine Fault Tolerance Protocol to Manage Decentralized Clinical Trials

38. Cyber Risk Assessment for Cyber-Physical Systems: A Review of Methodologies and Recommendations for Improved Assessment Effectiveness

39. Secure Integration of 5G in Industrial Networks: State of the Art, Challenges and Opportunities

40. PromptSmooth: Certifying Robustness of Medical Vision-Language Models via Prompt Learning

41. ARINC 429 Cyber-vulnerabilities and Voltage Data in a Hardware-in-the-Loop Simulator

42. Red Team Redemption: A Structured Comparison of Open-Source Tools for Adversary Emulation

43. Convergent Differential Privacy Analysis for General Federated Learning: the f-DP Perspective

44. LightSLH: Provable and Low-Overhead Spectre v1 Mitigation through Targeted Instruction Hardening

45. SoK: Identifying Limitations and Bridging Gaps of Cybersecurity Capability Maturity Models (CCMMs)

46. Trustless Distributed Symmetric-key Encryption

47. Development of a cyber risk assessment tool for Irish small business owners

48. Improving Lagarias-Odlyzko Algorithm For Average-Case Subset Sum: Modular Arithmetic Approach

49. LLMSecCode: Evaluating Large Language Models for Secure Coding

50. Systematic Evaluation of Synthetic Data Augmentation for Multi-class NetFlow Traffic

Catalog

Books, media, physical & digital resources