首页 文献索引 SCI期刊 AI助手
期刊目录筛选

期刊名:Cybersecurity

缩写:

ISSN:2523-3246

e-ISSN:2523-3246

IF/分区:3.7/Q1

文章目录 更多期刊信息

共收录本刊相关文章索引8
Clinical Trial Case Reports Meta-Analysis RCT Review Systematic Review
Classical Article Case Reports Clinical Study Clinical Trial Clinical Trial Protocol Comment Comparative Study Editorial Guideline Letter Meta-Analysis Multicenter Study Observational Study Randomized Controlled Trial Review Systematic Review
Alireza Hafez,Dorsa Nahid,Majid Khabbazian Alireza Hafez
Nearly all modern smartphones are now equipped with a barometer to sample air pressure. Accessing these samples is deemed harmless, hence does not require permission. In this work, we demonstrate that barometer samples can reveal sensitive ...
Batoul Achaal,Mehdi Adda,Maxime Berger et al. Batoul Achaal et al.
Smart Grid (SG) technology utilizes advanced network communication and monitoring technologies to manage and regulate electricity generation and transport. However, this increased reliance on technology and connectivity also introduces new ...
Zishuai Song,Hui Ma,Shuzhou Sun et al. Zishuai Song et al.
Personally identifiable information (PII) refers to any information that links to an individual. Sharing PII is extremely useful in public affairs yet hard to implement due to the worries about privacy violations. Building a PII retrieval s...
Haizhou Wang,Anoop Singhal,Peng Liu Haizhou Wang
In recent years, deep learning gained proliferating popularity in the cybersecurity application domain, since when being compared to traditional machine learning methods, it usually involves less human efforts, produces better results, and ...
Anjaneya Awasthi,Noopur Goel Anjaneya Awasthi
Internet or public internetwork has become a vulnerable place nowadays as there are so many threats available for the novice or careless users because there exist many types of tools and techniques being used by notorious people on it to vi...
Jenny Heino,Antti Hakkala,Seppo Virtanen Jenny Heino
Given the global increase in remote work with the COVID-19 pandemic and deperimeterization due to cloud deployment of next generation firewalls, the concept of a next generation firewall is at a breaking point. It is becoming more difficult...
Gatha Varma,Ritu Chauhan,Dhananjay Singh Gatha Varma
The collection of user attributes by service providers is a double-edged sword. They are instrumental in driving statistical analysis to train more accurate predictive models like recommenders. The analysis of the collected user data includ...
Sharma Sagar,Chen Keke Sharma Sagar
With the ever-growing data and the need for developing powerful machine learning models, data owners increasingly depend on various untrusted platforms (e.g., public clouds, edges, and machine learning service providers) for scalable proces...