Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 138
1.
  • Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks
    Hong Hu; Shinde, Shweta; Adrian, Sendroiu ... 2016 IEEE Symposium on Security and Privacy (SP), 05/2016
    Conference Proceeding, Journal Article

    As control-flow hijacking defenses gain adoption, it is important to understand the remaining capabilities of adversaries via memory exploits. Non-control data exploits are used to mount information ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
2.
  • Monet: A User-Oriented Beha... Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android
    Mingshen Sun; Xiaolei Li; Lui, John C. S. ... IEEE transactions on information forensics and security 12, Številka: 5
    Journal Article
    Recenzirano

    Android, the most popular mobile OS, has around 78% of the mobile market share. Due to its popularity, it attracts many malware attacks. In fact, people have discovered around 1 million new malware ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
3.
  • Automated identification of... Automated identification of sensitive data from implicit user specification
    Yang, Ziqi; Liang, Zhenkai Cybersecurity, 29/9, Letnik: 1, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The sensitivity of information is dependent on the context of application and user preference. Protecting sensitive data in the cloud era requires identifying them in the first place. It typically ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
4.
  • Phishing-Alarm: Robust and ... Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity
    Mao, Jian; Tian, Wenqian; Li, Pei ... IEEE access, 01/2017, Letnik: 5
    Journal Article
    Recenzirano
    Odprti dostop

    Social networks have become one of the most popular platforms for users to interact with each other. Given the huge amount of sensitive data available in social network platforms, user privacy ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
5.
  • Phishing page detection via... Phishing page detection via learning classifiers from page layout feature
    Mao, Jian; Bian, Jingdong; Tian, Wenqian ... EURASIP Journal on wireless communications and networking, 02/2019, Letnik: 2019, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The web technology has become the cornerstone of a wide range of platforms, such as mobile services and smart Internet-of-things (IoT) systems. In such platforms, users’ data are aggregated to a ...
Celotno besedilo
Dostopno za: DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK

PDF
6.
  • Man-in-the-browser-cache: P... Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning
    Jia, Yaoqi; Chen, Yue; Dong, Xinshu ... Computers & security, 11/2015, Letnik: 55
    Journal Article
    Recenzirano

    In this paper, we present a systematic study of browser cache poisoning (BCP) attacks, wherein a network attacker performs a one-time Man-In-The-Middle (MITM) attack on a user's HTTPS session, and ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
7.
  • I Can See Your Brain: Inves... I Can See Your Brain: Investigating Home-Use Electroencephalography System Security
    Xiao, Yinhao; Jia, Yizhen; Cheng, Xiuzhen ... IEEE internet of things journal, 08/2019, Letnik: 6, Številka: 4
    Journal Article

    Health-related Internet of Things (IoT) devices are becoming more popular in recent years. On the one hand, users can access information of their health conditions more conveniently; on the other ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
8.
  • BitBlaze: A New Approach to... BitBlaze: A New Approach to Computer Security via Binary Analysis
    Song, Dawn; Brumley, David; Yin, Heng ... Information Systems Security
    Book Chapter
    Recenzirano
    Odprti dostop

    In this paper, we give an overview of the BitBlaze project, a new approach to computer security via binary analysis. In particular, BitBlaze focuses on building a unified binary analysis platform and ...
Celotno besedilo

PDF
9.
  • Toward Exposing Timing-Base... Toward Exposing Timing-Based Probing Attacks in Web Applications
    Mao, Jian; Chen, Yue; Shi, Futian ... Sensors, 02/2017, Letnik: 17, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web ...
Celotno besedilo
Dostopno za: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK

PDF
10.
  • Detecting Malicious Behavio... Detecting Malicious Behaviors in JavaScript Applications
    Mao, Jian; Bian, Jingdong; Bai, Guangdong ... IEEE access, 01/2018, Letnik: 6
    Journal Article
    Recenzirano
    Odprti dostop

    JavaScript applications are widely used in a range of scenarios, including Web applications, mobile applications, and server-side applications. On one hand, due to its excellent cross-platform ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
1 2 3 4 5
zadetkov: 138

Nalaganje filtrov