Items in Division "EAI Endorsed Transactions on Security and Safety"

Group by: Creators | No Grouping
Number of items: 128.

R, Dhaya and R, kanthavel (2025) Breaking the Loop: Adversarial Attacks on Cognitive-AI Feedback via Neural Signal Manipulation. EAI Endorsed Transactions on Security and Safety.

He, Yun and Jia, Xiaoqi and Zhang, Shengzhi and Chitkushev, Lou (2025) SeFS: A Secure and Efficient File Sharing Framework based on the Trusted Execution Environment. EAI Endorsed Transactions on Security and Safety.

Saddiqa, Mubashrah and Ruohonen, Jukka (2025) SoK: The Psychology of Insider Threats. EAI Endorsed Transactions on Security and Safety.

Wagner, Anne and Bakas, Anna and Kennison, Shelia and Chan-Tin, Eric (2022) Comparing Online Surveys for Cybersecurity: SONA and MTurk. EAI Endorsed Transactions on Security and Safety.

Malik, Adeel A. and Tosh, Deepak K. (2022) Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems. EAI Endorsed Transactions on Security and Safety.

Lu, Yang and Li, Shujun and Freitas, Alex and Ioannou, Athina (2022) How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis. EAI Endorsed Transactions on Security and Safety.

Huang, Zhen and Tan, Gang and Yu, Xiaowei (2022) Mitigating Vulnerabilities in Closed Source Software. EAI Endorsed Transactions on Security and Safety.

Akhtar, Muhammad Shoaib and Feng, Tao (2022) A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers. EAI Endorsed Transactions on Security and Safety.

Nagothu, Deeraj and Chen, Yu and Aved, Alexander and Blasch, Erik (2021) Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge. EAI Endorsed Transactions on Security and Safety.

Rahman, Mohammad and Datta, Amarjit and Al-Shaer, Ehab (2021) Automated Configuration Synthesis for Resilient Smart Metering Infrastructure. EAI Endorsed Transactions on Security and Safety.

Luo, Zhengping and Hou, Tao and Zhou, Xiangrong and Zeng, Hui and Lu, Zhuo (2021) Binary Code Similarity Detection through LSTM and Siamese Neural Network. EAI Endorsed Transactions on Security and Safety.

Liu, Wanping and Zhang, Zhoulan and Huang, Cheng and Fang, Yong (2021) CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers. EAI Endorsed Transactions on Security and Safety.

Trieu-Do, Van and Garcia-Lebron, Richard and Xu, Maochao and Xu, Shouhuai and Feng, Yusheng (2021) Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study. EAI Endorsed Transactions on Security and Safety.

Mliki, Hela and Kaceam, Abir and Chaari, Lamia (2021) A Comprehensive Survey on Intrusion Detection based Machine Learning for IoT Networks. EAI Endorsed Transactions on Security and Safety.

Hasan, Kamrul and Shetty, Sachin and Ullah, Md. and Hassanzadeh, Amin and Islam, Tariqul (2021) Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems. EAI Endorsed Transactions on Security and Safety.

Bassey, Joshua and Li, Xiangfang and Qian, Lijun (2021) Device Authentication Codes based on RF Fingerprinting using Deep Learning. EAI Endorsed Transactions on Security and Safety.

Fan, Wei and Huang, Weiqing (2021) Elevated Penetration Attack Models of Virtual Machine Escape Based on FSM. EAI Endorsed Transactions on Security and Safety.

Bashir, Reem and Janicke, Helge and Zeng, Wen (2021) Evaluating the Impact of Sandbox Applications on Live Digital Forensics Investigation. EAI Endorsed Transactions on Security and Safety.

Yang, Zezhang and Li, Jian and Yang, Ping (2021) FedADMP: A Joint Anomaly Detection and Mobility Prediction Framework via Federated Learning. EAI Endorsed Transactions on Security and Safety.

Pan, Shiying and Yang, Can and Li, Runmin (2021) GIP3: Make Privacy Preserving be Easier on Cloud. EAI Endorsed Transactions on Security and Safety.

Bakas, Anna and Wagner, Anne and Johnston, Spencer and Kennison, Shelia and Chan-Tin, Eric (2021) Impact of Personality Types and Matching Messaging on Password Strength. EAI Endorsed Transactions on Security and Safety.

Ikuero, Friday and Germanos, Vasileios and Brooks, Laurence and Zeng, Wen (2021) Is E-voting Systems based on Blockchain Technology Efficient in Nigeria General Elections? EAI Endorsed Transactions on Security and Safety.

Pathak, Prabesh and Poudel, Prabesh and Roy, Sankardas and Caragea, Doina (2021) Leveraging attention-based deep neural networks for security vetting of Android applications. EAI Endorsed Transactions on Security and Safety.

Liu, Zheyuan and Zhang, Rui (2021) Privacy Preserving Collaborative Machine Learning. EAI Endorsed Transactions on Security and Safety.

Wang, Li (2021) Shoal: A Network Level Moving Target Defense Engine with Software Defined Networking. EAI Endorsed Transactions on Security and Safety.

Liu, Hong and Vasserman, Eugene (2021) Side-channel Programming for Software Integrity Checking. EAI Endorsed Transactions on Security and Safety.

Azhar, M and Whitehead, Robert (2021) A study of user experiences and network analysis on anonymity and traceability of bitcoin transactions. EAI Endorsed Transactions on Security and Safety.

Han, Chunling and Xue, Rui (2020) Aggregation for Privately Trained Different Types of Local Models. EAI Endorsed Transactions on Security and Safety.

Tian, Yifan and Yuan, Jiawei and Hou, Yantian (2020) CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized k-d Forest. EAI Endorsed Transactions on Security and Safety.

Alwadi, Mazen and Awad, Amro (2020) Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories. EAI Endorsed Transactions on Security and Safety.

Tasali, Qais and Sublett, Christine and Vasserman, Eugene (2020) Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems. EAI Endorsed Transactions on Security and Safety.

Imoize, Agbotiname and Ben-Adeola, Boluwatife and Adebisi, John (2020) Development of a Multifactor-Security-Protocol System Using Ambient Noise Synthesis. EAI Endorsed Transactions on Security and Safety.

Mohaisen, David and Zhu, Sencun (2020) Editorial. EAI Endorsed Transactions on Security and Safety.

Sun, Mingxin and Wang, Wenjie and Feng, Hantao and Sun, Hongu and Zhang, Yuqing (2020) Identify Vulnerability Fix Commits Automatically Using Hierarchical Attention Network. EAI Endorsed Transactions on Security and Safety.

Li, Lanhang and Luo, Yuling and Tang, Shubin and Cao, Lvchen and Ouyang, Xue (2020) Image encryption algorithm using chaotic maps and cellular automata. EAI Endorsed Transactions on Security and Safety.

Zhang, Jing and Wen, Yu (2020) Malware Detection Based on Opcode Dynamic Analysis. EAI Endorsed Transactions on Security and Safety.

Chen, Yuxuan and Yuan, Xuejing and Wang, Aohui and Chen, Kai and Zhang, Shengzhi and Huang, Heqing (2020) Manipulating Users’ Trust on Amazon Echo: Compromising Smart Home from Outside. EAI Endorsed Transactions on Security and Safety.

Saqib, Najmudin and Germanos, Vasileios and Zeng, Wen and Maglaras, Leandros (2020) Mapping of the Security Requirements of GDPR and NISD. EAI Endorsed Transactions on Security and Safety.

Anwar, Afsah and Khormali, Aminollah and Choi, Jinchun and Alasmary, Hisham and Choi, Sung and Salem, Saeed and Nyang, DaeHun and Mohaisen, David (2020) Measuring the Cost of Software Vulnerabilities. EAI Endorsed Transactions on Security and Safety.

Fitwi, Alem and Yuan, Meng and Nikouei, Seyed and Chen, Yu (2020) Minor Privacy Protection by Real-time Children Identification and Face Scrambling at the Edge. EAI Endorsed Transactions on Security and Safety.

Park, Soohyun and Kang, Yeongeun and Park, Jeman and Kim, Joongheon (2020) Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications. EAI Endorsed Transactions on Security and Safety.

Liu, Yan (2020) User Identity Linkage Method Based on User Online Habit. EAI Endorsed Transactions on Security and Safety.

He, Yuan and Wang, Wenjie and Sun, Hongyu and Zhang, Yuqing (2020) Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone. EAI Endorsed Transactions on Security and Safety.

Jin, Qiuqing and Wang, Liming (2020) Zero-Trust Based Distributed Collaborative Dynamic Access Control Scheme with Deep Multi-Agent Reinforcement Learning. EAI Endorsed Transactions on Security and Safety.

Li, Yixin and Wang, Liming and Yang, Jing and Xu, Zhen and Luo, Xi (2020) deMSF: a Method for Detecting Malicious Server Flocks for Same Campaign. EAI Endorsed Transactions on Security and Safety.

Xue, Hongfa and Chen, Yurong and Venkataramani, Guru and Lan, Tian (2019) AMASS: Automated Software Mass Customization via Feature Identification and Tailoring. EAI Endorsed Transactions on Security and Safety.

Liu, Naiwei and Zang, Wanyu and Chen, Songqing and Yu, Meng and Sandhu, Ravi (2019) Adaptive Noise Injection against Side-Channel Attacks on ARM Platform. EAI Endorsed Transactions on Security and Safety.

Li, Yi and Xiong, Kaiqi and Li, Xiangyang (2019) Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur. EAI Endorsed Transactions on Security and Safety.

Amin, Md Al and Shetty, Sachin and Njilla, Laurent and Tosh, Deepak and Kamhoua, Charles (2019) Attacker Capability based Dynamic Deception Model for Large-Scale Networks. EAI Endorsed Transactions on Security and Safety.

Liu, Anyi and Haidar, Selena and Cheng, Yuan and Li, Yingjiu (2019) Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log. EAI Endorsed Transactions on Security and Safety.

Zhang, Wei and Zhao, Jingwen and Wei, Fengqiong and Chen, Yunfang (2019) Differentially Private High-Dimensional Data Publication via Markov Network. EAI Endorsed Transactions on Security and Safety.

Meyer, Audrey and Roy, Sankardas (2019) Do Metadata-based Deleted-File-Recovery (DFR) Tools Meet NIST Guidelines? EAI Endorsed Transactions on Security and Safety.

Cui, Weiqi and Yu, Jiangmin and Gong, Yanmin and Chan-Tin, Eric (2019) Efficient, Effective, and Realistic Website Fingerprinting Mitigation. EAI Endorsed Transactions on Security and Safety.

He, Xianmang and Hong, Yuan and Chen, Yindong (2019) Exploring the Privacy Bound for Differential Privacy: From Theory to Practice. EAI Endorsed Transactions on Security and Safety.

Perez, Rocio Lopez and Adamsky, Florian and Soua, Ridha and Engel, Thomas (2019) Forget the Myth of the Air Gap: Machine Learning for Reliable Intrusion Detection in SCADA Systems. EAI Endorsed Transactions on Security and Safety.

Wang, Chonghua and Yin, Libo and Li, Jun and Chen, Xuehong and Yin, Rongchao and Yun, Xiaochun and Jiao, Yang and Hao, Zhiyu (2019) HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware. EAI Endorsed Transactions on Security and Safety.

Alqahtani, Saeed and Li, Shujun and Yuan, Haiyue and Rusconi, Patrice (2019) Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? EAI Endorsed Transactions on Security and Safety.

Song, Yang and Wu, Chen and Zhu, Sencun and Wang, Haining (2019) A Machine Learning Based Approach for Mobile App Rating Manipulation Detection. EAI Endorsed Transactions on Security and Safety.

Anastopoulos, V. and Katsikas, S. (2019) A Methodology for the Dynamic Design of Adaptive Log Management Infrastructures. EAI Endorsed Transactions on Security and Safety.

Khalili, Mina and Zhang, Mengyuan and Borbor, Daniel and Wang, Lingyu and Scarabeo, Nicandro and Zamor, Michel-Ange (2019) Monitoring and Improving Managed Security Services inside a Security Operation Center. EAI Endorsed Transactions on Security and Safety.

Ma, Qiumao and Zhang, Wensheng (2019) Octopus ORAM: An Oblivious RAM with Communication and Server Storage Efficiency. EAI Endorsed Transactions on Security and Safety.

Tang, Yuzhe and Li, Kai and Areekijseree, Katchaguy and Zhou, Shuigeng and Hu, Liting (2019) Privacy-Preserving Multi-Party Directory Services. EAI Endorsed Transactions on Security and Safety.

Luo, Zhengping and Qu, Zhe and Nguyen, Tung and Zeng, Hui and Lu, Zhuo (2019) Security of HPC Systems: From a Log-analyzing Perspective. EAI Endorsed Transactions on Security and Safety.

Sachidananda, Vinay and Bhairav, Suhas and Elovici, Yuval (2019) Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service. EAI Endorsed Transactions on Security and Safety.

Xia, Tianrou and Sun, Yuanyi and Zhu, Sencun and Rasheed, Zeeshan and Shafique, Khurram (2019) Toward A Network-Assisted Approach for Effective Ransomware Detection. EAI Endorsed Transactions on Security and Safety.

Gountia, Debasis (2019) Towards Scalability Trade-off and Security Issues in State-of-the-art Blockchain. EAI Endorsed Transactions on Security and Safety.

Karami, Mohammad and Wang, An and Chen, Songqing (2018) Attribution of Economic Denial of Sustainability Attacks in Public Clouds. EAI Endorsed Transactions on Security and Safety.

Li, Yue and Wang, Haining and Sun, Kun (2018) BluePass: A Mobile Device Assisted Password Manager. EAI Endorsed Transactions on Security and Safety.

Wang, Li and Wu, Dinghao (2018) Bridging the Gap Between Security Tools and SDN Controllers. EAI Endorsed Transactions on Security and Safety.

Zhu, Sencun and Jones, Kevin and Maglaras, Leandros A. (2018) Defence Mechanisms for Public Systems. EAI Endorsed Transactions on Security and Safety.

Xu, Lei and Chen, Lin and Gao, Zhimin and Xu, Shouhuai and Shi, Weidong (2018) Efficient Public Blockchain Client for Lightweight Users. EAI Endorsed Transactions on Security and Safety.

Huang, Chu and Zhu, Sencun and Yang, Yi (2018) An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process. EAI Endorsed Transactions on Security and Safety.

Kamalakannan, V. and Tamilselvan, S. (2018) FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things. EAI Endorsed Transactions on Security and Safety.

Hadj, Maryem Ait El and Khoumsi, Ahmed and Benkaouz, Yahya and Erradi, Mohammed (2018) Formal Approach to Detect and Resolve Anomalies while Clustering ABAC Policies. EAI Endorsed Transactions on Security and Safety.

Rjaibi, N. and Rabai, L.B.A (2018) How Stakeholders Perceived Security Risks? A New Predictive Functional Level Model and its Application to E-Learning. EAI Endorsed Transactions on Security and Safety.

Ceesay, E.N. and Myers, K. and Watters, P.A. (2018) Human-centered strategies for cyber-physical systems security. EAI Endorsed Transactions on Security and Safety.

Homoliak, Ivan and Teknös, Martin and Ochoa, Martín and Breitenbacher, Dominik and Hosseini, Saeid and Hanacek, Petr (2018) Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. EAI Endorsed Transactions on Security and Safety.

Chin, Tommy and Xiong, Kaiqi and Rahouti, Mohamed (2018) Kernel-Space Intrusion Detection Using Software-Defined Networking. EAI Endorsed Transactions on Security and Safety.

Witte, Tim (2018) Mouse Underlaying: Global Key and Mouse Listener Based on an Almost Invisible Window with Local Listeners and Sophisticated Focus. EAI Endorsed Transactions on Security and Safety.

Meng, Fanhao and Lin, Rongheng and Wang, Zhuoran and Zou, Hua and Zhou, Shiqi (2018) A Multi-connection Encryption Algorithm Applied in Secure Channel Service System. EAI Endorsed Transactions on Security and Safety.

Maglaras, Leandros and Drivas, George and Noou, Kleanthis and Rallis, Stylianos (2018) NIS directive: The case of Greece. EAI Endorsed Transactions on Security and Safety.

Mohaisen, Aziz and Alrawi, Omar and Park, Jeman and Kim, Joongheon and Nyang, DaeHun and Mohaisen, Manar (2018) Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering. EAI Endorsed Transactions on Security and Safety.

Wang, Zheng and Yu, Shui and Rose, Scott (2018) An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks. EAI Endorsed Transactions on Security and Safety.

Qu, Wenyu and Huo, Wei and Wang, Lingyu (2018) Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications. EAI Endorsed Transactions on Security and Safety.

Sun, Xiaoyan and Dai, Jun and Singhal, Anoop and Liu, Peng (2018) Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud. EAI Endorsed Transactions on Security and Safety.

Jafer, Muhammad and Khan, M. and Rehman, Sabih ur and Zia, Tanveer (2018) Secure Communication in VANET Broadcasting. EAI Endorsed Transactions on Security and Safety.

Alhebaishi, Nawaf and Wang, Lingyu and Singhal, Anoop (2018) Threat Modeling for Cloud Infrastructures. EAI Endorsed Transactions on Security and Safety.

Maglaras, Leandros and Ferrag, Mohamed and Derhab, Abdelouahid and Mukherjee, Mithun and Janicke, Helge and Rallis, Stylianos (2018) Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures. EAI Endorsed Transactions on Security and Safety.

Guan, Le and Farhang, Sadegh and Pu, Yu and Guo, Pinyao and Grossklags, Jens and Liu, Peng (2018) VaultIME: Regaining User Control for Password Managers through Auto-correction. EAI Endorsed Transactions on Security and Safety.

Xiong, Kaiqi (2018) The performance analysis of public key cryptography-based authentication. EAI Endorsed Transactions on Security and Safety.

Rizzetti, Tiago and Silva, Bolívar Menezes da and Rodrigues, Alexandre Silva and Milbradt, Rafael Gressler and Canha, Luciane Neves (2018) A secure and lightweight multicast communication system for Smart Grids. EAI Endorsed Transactions on Security and Safety.

Balen, Nicolas Van and Ball, Christopher and Wang, Haining (2017) Analysis of Targeted Mouse Movements for Gender Classification. EAI Endorsed Transactions on Security and Safety.

Paladi, Nicolae and Gehrmann, Christian (2017) Bootstrapping trust in software defined networks. EAI Endorsed Transactions on Security and Safety.

Cheng, Leixiao and Wu, Quanshui and Zhao, Yunlei (2017) Compact lossy and all-but-one trapdoor functions from lattice. EAI Endorsed Transactions on Security and Safety.

Li, Yongfeng and Ouyang, Jinbing and Mao, Bing and Ma, Kai and Guo, Shanqing (2017) Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks. EAI Endorsed Transactions on Security and Safety.

Niyaz, Quamar and Sun, Weiqing and Javaid, Ahmad Y. (2017) A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN). EAI Endorsed Transactions on Security and Safety.

Dong, Qi and Yang, Zekun and Chen, Yu and Li, Xiaohua and Zeng, Kai (2017) Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs. EAI Endorsed Transactions on Security and Safety.

Kannan, Subramaniyam and Wood, Paul and Chaterji, Somali and Bagchi, Saurabh and Deatrick, Larry and Beane, Patricia (2017) MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks. EAI Endorsed Transactions on Security and Safety.

Leca, Cristian Liviu (2017) Overview of Romania 802.11Wireless Security & Statistics. EAI Endorsed Transactions on Security and Safety.

Tan, Zheng and Wang, Cheng and Fu, Xiaoling and Cui, Jipeng and Jiang, Changjun and Han, Weili (2017) Re-identification of Vehicular Location-Based Metadata. EAI Endorsed Transactions on Security and Safety.

Zhu, Dr. Sencun and Jones, Dr. Kevin and Maglaras, Dr. Leandros A. (2017) Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems. EAI Endorsed Transactions on Security and Safety.

Ray, Apala and Akerberg, Johan and Björkman, Mats and Gidlund, Mikael (2016) Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase. EAI Endorsed Transactions on Security and Safety.

Mandal, Kalikinkar and Gong, Guang (2016) Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications. EAI Endorsed Transactions on Security and Safety.

Rowe, N. C. (2016) Identifying forensically uninteresting files in a large corpus. EAI Endorsed Transactions on Security and Safety.

AlMajed, Najlaa and Maglaras, Leandros A. and Siewe, Francois and Janicke, Helge and Zadeh, Pooneh Bagheri (2016) Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Activities. EAI Endorsed Transactions on Security and Safety.

Janicke, H. and Jones, Kevin and Maglaras, L. (2016) Security, Privacy and Trust in Cyber Physical Systems. EAI Endorsed Transactions on Security and Safety.

Burghouwt, Pieter and Spruit, Marcel E.M. and Sips, Henk J. (2015) Detection of Botnet Command and Control Traffic by the Multistage Trust Evaluation of Destination Identifiers. EAI Endorsed Transactions on Security and Safety.

Ahmat, Daouda and Magoni, Damien and Bissyandé, Tegawendé F. (2015) End-to-End Key Exchange through Disjoint Paths in P2P Networks. EAI Endorsed Transactions on Security and Safety.

Elashry, I. and Mu, Y. and Susilo, W. (2015) Mediated Encryption: Analysis and Design. EAI Endorsed Transactions on Security and Safety.

Chen, Kai and Shao, Jun (2015) Preface to special issue on miscellaneous emerging security problems. EAI Endorsed Transactions on Security and Safety.

Zhu, Minghui and Liu, Peng (2015) Reviewing the book “Principles of Cyber-physical Systems” from a security perspective. EAI Endorsed Transactions on Security and Safety.

Strackx, Raoul and Agten, Pieter and Avonds, Niels and Piessens, Frank (2015) Salus: Kernel Support for Secure Process Compartments. EAI Endorsed Transactions on Security and Safety.

Kugler, Christopher and Müller, Tilo (2015) Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits. EAI Endorsed Transactions on Security and Safety.

Alarfi, Fahad and Fernández, Maribel (2015) Towards Privacy-Preserving Web Metering Via User-Centric Hardware. EAI Endorsed Transactions on Security and Safety.

Wang, Yazhe and Hu, Mingming Mingming and Li, Chen (2015) UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts. EAI Endorsed Transactions on Security and Safety.

Fan, Xinxin and Mandal, Kalikinkar and Gong, Guang (2015) WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. EAI Endorsed Transactions on Security and Safety.

Maglaras, Leandros A. and Jiang, Jianmin (2015) A novel intrusion detection method based on OCSVM and K-means recursive clustering. EAI Endorsed Transactions on Security and Safety.

Cooke, Nancy J. and Champion, Michael and Rajivan, Prashanth and Jariwala, Shree (2013) Cyber situation awareness and teamwork. EAI Endorsed Transactions on Security and Safety.

Haas, M.W. and Hirshfield, L.M. and Ponangi, P.V. and Kidambi, P. and Rao, D. and Edala, N. and Armbrust, E. and Fendley, M. and Narayanan, S. (2013) Decision-making and emotions in the contested information environment. EAI Endorsed Transactions on Security and Safety.

Nixon, J. and McGuinness, B. (2013) Framing the Human Dimension in Cybersecurity. EAI Endorsed Transactions on Security and Safety.

Cooke, Nancy. J. and McNeese, Michael. D. (2013) Preface to special issue on the cognitive science of cyber defence analysis. EAI Endorsed Transactions on Security and Safety.

Andrews, Dee H. and Freeman, Jared and Andre, Terence S. and Feeney, John and Carlin, Alan and Fidopiastis, Cali M. and Fitzgerald, Patricia (2013) Training organizational supervisors to detect and prevent cyber insider threats: two approaches. EAI Endorsed Transactions on Security and Safety.

Tyworth, Michael and Giacobe, Nicklaus A. and Mancuso, Vincent F. and McNeese, Michael D. and Hall, David L. (2013) A human-in-the-loop approach to understanding situation awareness in cyber defence analysis. EAI Endorsed Transactions on Security and Safety.

Motahari, Sara and Mayer, Julia and Jones, Quentin (2011) How did you know that about me? Protecting users against unwanted inferences. EAI Endorsed Transactions on Security and Safety.

Xu, Heng and Tan, Chuan-Hoo (2011) Introduction to special issue on information privacy and trust in social media. EAI Endorsed Transactions on Security and Safety.

Xu, Heng and Dinev, Tamara and Li, Han (2011) Trust in social computing. The case of peer-to-peer file sharing networks. EAI Endorsed Transactions on Security and Safety.

Liu, Peng (2011) Welcome message from the Editor-in-Chief. EAI Endorsed Transactions on Security and Safety.

Razavi, Maryam Najafian and Gillet, Denis (2011) A framework for usable end-user privacy control in social software systems. EAI Endorsed Transactions on Security and Safety.

This list was generated on Mon May 4 10:31:03 2026 UTC.