CybersecurityPub Date : 2023-05-02DOI: 10.1186/s42400-023-00144-1
Muhammad Usama Sardar, C. Fetzer
{"title":"Confidential computing and related technologies: a critical review","authors":"Muhammad Usama Sardar, C. Fetzer","doi":"10.1186/s42400-023-00144-1","DOIUrl":"https://doi.org/10.1186/s42400-023-00144-1","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"49 1","pages":"1-7"},"PeriodicalIF":3.1,"publicationDate":"2023-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77814766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CybersecurityPub Date : 2023-05-01DOI: 10.1186/s42400-023-00141-4
Zonghao Ying, Bin Wu
{"title":"DLP: towards active defense against backdoor attacks with decoupled learning process","authors":"Zonghao Ying, Bin Wu","doi":"10.1186/s42400-023-00141-4","DOIUrl":"https://doi.org/10.1186/s42400-023-00141-4","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"21 1","pages":"1-13"},"PeriodicalIF":3.1,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80667033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CybersecurityPub Date : 2023-04-11DOI: 10.1186/s42400-023-00140-5
D. Berardi, N. Tippenhauer, A. Melis, M. Prandini, F. Callegati
{"title":"Time sensitive networking security: issues of precision time protocol and its implementation","authors":"D. Berardi, N. Tippenhauer, A. Melis, M. Prandini, F. Callegati","doi":"10.1186/s42400-023-00140-5","DOIUrl":"https://doi.org/10.1186/s42400-023-00140-5","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"44 1","pages":"1-13"},"PeriodicalIF":3.1,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88819466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CybersecurityPub Date : 2023-04-03DOI: 10.1186/s42400-023-00153-0
Yi Yang, Ying Li, Kai Chen, Jinghua Liu
{"title":"Jeu de mots paronomasia: a StackOverflow-driven bug discovery approach","authors":"Yi Yang, Ying Li, Kai Chen, Jinghua Liu","doi":"10.1186/s42400-023-00153-0","DOIUrl":"https://doi.org/10.1186/s42400-023-00153-0","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"23 1","pages":"1-17"},"PeriodicalIF":3.1,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81210027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CybersecurityPub Date : 2023-03-02DOI: 10.1186/s42400-022-00133-w
Rubayyi Alghamdi, M. Bellaiche
{"title":"An ensemble deep learning based IDS for IoT using Lambda architecture","authors":"Rubayyi Alghamdi, M. Bellaiche","doi":"10.1186/s42400-022-00133-w","DOIUrl":"https://doi.org/10.1186/s42400-022-00133-w","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"23 1","pages":"1-17"},"PeriodicalIF":3.1,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91307737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CybersecurityPub Date : 2023-02-02DOI: 10.1186/s42400-023-00137-0
Yubing Jiang, P. Shen, Li Zeng, Xiaojie Zhu, Di Jiang, Chi Chen
{"title":"Cancelable biometric schemes for Euclidean metric and Cosine metric","authors":"Yubing Jiang, P. Shen, Li Zeng, Xiaojie Zhu, Di Jiang, Chi Chen","doi":"10.1186/s42400-023-00137-0","DOIUrl":"https://doi.org/10.1186/s42400-023-00137-0","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"31 1","pages":"1-20"},"PeriodicalIF":3.1,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76473471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CybersecurityPub Date : 2023-02-01DOI: 10.1186/s42400-022-00136-7
Sohel Rana, M. Mondal, J. Kamruzzaman
{"title":"RBFK cipher: a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment","authors":"Sohel Rana, M. Mondal, J. Kamruzzaman","doi":"10.1186/s42400-022-00136-7","DOIUrl":"https://doi.org/10.1186/s42400-022-00136-7","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"27 1","pages":"1-19"},"PeriodicalIF":3.1,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79167122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}