首页 > 最新文献

Angles最新文献

英文 中文
Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model 基于结构特征和隐马尔可夫模型的非负矩阵分解的变形恶意软件检测
Q3 Arts and Humanities Pub Date : 2021-10-31 DOI: 10.1007/s11416-021-00404-z
Y. T. Ling, N. F. M. Sani, Mohd Taufik Abdullah, N. A. W. Hamid
{"title":"Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model","authors":"Y. T. Ling, N. F. M. Sani, Mohd Taufik Abdullah, N. A. W. Hamid","doi":"10.1007/s11416-021-00404-z","DOIUrl":"https://doi.org/10.1007/s11416-021-00404-z","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"183 - 203"},"PeriodicalIF":0.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45097795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Role based access control using identity and broadcast based encryption for securing cloud data 基于角色的访问控制,使用基于身份和广播的加密来保护云数据
Q3 Arts and Humanities Pub Date : 2021-09-18 DOI: 10.1007/s11416-021-00402-1
U. Saxena, Taj Alam
{"title":"Role based access control using identity and broadcast based encryption for securing cloud data","authors":"U. Saxena, Taj Alam","doi":"10.1007/s11416-021-00402-1","DOIUrl":"https://doi.org/10.1007/s11416-021-00402-1","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"171 - 182"},"PeriodicalIF":0.0,"publicationDate":"2021-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43807539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Hamsi-based parametrized family of hash-functions 基于hamsi的参数化哈希函数族
Q3 Arts and Humanities Pub Date : 2021-09-15 DOI: 10.1007/s11416-021-00399-7
K. D. Ermakov
{"title":"Hamsi-based parametrized family of hash-functions","authors":"K. D. Ermakov","doi":"10.1007/s11416-021-00399-7","DOIUrl":"https://doi.org/10.1007/s11416-021-00399-7","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"11 - 24"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52704333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum differential cryptanalysis 量子差分密码分析
Q3 Arts and Humanities Pub Date : 2021-09-03 DOI: 10.1007/s11416-021-00395-x
D. Denisenko
{"title":"Quantum differential cryptanalysis","authors":"D. Denisenko","doi":"10.1007/s11416-021-00395-x","DOIUrl":"https://doi.org/10.1007/s11416-021-00395-x","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"3 - 10"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47001239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zipf’s law analysis on the leaked Iranian users’ passwords Zipf对泄露的伊朗用户密码的法律分析
Q3 Arts and Humanities Pub Date : 2021-08-21 DOI: 10.1007/s11416-021-00397-9
Z. Alebouyeh, A. Bidgoly
{"title":"Zipf’s law analysis on the leaked Iranian users’ passwords","authors":"Z. Alebouyeh, A. Bidgoly","doi":"10.1007/s11416-021-00397-9","DOIUrl":"https://doi.org/10.1007/s11416-021-00397-9","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"101 - 116"},"PeriodicalIF":0.0,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00397-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52704235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks 无线传感器网络安全攻击的形式化分析与仿真评估框架
Q3 Arts and Humanities Pub Date : 2021-08-06 DOI: 10.1007/s11416-021-00392-0
C. Bernardeschi, G. Dini, Maurizio Palmieri, Francesco Racciatti
{"title":"A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks","authors":"C. Bernardeschi, G. Dini, Maurizio Palmieri, Francesco Racciatti","doi":"10.1007/s11416-021-00392-0","DOIUrl":"https://doi.org/10.1007/s11416-021-00392-0","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"17 1","pages":"249 - 263"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00392-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41456585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Editorial 社论
Q3 Arts and Humanities Pub Date : 2021-08-02 DOI: 10.1007/s11416-021-00394-y
A. Santone
{"title":"Editorial","authors":"A. Santone","doi":"10.1007/s11416-021-00394-y","DOIUrl":"https://doi.org/10.1007/s11416-021-00394-y","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"17 1","pages":"165 - 166"},"PeriodicalIF":0.0,"publicationDate":"2021-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45749980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-VM cache attacks on Camellia Camellia上的跨虚拟机缓存攻击
Q3 Arts and Humanities Pub Date : 2021-07-23 DOI: 10.1007/s11416-021-00393-z
Milad Seddigh, H. Soleimany
{"title":"Cross-VM cache attacks on Camellia","authors":"Milad Seddigh, H. Soleimany","doi":"10.1007/s11416-021-00393-z","DOIUrl":"https://doi.org/10.1007/s11416-021-00393-z","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"91 - 99"},"PeriodicalIF":0.0,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00393-z","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48276480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RV-TEE: secure cryptographic protocol execution based on runtime verification RV-TEE:基于运行时验证的安全加密协议执行
Q3 Arts and Humanities Pub Date : 2021-07-05 DOI: 10.1007/s11416-021-00391-1
Mark Vella, C. Colombo, Robert Abela, P. Špaček
{"title":"RV-TEE: secure cryptographic protocol execution based on runtime verification","authors":"Mark Vella, C. Colombo, Robert Abela, P. Špaček","doi":"10.1007/s11416-021-00391-1","DOIUrl":"https://doi.org/10.1007/s11416-021-00391-1","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"17 1","pages":"229 - 248"},"PeriodicalIF":0.0,"publicationDate":"2021-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00391-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43928753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detection and robustness evaluation of android malware classifiers android恶意软件分类器的检测与鲁棒性评估
Q3 Arts and Humanities Pub Date : 2021-06-26 DOI: 10.1007/s11416-021-00390-2
M. L. Anupama, P. Vinod, C. A. Visaggio, M. Arya, Josna Philomina, Rincy Raphael, Anson Pinhero, K. Ajith, P. Mathiyalagan
{"title":"Detection and robustness evaluation of android malware classifiers","authors":"M. L. Anupama, P. Vinod, C. A. Visaggio, M. Arya, Josna Philomina, Rincy Raphael, Anson Pinhero, K. Ajith, P. Mathiyalagan","doi":"10.1007/s11416-021-00390-2","DOIUrl":"https://doi.org/10.1007/s11416-021-00390-2","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"147 - 170"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00390-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47824957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Angles
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1