Pub Date : 2021-10-31DOI: 10.1007/s11416-021-00404-z
Y. T. Ling, N. F. M. Sani, Mohd Taufik Abdullah, N. A. W. Hamid
{"title":"Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model","authors":"Y. T. Ling, N. F. M. Sani, Mohd Taufik Abdullah, N. A. W. Hamid","doi":"10.1007/s11416-021-00404-z","DOIUrl":"https://doi.org/10.1007/s11416-021-00404-z","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"183 - 203"},"PeriodicalIF":0.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45097795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-18DOI: 10.1007/s11416-021-00402-1
U. Saxena, Taj Alam
{"title":"Role based access control using identity and broadcast based encryption for securing cloud data","authors":"U. Saxena, Taj Alam","doi":"10.1007/s11416-021-00402-1","DOIUrl":"https://doi.org/10.1007/s11416-021-00402-1","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"171 - 182"},"PeriodicalIF":0.0,"publicationDate":"2021-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43807539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-15DOI: 10.1007/s11416-021-00399-7
K. D. Ermakov
{"title":"Hamsi-based parametrized family of hash-functions","authors":"K. D. Ermakov","doi":"10.1007/s11416-021-00399-7","DOIUrl":"https://doi.org/10.1007/s11416-021-00399-7","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"11 - 24"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52704333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-08-21DOI: 10.1007/s11416-021-00397-9
Z. Alebouyeh, A. Bidgoly
{"title":"Zipf’s law analysis on the leaked Iranian users’ passwords","authors":"Z. Alebouyeh, A. Bidgoly","doi":"10.1007/s11416-021-00397-9","DOIUrl":"https://doi.org/10.1007/s11416-021-00397-9","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"101 - 116"},"PeriodicalIF":0.0,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00397-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52704235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-08-06DOI: 10.1007/s11416-021-00392-0
C. Bernardeschi, G. Dini, Maurizio Palmieri, Francesco Racciatti
{"title":"A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks","authors":"C. Bernardeschi, G. Dini, Maurizio Palmieri, Francesco Racciatti","doi":"10.1007/s11416-021-00392-0","DOIUrl":"https://doi.org/10.1007/s11416-021-00392-0","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"17 1","pages":"249 - 263"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00392-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41456585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-05DOI: 10.1007/s11416-021-00391-1
Mark Vella, C. Colombo, Robert Abela, P. Špaček
{"title":"RV-TEE: secure cryptographic protocol execution based on runtime verification","authors":"Mark Vella, C. Colombo, Robert Abela, P. Špaček","doi":"10.1007/s11416-021-00391-1","DOIUrl":"https://doi.org/10.1007/s11416-021-00391-1","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"17 1","pages":"229 - 248"},"PeriodicalIF":0.0,"publicationDate":"2021-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00391-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43928753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-26DOI: 10.1007/s11416-021-00390-2
M. L. Anupama, P. Vinod, C. A. Visaggio, M. Arya, Josna Philomina, Rincy Raphael, Anson Pinhero, K. Ajith, P. Mathiyalagan
{"title":"Detection and robustness evaluation of android malware classifiers","authors":"M. L. Anupama, P. Vinod, C. A. Visaggio, M. Arya, Josna Philomina, Rincy Raphael, Anson Pinhero, K. Ajith, P. Mathiyalagan","doi":"10.1007/s11416-021-00390-2","DOIUrl":"https://doi.org/10.1007/s11416-021-00390-2","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"147 - 170"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00390-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47824957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}