Curtis, Frank E.; Molzahn, Daniel K.; Tu, Shenyinying; Wächter, Andreas; Wei, Ermin; Wong, Elizabeth A decomposition algorithm with fast identification of critical contingencies for large-scale security-constrained AC-OPF. (English) Zbl 07819176 Oper. Res. 71, No. 6, 2031-2044 (2023). MSC: 90Cxx PDFBibTeX XMLCite \textit{F. E. Curtis} et al., Oper. Res. 71, No. 6, 2031--2044 (2023; Zbl 07819176) Full Text: DOI
Sun, Hong-Tao; Zhang, Pengfei; Peng, Chen; Zhang, Yajian Neural-network-based event-triggered adaptive security path following control of autonomous ground vehicles subject to abnormal actuator signal. (English) Zbl 07816487 Int. J. Robust Nonlinear Control 33, No. 14, 8275-8289 (2023). MSC: 93C65 93C40 93C85 68T07 PDFBibTeX XMLCite \textit{H.-T. Sun} et al., Int. J. Robust Nonlinear Control 33, No. 14, 8275--8289 (2023; Zbl 07816487) Full Text: DOI
Rifhat, Ramziya; Wang, Kai; Wang, Lei; Zeng, Ting; Teng, Zhidong Global stability of multi-group SEIQR epidemic models with stochastic perturbation in computer network. (English) Zbl 07804334 Electron. Res. Arch. 31, No. 7, 4155-4184 (2023). MSC: 68M25 92D30 34D23 PDFBibTeX XMLCite \textit{R. Rifhat} et al., Electron. Res. Arch. 31, No. 7, 4155--4184 (2023; Zbl 07804334) Full Text: DOI
Verma, Rinku; Kekre, Pranjali; Acharya, Keerti Cryptanalysis using Laplace transform of error function. (English) Zbl 07789252 Jñānābha 53, No. 1, 106-109 (2023). MSC: 11A07 44A10 94A60 11T71 PDFBibTeX XMLCite \textit{R. Verma} et al., Jñānābha 53, No. 1, 106--109 (2023; Zbl 07789252) Full Text: DOI
Shasha, Dennis; Kim, Taegyun; Bonneau, Joseph; Michalevsky, Yan; Shotan, Gil; Winetraub, Yonatan High performance, low energy, and trustworthy blockchains using satellites. (English) Zbl 07780439 Found. Trends Netw. 13, No. 4, 252-325 (2023). MSC: 68M12 PDFBibTeX XMLCite \textit{D. Shasha} et al., Found. Trends Netw. 13, No. 4, 252--325 (2023; Zbl 07780439) Full Text: DOI
Wu, Junhui; Qin, Gang; Cheng, Jun; Cao, Jinde; Yan, Huaicheng; Katib, Iyad Adaptive neural network control for Markov jumping systems against deception attacks. (English) Zbl 07769562 Neural Netw. 168, 206-213 (2023). MSC: 93C40 93B70 93E03 PDFBibTeX XMLCite \textit{J. Wu} et al., Neural Netw. 168, 206--213 (2023; Zbl 07769562) Full Text: DOI
Idrissi, Hind; Ennahbaoui, Mohammed An enhanced anonymous ECC-based authentication for lightweight application in TMIS. (English) Zbl 1522.94104 El Hajji, Said (ed.) et al., Codes, cryptology and information security. 4th international conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13874, 290-320 (2023). MSC: 94A62 94A60 68M12 PDFBibTeX XMLCite \textit{H. Idrissi} and \textit{M. Ennahbaoui}, Lect. Notes Comput. Sci. 13874, 290--320 (2023; Zbl 1522.94104) Full Text: DOI
Alexandru, Andreea B.; Blum, Erica; Katz, Jonathan; Loss, Julian State machine replication under changing network conditions. (English) Zbl 1524.68010 Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13791, 681-710 (2023). MSC: 68M10 68M12 68M25 94A60 94A62 PDFBibTeX XMLCite \textit{A. B. Alexandru} et al., Lect. Notes Comput. Sci. 13791, 681--710 (2023; Zbl 1524.68010) Full Text: DOI
Tsemogne, Olivier; Kouam, Willie; Anwar, Ahmed H.; Hayel, Yezekael; Kamhoua, Charles; Deugoué, Gabriel A network centrality game for epidemic control. (English) Zbl 07727639 Fang, Fei (ed.) et al., Decision and game theory for security. 13th international conference, GameSec 2022, Pittsburgh, PA, USA, October 26–28, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13727, 255-273 (2023). MSC: 91A43 91A15 91A27 92D30 68M25 PDFBibTeX XMLCite \textit{O. Tsemogne} et al., Lect. Notes Comput. Sci. 13727, 255--273 (2023; Zbl 07727639) Full Text: DOI
Ando, Megumi; Christ, Miranda; Lysyanskaya, Anna; Malkin, Tal Poly onions: achieving anonymity in the presence of churn. (English) Zbl 1519.94032 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 715-746 (2023). MSC: 94A60 68P25 68P27 68M10 68M25 PDFBibTeX XMLCite \textit{M. Ando} et al., Lect. Notes Comput. Sci. 13748, 715--746 (2023; Zbl 1519.94032) Full Text: DOI
Bala, Rajni; Asthana, Sooryansh; Ravishankar, V. Quantum and semi-quantum key distribution in networks. (English) Zbl 1528.81105 Int. J. Theor. Phys. 62, No. 5, Paper No. 104, 25 p. (2023). MSC: 81P94 94A60 68Q09 32M25 68M25 81V80 PDFBibTeX XMLCite \textit{R. Bala} et al., Int. J. Theor. Phys. 62, No. 5, Paper No. 104, 25 p. (2023; Zbl 1528.81105) Full Text: DOI arXiv
Debnath, Sumit Kumar; Choudhury, Tanmay; Stănică, Pantelimon; Dey, Kunal; Kundu, Nibedita Delegating signing rights in a multivariate proxy signature scheme. (English) Zbl 1517.94188 Adv. Math. Commun. 17, No. 3, 681-696 (2023). MSC: 94A62 94A60 68M12 68P30 81P94 PDFBibTeX XMLCite \textit{S. K. Debnath} et al., Adv. Math. Commun. 17, No. 3, 681--696 (2023; Zbl 1517.94188) Full Text: DOI
Flizikowski, Adam; Marciniak, Tomasz; Wysocki, Tadeusz A.; Oyerinde, Olutayo Selected aspects of non orthogonal multiple access for future wireless communications. (English) Zbl 07702680 Math. Comput. Sci. 17, No. 2, Paper No. 10, 29 p. (2023). MSC: 68M10 PDFBibTeX XMLCite \textit{A. Flizikowski} et al., Math. Comput. Sci. 17, No. 2, Paper No. 10, 29 p. (2023; Zbl 07702680) Full Text: DOI
Xie, Xuhuan; Liu, Yonggui; Li, Qinxue Neural network-based adaptive event-triggered control for cyber-physical systems under resource constraints and hybrid cyberattacks. (English) Zbl 1519.93135 Automatica 152, Article ID 110977, 12 p. (2023). Reviewer: Savin Treanţă (Bucureşti) MSC: 93C40 93C65 93B70 93D23 93D20 93C83 68T05 PDFBibTeX XMLCite \textit{X. Xie} et al., Automatica 152, Article ID 110977, 12 p. (2023; Zbl 1519.93135) Full Text: DOI
Zhao, Younan; Gu, Peng; Zhu, Fanglai; Liu, Tianyi; Shen, Runjie Security control scheme for cyber-physical system with a complex network in physical layer against false data injection attacks. (English) Zbl 1511.93037 Appl. Math. Comput. 447, Article ID 127908, 16 p. (2023). MSC: 93B36 93B53 93C05 PDFBibTeX XMLCite \textit{Y. Zhao} et al., Appl. Math. Comput. 447, Article ID 127908, 16 p. (2023; Zbl 1511.93037) Full Text: DOI
Choudhury, Ashish; Patra, Arpita On the communication efficiency of statistically secure asynchronous MPC with optimal resilience. (English) Zbl 1511.94078 J. Cryptology 36, No. 2, Paper No. 13, 87 p. (2023). MSC: 94A60 94A62 68P25 68M10 94A05 PDFBibTeX XMLCite \textit{A. Choudhury} and \textit{A. Patra}, J. Cryptology 36, No. 2, Paper No. 13, 87 p. (2023; Zbl 1511.94078) Full Text: DOI
Li, Mu-Yao; Wang, Li; Xie, Wen-Jie; Zhou, Wei-Xing Link stability analysis of temporal international fertilizer trade networks. (English) Zbl 07650537 J. Stat. Mech. Theory Exp. 2023, No. 2, Article ID 023401, 27 p. (2023). MSC: 82-XX PDFBibTeX XMLCite \textit{M.-Y. Li} et al., J. Stat. Mech. Theory Exp. 2023, No. 2, Article ID 023401, 27 p. (2023; Zbl 07650537) Full Text: DOI
Xu, Xiaojia; Wang, Yongcai; Zhang, Yu; Li, Deying A fault diagnosis method to defend scapegoating attack in network tomography. (English) Zbl 1498.68038 Theor. Comput. Sci. 939, 237-249 (2023). MSC: 68M15 68M10 68M25 PDFBibTeX XMLCite \textit{X. Xu} et al., Theor. Comput. Sci. 939, 237--249 (2023; Zbl 1498.68038) Full Text: DOI
Zhang, Mingjun; Yao, Bing On graph proper total colorings with labelling-type restrictions. (Chinese. English summary) Zbl 07800928 Acta Math. Appl. Sin. 45, No. 1, 99-114 (2022). MSC: 05C15 81P45 46A40 PDFBibTeX XMLCite \textit{M. Zhang} and \textit{B. Yao}, Acta Math. Appl. Sin. 45, No. 1, 99--114 (2022; Zbl 07800928) Full Text: Link
Wang, Weizhen; Chen, Xin; Li, Zhen; Jia, Jangbo; Zhang, Min Distributed filtering for nonlinear systems under Dempster-Shafer theory subject to malicious cyber attacks. (English) Zbl 1528.93233 Int. J. Robust Nonlinear Control 32, No. 9, 5485-5500 (2022). MSC: 93E11 93B70 93C10 PDFBibTeX XMLCite \textit{W. Wang} et al., Int. J. Robust Nonlinear Control 32, No. 9, 5485--5500 (2022; Zbl 1528.93233) Full Text: DOI
Zhu, Wenxing; Wei, Mengqi; Li, Xiangxue; Li, Qiang SecureBiNN: 3-party secure computation for binarized neural network inference. (English) Zbl 1524.68307 Atluri, Vijayalakshmi (ed.) et al., Computer security – ESORICS 2022. 27th European symposium on research in computer security, Copenhagen, Denmark, September 26–30, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13556, 275-294 (2022). MSC: 68T05 68M25 68P27 68Q10 94A60 94A62 PDFBibTeX XMLCite \textit{W. Zhu} et al., Lect. Notes Comput. Sci. 13556, 275--294 (2022; Zbl 1524.68307) Full Text: DOI
Matt, Christian; Nielsen, Jesper Buus; Thomsen, Søren Eller Formalizing delayed adaptive corruptions and the security of flooding networks. (English) Zbl 1515.68087 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13508, 400-430 (2022). MSC: 68M25 68M10 68M12 68R10 94A60 PDFBibTeX XMLCite \textit{C. Matt} et al., Lect. Notes Comput. Sci. 13508, 400--430 (2022; Zbl 1515.68087) Full Text: DOI
Xue, Yingjie; Herlihy, Maurice Invited paper: Cross-chain state machine replication. (English) Zbl 1522.68072 Devismes, Stéphane (ed.) et al., Stabilization, safety, and security of distributed systems. 24th international symposium, SSS 2022, Clermont-Ferrand, France, November 15–17, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13751, 51-65 (2022). MSC: 68M14 68M12 68M15 68M25 PDFBibTeX XMLCite \textit{Y. Xue} and \textit{M. Herlihy}, Lect. Notes Comput. Sci. 13751, 51--65 (2022; Zbl 1522.68072) Full Text: DOI arXiv
Avarikioti, Zeta; Thyfronitis Litos, Orfeas Stefanos Suborn channels: incentives against timelock bribes. (English) Zbl 1515.91168 Eyal, Ittay (ed.) et al., Financial cryptography and data security. 26th international conference, FC 2022, Grenada, May 2–6, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13411, 488-511 (2022). MSC: 91G99 94A62 PDFBibTeX XMLCite \textit{Z. Avarikioti} and \textit{O. S. Thyfronitis Litos}, Lect. Notes Comput. Sci. 13411, 488--511 (2022; Zbl 1515.91168) Full Text: DOI
Sampaio de Alencar, Marcelo Cryptography and network security. (English) Zbl 1510.68003 River Publishers Series in Security and Digital Forensics. Gistrup: River Publishers; London: Routledge (ISBN 978-87-7022-407-9/hbk; 978-1-003-33776-8/ebook). xiii, 293 p. (2022). MSC: 68-01 68M10 68M11 68M12 68M25 68P30 94A60 PDFBibTeX XMLCite \textit{M. Sampaio de Alencar}, Cryptography and network security. Gistrup: River Publishers; London: Routledge (2022; Zbl 1510.68003) Full Text: DOI
Hillairet, Caroline; Lopez, Olivier; d’Oultremont, Louise; Spoorenberg, Brieuc Cyber-contagion model with network structure applied to insurance. (English) Zbl 1507.91182 Insur. Math. Econ. 107, 88-101 (2022). MSC: 91G05 92D30 68M25 PDFBibTeX XMLCite \textit{C. Hillairet} et al., Insur. Math. Econ. 107, 88--101 (2022; Zbl 1507.91182) Full Text: DOI
Huang, Yuke; Zeng, Cheng; Zhang, Hanxiong; Xue, Yumei Average trapping time of honeypots on weighted random fractal networks. (English) Zbl 07613755 Fractals 30, No. 7, Article ID 2250140, 9 p. (2022). MSC: 68-XX 60-XX PDFBibTeX XMLCite \textit{Y. Huang} et al., Fractals 30, No. 7, Article ID 2250140, 9 p. (2022; Zbl 07613755) Full Text: DOI
Kumar, A. Satish; Revathy, S. A hybrid soft computing with big data analytics based protection and recovery strategy for security enhancement in large scale real world online social networks. (English) Zbl 07570311 Theor. Comput. Sci. 927, 15-30 (2022). MSC: 68Qxx PDFBibTeX XMLCite \textit{A. S. Kumar} and \textit{S. Revathy}, Theor. Comput. Sci. 927, 15--30 (2022; Zbl 07570311) Full Text: DOI
Al-Tuwairqi, Salma M.; Bahashwan, Walaa S. The impact of quarantine strategies on malware dynamics in a network with heterogeneous immunity. (English) Zbl 1489.68044 Math. Model. Anal. 27, No. 2, 282-302 (2022). MSC: 68M25 34C60 34D20 34D23 68M10 PDFBibTeX XMLCite \textit{S. M. Al-Tuwairqi} and \textit{W. S. Bahashwan}, Math. Model. Anal. 27, No. 2, 282--302 (2022; Zbl 1489.68044) Full Text: DOI
He, Ye-Feng; Yue, Yu-Ru; Di, Man; Ma, Wen-Ping Two-party mutual authentication quantum key agreement protocol. (English) Zbl 1497.81042 Int. J. Theor. Phys. 61, No. 5, Paper No. 145, 9 p. (2022). MSC: 81P94 81P70 94A62 68M25 68M10 PDFBibTeX XMLCite \textit{Y.-F. He} et al., Int. J. Theor. Phys. 61, No. 5, Paper No. 145, 9 p. (2022; Zbl 1497.81042) Full Text: DOI
Bartz, Hannes; Holzbaur, Lukas; Liu, Hedongliang; Puchinger, Sven; Renner, Julian; Wachter-Zeh, Antonia Rank-metric codes and their applications. (English) Zbl 1490.94047 Found. Trends Commun. Inf. Theory 19, No. 3, 390-546 (2022). MSC: 94A60 94A15 68P25 68P05 94B35 PDFBibTeX XMLCite \textit{H. Bartz} et al., Found. Trends Commun. Inf. Theory 19, No. 3, 390--546 (2022; Zbl 1490.94047) Full Text: DOI arXiv
Yu, Lu; Lu, Yuliang; Shen, Yi; Zhao, Jun; Zhao, Jiazhen PBDiff: Neural network based program-wide diffing method for binaries. (English) Zbl 07513281 Math. Biosci. Eng. 19, No. 3, 2774-2799 (2022). MSC: 68-XX PDFBibTeX XMLCite \textit{L. Yu} et al., Math. Biosci. Eng. 19, No. 3, 2774--2799 (2022; Zbl 07513281) Full Text: DOI
Kong, Qingzhao; Zhang, Xiawei; Xu, Weihua; Long, Binghan A novel granular computing model based on three-way decision. (English) Zbl 07512026 Int. J. Approx. Reasoning 144, 92-112 (2022). MSC: 68T37 PDFBibTeX XMLCite \textit{Q. Kong} et al., Int. J. Approx. Reasoning 144, 92--112 (2022; Zbl 07512026) Full Text: DOI
Ding, Caichang; Chen, Yiqin; Algarni, Abdullah M.; Zhang, Guojun; Peng, Honghui Application of fractal neural network in network security situation awareness. (English) Zbl 07507574 Fractals 30, No. 2, Article ID 2240090, 13 p. (2022). MSC: 68-XX PDFBibTeX XMLCite \textit{C. Ding} et al., Fractals 30, No. 2, Article ID 2240090, 13 p. (2022; Zbl 07507574) Full Text: DOI
Alpern, Steve; Chleboun, Paul; Katsikas, Stamatios; Lin, Kyle Y. Adversarial patrolling in a uniform. (English) Zbl 1483.91006 Oper. Res. 70, No. 1, 129-140 (2022). MSC: 91A05 PDFBibTeX XMLCite \textit{S. Alpern} et al., Oper. Res. 70, No. 1, 129--140 (2022; Zbl 1483.91006) Full Text: DOI Link
Peterson, Larry L.; Davie, Bruce S. Computer networks. A systems approach. 6th edition. (English) Zbl 1473.68007 Amsterdam: Elsevier/Morgan Kaufmann (ISBN 978-0-12-818200-0/pbk; 978-0-12-818201-7/ebook). xxvi, 817 p. (2022). Reviewer: Józef Woźniak (Gdańsk) MSC: 68-01 68M10 68M11 68M12 68M25 PDFBibTeX XMLCite \textit{L. L. Peterson} and \textit{B. S. Davie}, Computer networks. A systems approach. 6th edition. Amsterdam: Elsevier/Morgan Kaufmann (2022; Zbl 1473.68007)
Zhang, Zhipeng; Shu, Shaolong; Xia, Chengyi Networked opacity for finite state machine with bounded communication delays. (English) Zbl 07769036 Inf. Sci. 572, 57-66 (2021). MSC: 93B70 93C83 93C43 93B03 PDFBibTeX XMLCite \textit{Z. Zhang} et al., Inf. Sci. 572, 57--66 (2021; Zbl 07769036) Full Text: DOI
Tokarev, Vyacheslav Leonidovich Hidden Markov models in the problem of detecting attacks on computer networks. (Russian. English summary) Zbl 1507.68062 Chebyshevskiĭ Sb. 22, No. 5(81), 391-399 (2021). MSC: 68M25 62M05 68M10 PDFBibTeX XMLCite \textit{V. L. Tokarev}, Chebyshevskiĭ Sb. 22, No. 5(81), 391--399 (2021; Zbl 1507.68062) Full Text: DOI MNR
Nehra, Divya; Mangat, Veenu; Kumar, Krishan A deep learning approach for network intrusion detection using non-symmetric auto-encoder. (English) Zbl 07616687 Singh, Brahmjit (ed.) et al., Intelligent computing and communication systems. Singapore: Springer. Algorithms Intell. Syst., 371-382 (2021). MSC: 68Txx PDFBibTeX XMLCite \textit{D. Nehra} et al., in: Intelligent computing and communication systems. Singapore: Springer. 371--382 (2021; Zbl 07616687) Full Text: DOI
Delgado-Lozano, Ignacio M.; Martínez-Rodríguez, Macarena C.; Bakas, Alexandros; Brumley, Billy Bob; Michalas, Antonis Attestation waves: platform trust via remote power analysis. (English) Zbl 1498.68052 Conti, Mauro (ed.) et al., Cryptology and network security. 20th international conference, CANS 2021, Vienna, Austria, December 13–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13099, 460-482 (2021). MSC: 68M25 68M12 94A62 PDFBibTeX XMLCite \textit{I. M. Delgado-Lozano} et al., Lect. Notes Comput. Sci. 13099, 460--482 (2021; Zbl 1498.68052) Full Text: DOI arXiv
Mizrahi, Ayelet; Zohar, Aviv Congestion attacks in payment channel networks. (English) Zbl 1493.91155 Borisov, Nikita (ed.) et al., Financial cryptography and data security. 25th international conference, FC 2021, virtual event, March 1–5, 2021. Revised selected papers. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 12675, 170-188 (2021). MSC: 91G99 94A60 PDFBibTeX XMLCite \textit{A. Mizrahi} and \textit{A. Zohar}, Lect. Notes Comput. Sci. 12675, 170--188 (2021; Zbl 1493.91155) Full Text: DOI arXiv
Mirzaei, Arash; Sakzad, Amin; Yu, Jiangshan; Steinfeld, Ron FPPW: a fair and privacy preserving watchtower for bitcoin. (English) Zbl 1493.91154 Borisov, Nikita (ed.) et al., Financial cryptography and data security. 25th international conference, FC 2021, virtual event, March 1–5, 2021. Revised selected papers. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 12675, 151-169 (2021). MSC: 91G99 94A60 PDFBibTeX XMLCite \textit{A. Mirzaei} et al., Lect. Notes Comput. Sci. 12675, 151--169 (2021; Zbl 1493.91154) Full Text: DOI
Ferreira, Loïc Sigforgery: breaking and fixing data authenticity in Sigfox. (English) Zbl 07543960 Borisov, Nikita (ed.) et al., Financial cryptography and data security. 25th international conference, FC 2021, virtual event, March 1–5, 2021. Revised selected papers. Part I. Berlin: Springer. Lect. Notes Comput. Sci. 12674, 331-350 (2021). MSC: 68P25 68M12 94A60 PDFBibTeX XMLCite \textit{L. Ferreira}, Lect. Notes Comput. Sci. 12674, 331--350 (2021; Zbl 07543960) Full Text: DOI
Sarabi, Armin; Jin, Kun; Liu, Mingyan Smart Internet probing: scanning using adaptive machine learning. (English) Zbl 07526415 Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 411-437 (2021). MSC: 68M25 68T05 91A80 PDFBibTeX XMLCite \textit{A. Sarabi} et al., in: Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley \& Sons. 411--437 (2021; Zbl 07526415) Full Text: DOI
Zolbayar, Bolor-Erdene; Sheatsley, Ryan; Mcdaniel, Patrick; Weisman, Mike Evading machine learning based network intrusion detection systems with GANs. (English) Zbl 07526411 Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 335-356 (2021). MSC: 68M25 68T05 91A80 PDFBibTeX XMLCite \textit{B.-E. Zolbayar} et al., in: Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley \& Sons. 335--356 (2021; Zbl 07526411) Full Text: DOI
Sagduyu, Yalin E.; Erpek, Tugba; Shi, Yi Adversarial machine learning for 5G communications security. (English) Zbl 07526408 Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 270-288 (2021). MSC: 68M25 68T05 91A80 PDFBibTeX XMLCite \textit{Y. E. Sagduyu} et al., in: Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley \& Sons. 270--288 (2021; Zbl 07526408) Full Text: DOI arXiv
Basak, Anjon; Kamhoua, Charles A.; Venkatesan, Sridhar; Gutierrez, Marcus; Anwar, Ahmed H.; Kiekintveld, Christopher D. Scalable algorithms for identifying stealthy attackers in a game-theoretic framework using deception. (English) Zbl 07526397 Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 47-61 (2021). MSC: 68M25 68T05 91A80 PDFBibTeX XMLCite \textit{A. Basak} et al., in: Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley \& Sons. 47--61 (2021; Zbl 07526397) Full Text: DOI
Dukuza, Kenneth Bifurcation analysis of a computer virus propagation model. (English) Zbl 1513.68003 Hacet. J. Math. Stat. 50, No. 5, 1384-1400 (2021). MSC: 68M10 34C23 34C60 65L05 68M25 PDFBibTeX XMLCite \textit{K. Dukuza}, Hacet. J. Math. Stat. 50, No. 5, 1384--1400 (2021; Zbl 1513.68003) Full Text: DOI
Ishai, Yuval; Khurana, Dakshita; Sahai, Amit; Srinivasan, Akshayaram On the round complexity of black-box secure MPC. (English) Zbl 1486.94111 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 214-243 (2021). MSC: 94A60 68M12 68M14 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 12826, 214--243 (2021; Zbl 1486.94111) Full Text: DOI
Kadian, Karuna; Garhwal, Sunita; Kumar, Ajay Quantum walk and its application domains: a systematic review. (English) Zbl 1486.68076 Comput. Sci. Rev. 41, Article ID 100419, 52 p. (2021). MSC: 68Q12 81P68 68-02 81-02 PDFBibTeX XMLCite \textit{K. Kadian} et al., Comput. Sci. Rev. 41, Article ID 100419, 52 p. (2021; Zbl 1486.68076) Full Text: DOI
Yadav, Rakesh Kumar; Mahapatra, R. P. Energy aware optimized clustering for hierarchical routing in wireless sensor network. (English) Zbl 1486.68021 Comput. Sci. Rev. 41, Article ID 100417, 10 p. (2021). MSC: 68M18 90C59 68-02 PDFBibTeX XMLCite \textit{R. K. Yadav} and \textit{R. P. Mahapatra}, Comput. Sci. Rev. 41, Article ID 100417, 10 p. (2021; Zbl 1486.68021) Full Text: DOI
Kumar, Anand; Singh, Karan; Khan, Tayyab L-RTAM: logarithm based reliable trust assessment model for WBSNs. (English) Zbl 1515.68084 J. Discrete Math. Sci. Cryptography 24, No. 6, 1701-1716 (2021). MSC: 68M18 68M25 PDFBibTeX XMLCite \textit{A. Kumar} et al., J. Discrete Math. Sci. Cryptography 24, No. 6, 1701--1716 (2021; Zbl 1515.68084) Full Text: DOI
Awasthi, Shashank; Kumar, Naresh; Srivastava, Pramod Kumar An epidemic model to analyze the dynamics of malware propagation in rechargeable wireless sensor network. (English) Zbl 1515.68082 J. Discrete Math. Sci. Cryptography 24, No. 5, 1529-1543 (2021). MSC: 68M18 68M25 PDFBibTeX XMLCite \textit{S. Awasthi} et al., J. Discrete Math. Sci. Cryptography 24, No. 5, 1529--1543 (2021; Zbl 1515.68082) Full Text: DOI
Abouaroek, Musaeed; Ahmad, Khaleel Performance analysis of NTRU algorithm with non-post-quantum algorithms. (English) Zbl 1483.94028 J. Discrete Math. Sci. Cryptography 24, No. 5, 1349-1363 (2021). MSC: 94A60 81P94 68M10 68M25 PDFBibTeX XMLCite \textit{M. Abouaroek} and \textit{K. Ahmad}, J. Discrete Math. Sci. Cryptography 24, No. 5, 1349--1363 (2021; Zbl 1483.94028) Full Text: DOI
Lian, Zhijie; Deng, Chao Distributed security secondary control for cyber-physical microgrids systems under network DoS attacks. (English) Zbl 1483.93233 Int. J. Syst. Sci., Princ. Appl. Syst. Integr. 52, No. 6, 1237-1250 (2021). MSC: 93B70 93C83 93A15 68M25 PDFBibTeX XMLCite \textit{Z. Lian} and \textit{C. Deng}, Int. J. Syst. Sci., Princ. Appl. Syst. Integr. 52, No. 6, 1237--1250 (2021; Zbl 1483.93233) Full Text: DOI
Hu, Jun; Zhang, Hongxu; Liu, Hongjian; Yu, Xiaoyang A survey on sliding mode control for networked control systems. (English) Zbl 1483.93059 Int. J. Syst. Sci., Princ. Appl. Syst. Integr. 52, No. 6, 1129-1147 (2021). MSC: 93B12 93B70 93-02 PDFBibTeX XMLCite \textit{J. Hu} et al., Int. J. Syst. Sci., Princ. Appl. Syst. Integr. 52, No. 6, 1129--1147 (2021; Zbl 1483.93059) Full Text: DOI
Lochran, Stevie GNOME: A dynamic dispatch and investment optimisation model of the European natural gas network and its suppliers. (English) Zbl 1480.90084 SN Oper. Res. Forum 2, No. 4, Paper No. 67, 44 p. (2021). MSC: 90B10 90C11 90C05 PDFBibTeX XMLCite \textit{S. Lochran}, SN Oper. Res. Forum 2, No. 4, Paper No. 67, 44 p. (2021; Zbl 1480.90084) Full Text: DOI
Piqueira, José Roberto C.; Cabrera, Manuel A. M.; Batistela, Cristiane M. Malware propagation in clustered computer networks. (English) Zbl 1527.68018 Physica A 573, Article ID 125958, 15 p. (2021). MSC: 68M10 34C60 34D20 68M25 PDFBibTeX XMLCite \textit{J. R. C. Piqueira} et al., Physica A 573, Article ID 125958, 15 p. (2021; Zbl 1527.68018) Full Text: DOI
Jin, Xiaozheng; Lü, Shaoyu; Deng, Chao; Chadli, Mohammed Distributed adaptive security consensus control for a class of multi-agent systems under network decay and intermittent attacks. (English) Zbl 1478.93629 Inf. Sci. 547, 88-102 (2021). MSC: 93D50 93C40 93A16 93B70 93C43 PDFBibTeX XMLCite \textit{X. Jin} et al., Inf. Sci. 547, 88--102 (2021; Zbl 1478.93629) Full Text: DOI
Fang, Wentuo; Zamani, Mohsen; Chen, Zhiyong Secure and privacy preserving consensus for second-order systems based on Paillier encryption. (English) Zbl 1478.93623 Syst. Control Lett. 148, Article ID 104869, 11 p. (2021). MSC: 93D50 93A16 93B70 94A60 PDFBibTeX XMLCite \textit{W. Fang} et al., Syst. Control Lett. 148, Article ID 104869, 11 p. (2021; Zbl 1478.93623) Full Text: DOI arXiv
Wang, Zhen; Li, Chaofan; Jin, Xing; Ding, Hong; Cui, Guanghai; Yu, Lanping Evolutionary dynamics of the interdependent security games on complex network. (English) Zbl 1508.91068 Appl. Math. Comput. 399, Article ID 126051, 12 p. (2021). MSC: 91A22 05C82 94A62 PDFBibTeX XMLCite \textit{Z. Wang} et al., Appl. Math. Comput. 399, Article ID 126051, 12 p. (2021; Zbl 1508.91068) Full Text: DOI
González-Burgueño, Antonio; Ölveczky, Peter Csaba Formalizing and analyzing security ceremonies with heterogeneous devices in ANP and PDL. (English) Zbl 1528.68049 J. Log. Algebr. Methods Program. 122, Article ID 100685, 27 p. (2021). MSC: 68M25 03B70 94A62 PDFBibTeX XMLCite \textit{A. González-Burgueño} and \textit{P. C. Ölveczky}, J. Log. Algebr. Methods Program. 122, Article ID 100685, 27 p. (2021; Zbl 1528.68049) Full Text: DOI
Chen, Shan; Jero, Samuel; Jagielski, Matthew; Boldyreva, Alexandra; Nita-Rotaru, Cristina Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC. (English) Zbl 1469.94090 J. Cryptology 34, No. 3, Paper No. 26, 41 p. (2021). MSC: 94A60 94A62 68M11 PDFBibTeX XMLCite \textit{S. Chen} et al., J. Cryptology 34, No. 3, Paper No. 26, 41 p. (2021; Zbl 1469.94090) Full Text: DOI
Cao, Hui; Wang, Si; Yan, Dongxue; Tan, Hongwu; Xu, Hemiao The dynamical analysis of computer viruses model with age structure and delay. (English) Zbl 1465.68032 Discrete Dyn. Nat. Soc. 2021, Article ID 5538438, 13 p. (2021). MSC: 68M25 68M10 68M11 PDFBibTeX XMLCite \textit{H. Cao} et al., Discrete Dyn. Nat. Soc. 2021, Article ID 5538438, 13 p. (2021; Zbl 1465.68032) Full Text: DOI
Tikani, Hamid; Setak, Mostafa; Demir, Emrah A risk-constrained time-dependent cash-in-transit routing problem in multigraph under uncertainty. (English) Zbl 1487.90175 Eur. J. Oper. Res. 293, No. 2, 703-730 (2021). MSC: 90B06 90C35 PDFBibTeX XMLCite \textit{H. Tikani} et al., Eur. J. Oper. Res. 293, No. 2, 703--730 (2021; Zbl 1487.90175) Full Text: DOI
Hu, Rui; Gao, Qingwu; Wang, Bairong Dynamics and control of worm epidemic based on mobile networks by SEIQR-type model with saturated incidence rate. (English) Zbl 1465.68033 Discrete Dyn. Nat. Soc. 2021, Article ID 6637263, 22 p. (2021). MSC: 68M25 68M10 68M11 PDFBibTeX XMLCite \textit{R. Hu} et al., Discrete Dyn. Nat. Soc. 2021, Article ID 6637263, 22 p. (2021; Zbl 1465.68033) Full Text: DOI
Magagula, Vusi Mpendulo; Mungwe, S’yanda Nkanyiso Stability analysis of a virulent code in a network of computers. (English) Zbl 1524.68016 Math. Comput. Simul. 182, 296-315 (2021). MSC: 68M10 34C60 34D20 68M25 PDFBibTeX XMLCite \textit{V. M. Magagula} and \textit{S. N. Mungwe}, Math. Comput. Simul. 182, 296--315 (2021; Zbl 1524.68016) Full Text: DOI
Moreno Chuquen, Ricardo; Chamorro, Harold R. Graph theory applications to deregulated power systems. (English) Zbl 1465.93005 SpringerBriefs in Electrical and Computer Engineering. Cham: Springer (ISBN 978-3-030-57588-5/pbk; 978-3-030-57589-2). ix, 58 p. (2021). Reviewer: Anatoly Martynyuk (Kyïv) MSC: 93-02 93B70 93A15 93C83 05C90 PDFBibTeX XMLCite \textit{R. Moreno Chuquen} and \textit{H. R. Chamorro}, Graph theory applications to deregulated power systems. Cham: Springer (2021; Zbl 1465.93005) Full Text: DOI
Hajdu, László; Bóta, András; Krész, Miklós; Khani, Alireza; Gardner, Lauren M. Discovering the hidden community structure of public transportation networks. (English) Zbl 07817167 Netw. Spat. Econ. 20, No. 1, 209-231 (2020). MSC: 91Bxx PDFBibTeX XMLCite \textit{L. Hajdu} et al., Netw. Spat. Econ. 20, No. 1, 209--231 (2020; Zbl 07817167) Full Text: DOI arXiv
Albin, Nathan; Kottegoda, Kapila; Poggi-Corradini, Pietro Spanning tree modulus for secure broadcast games. (English) Zbl 07769689 Networks 76, No. 3, 350-365 (2020). MSC: 91-XX PDFBibTeX XMLCite \textit{N. Albin} et al., Networks 76, No. 3, 350--365 (2020; Zbl 07769689) Full Text: DOI arXiv
Liu, Yu; Qin, Zheng; Liao, Xiaofeng; Wu, Jiahui Cryptanalysis and enhancement of an image encryption scheme based on a 1-D coupled sine map. (English) Zbl 1516.94042 Nonlinear Dyn. 100, No. 3, 2917-2931 (2020). MSC: 94A60 94A08 68P25 37D45 PDFBibTeX XMLCite \textit{Y. Liu} et al., Nonlinear Dyn. 100, No. 3, 2917--2931 (2020; Zbl 1516.94042) Full Text: DOI
Rubio, Juan E.; Alcaraz, Cristina; Rios, Ruben; Roman, Rodrigo; Lopez, Javier Distributed detection of APTs: consensus vs. clustering. (English) Zbl 1511.68048 Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12308, 174-192 (2020). MSC: 68M25 68M10 91D30 PDFBibTeX XMLCite \textit{J. E. Rubio} et al., Lect. Notes Comput. Sci. 12308, 174--192 (2020; Zbl 1511.68048) Full Text: DOI
Ning, Jianting; Huang, Xinyi; Poh, Geong Sen; Xu, Shengmin; Loh, Jia-Chng; Weng, Jian; Deng, Robert H. Pine: enabling privacy-preserving deep packet inspection on TLS with rule-hiding and fast connection establishment. (English) Zbl 1524.68044 Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12308, 3-22 (2020). MSC: 68M25 68M10 68M12 68P25 68P27 PDFBibTeX XMLCite \textit{J. Ning} et al., Lect. Notes Comput. Sci. 12308, 3--22 (2020; Zbl 1524.68044) Full Text: DOI
Chase, Melissa; Miao, Peihan Private set intersection in the internet setting from lightweight oblivious PRF. (English) Zbl 1504.94118 Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12172, 34-63 (2020). MSC: 94A60 68M25 68M12 PDFBibTeX XMLCite \textit{M. Chase} and \textit{P. Miao}, Lect. Notes Comput. Sci. 12172, 34--63 (2020; Zbl 1504.94118) Full Text: DOI
Khosravi, Samiyeh Proposing a novel method for increasing security in the network communication. (English) Zbl 1524.81033 Int. J. Nonlinear Anal. Appl. 11, No. 2, 199-208 (2020). MSC: 81P94 94A62 PDFBibTeX XMLCite \textit{S. Khosravi}, Int. J. Nonlinear Anal. Appl. 11, No. 2, 199--208 (2020; Zbl 1524.81033) Full Text: DOI
Paquin, Christian; Stebila, Douglas; Tamvada, Goutam Benchmarking post-quantum cryptography in TLS. (English) Zbl 1513.81034 Ding, Jinta (ed.) et al., Post-quantum cryptography. 11th international conference, PQCrypto 2020, Paris, France, April 15–17, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12100, 72-91 (2020). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{C. Paquin} et al., Lect. Notes Comput. Sci. 12100, 72--91 (2020; Zbl 1513.81034) Full Text: DOI
Canetti, Ran Universally composable security. (English) Zbl 1491.68036 J. ACM 67, No. 5, Article No. 28, 94 p. (2020). MSC: 68M25 68M12 94A60 PDFBibTeX XMLCite \textit{R. Canetti}, J. ACM 67, No. 5, Article No. 28, 94 p. (2020; Zbl 1491.68036) Full Text: DOI
Grusho, Alexander; Grusho, Nick; Zabezhailo, Michael; Timonina, Elena Generation of metadata for network control. (English) Zbl 1490.68038 Vishnevskiy, Vladimir M. (ed.) et al., Distributed computer and communication networks. 23rd international conference, DCCN 2020, Moscow, Russia, September 14–18, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12563, 723-735 (2020). MSC: 68M10 68M25 68R10 PDFBibTeX XMLCite \textit{A. Grusho} et al., Lect. Notes Comput. Sci. 12563, 723--735 (2020; Zbl 1490.68038) Full Text: DOI
Liu-Zhang, Chen-Da; Maurer, Ueli Synchronous constructive cryptography. (English) Zbl 1485.94108 Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12551, 439-472 (2020). MSC: 94A60 68P25 68M14 68M12 PDFBibTeX XMLCite \textit{C.-D. Liu-Zhang} and \textit{U. Maurer}, Lect. Notes Comput. Sci. 12551, 439--472 (2020; Zbl 1485.94108) Full Text: DOI
Akl, Selim G. From parallelism to nonuniversality: an unconventional trajectory. (English) Zbl 1486.68006 Adamatzky, Andrew (ed.) et al., From astrophysics to unconventional computation. Essays presented to Susan Stepney on the occasion of her 60th birthday. Cham: Springer. Emerg. Complex. Comput. 35, 123-156 (2020). MSC: 68-03 01A70 68Q07 68Q09 PDFBibTeX XMLCite \textit{S. G. Akl}, Emerg. Complex. Comput. 35, 123--156 (2020; Zbl 1486.68006) Full Text: DOI
Kumari, Arpana; Kapoor, Vivek Competing secure text encryption in intranet using elliptic curve cryptography. (English) Zbl 1483.94046 J. Discrete Math. Sci. Cryptography 23, No. 2, 631-641 (2020). MSC: 94A60 14G50 11T71 68M10 PDFBibTeX XMLCite \textit{A. Kumari} and \textit{V. Kapoor}, J. Discrete Math. Sci. Cryptography 23, No. 2, 631--641 (2020; Zbl 1483.94046) Full Text: DOI
Choudhary, Vishal; Taruna, Sunil The highly secure polynomial pool-based key pre-distribution scheme for wireless sensor network. (English) Zbl 1482.94046 J. Discrete Math. Sci. Cryptography 23, No. 1, 95-114 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{V. Choudhary} and \textit{S. Taruna}, J. Discrete Math. Sci. Cryptography 23, No. 1, 95--114 (2020; Zbl 1482.94046) Full Text: DOI
Achkoun, Khadija; Hanin, Charifa; Omary, Fouzia SPF-CA: a new cellular automata based block cipher using key-dependent S-boxes. (English) Zbl 1508.68094 J. Discrete Math. Sci. Cryptography 23, No. 8, 1529-1544 (2020). MSC: 68P25 68Q80 94A60 PDFBibTeX XMLCite \textit{K. Achkoun} et al., J. Discrete Math. Sci. Cryptography 23, No. 8, 1529--1544 (2020; Zbl 1508.68094) Full Text: DOI
Anwar, Ahmed H.; Kamhoua, Charles Game theory on attack graph for cyber deception. (English) Zbl 1484.91030 Zhu, Quanyan (ed.) et al., Decision and game theory for security. 11th international conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12513, 445-456 (2020). MSC: 91A15 91A10 91A43 PDFBibTeX XMLCite \textit{A. H. Anwar} and \textit{C. Kamhoua}, Lect. Notes Comput. Sci. 12513, 445--456 (2020; Zbl 1484.91030) Full Text: DOI
Tsemogne, Olivier; Hayel, Yezekael; Kamhoua, Charles; Deugoue, Gabriel Partially observable stochastic games for cyber deception against network epidemic. (English) Zbl 1483.68051 Zhu, Quanyan (ed.) et al., Decision and game theory for security. 11th international conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12513, 312-325 (2020). MSC: 68M25 68M10 68T20 91A15 91A80 PDFBibTeX XMLCite \textit{O. Tsemogne} et al., Lect. Notes Comput. Sci. 12513, 312--325 (2020; Zbl 1483.68051) Full Text: DOI
Anwar, Ahmed H.; Leslie, Nandi O.; Kamhoua, Charles; Kiekintveld, Christopher A game theoretic framework for software diversity for network security. (English) Zbl 1483.68042 Zhu, Quanyan (ed.) et al., Decision and game theory for security. 11th international conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12513, 297-311 (2020). MSC: 68M25 68M10 91A80 PDFBibTeX XMLCite \textit{A. H. Anwar} et al., Lect. Notes Comput. Sci. 12513, 297--311 (2020; Zbl 1483.68042) Full Text: DOI
Zhang, Silun; Timoudas, Thomas Ohlson; Dahleh, Munther A. Consensus with preserved privacy against neighbor collusion. (English) Zbl 1474.93208 Control Theory Technol. 18, No. 4, 409-418 (2020). MSC: 93D50 68P27 93B70 PDFBibTeX XMLCite \textit{S. Zhang} et al., Control Theory Technol. 18, No. 4, 409--418 (2020; Zbl 1474.93208) Full Text: DOI arXiv Link
De Witte, Bram; Frasca, Paolo; Overvest, Bastiaan; Timmer, Judith Protecting shared information in networks: a network security game with strategic attacks. (English) Zbl 1466.93068 Int. J. Robust Nonlinear Control 30, No. 11, 4255-4277 (2020). MSC: 93B70 91A10 91A80 91A43 PDFBibTeX XMLCite \textit{B. De Witte} et al., Int. J. Robust Nonlinear Control 30, No. 11, 4255--4277 (2020; Zbl 1466.93068) Full Text: DOI arXiv
Alekseev, E. K.; Smyshlyaev, S. V. On security of the SESPAKE protocol. (Russian. English summary) Zbl 1462.94052 Prikl. Diskretn. Mat. 2020, No. 50, 5-41 (2020). MSC: 94A62 94A60 68M12 PDFBibTeX XMLCite \textit{E. K. Alekseev} and \textit{S. V. Smyshlyaev}, Prikl. Diskretn. Mat. 2020, No. 50, 5--41 (2020; Zbl 1462.94052) Full Text: MNR
Gong, Linming; Li, Shundong; Shao, Lianhe; Xue, Tao; Wang, Daoshun Protocols for secure test on relationship on number axis. (Chinese. English summary) Zbl 1474.68037 J. Softw. 31, No. 12, 3950-3967 (2020). MSC: 68M25 68M12 68M14 68P27 PDFBibTeX XMLCite \textit{L. Gong} et al., J. Softw. 31, No. 12, 3950--3967 (2020; Zbl 1474.68037) Full Text: DOI
Jie, Xinchun; Fei, Minrui; Du, Dajun Replay attack measurement of networked control system based on digital watermark. (Chinese. English summary) Zbl 1488.93082 Control Theory Appl. 37, No. 9, 2047-2053 (2020). MSC: 93B70 93C62 94C12 PDFBibTeX XMLCite \textit{X. Jie} et al., Control Theory Appl. 37, No. 9, 2047--2053 (2020; Zbl 1488.93082)
Dou, Wanchun; Tang, Wenda; Wu, Xiaotong; Qi, Lianyong; Xu, Xiaolong; Zhang, Xuyun; Hu, Chunhua An insurance theory based optimal cyber-insurance contract against moral hazard. (English) Zbl 1460.91219 Inf. Sci. 527, 576-589 (2020). MSC: 91G05 68M25 PDFBibTeX XMLCite \textit{W. Dou} et al., Inf. Sci. 527, 576--589 (2020; Zbl 1460.91219) Full Text: DOI
Ahmad, Muhammad; Ali, Sarwan; Tariq, Juvaria; Khan, Imdadullah; Shabbir, Mudassir; Zaman, Arif Combinatorial trace method for network immunization. (English) Zbl 1457.68198 Inf. Sci. 519, 215-228 (2020). MSC: 68R10 68M25 68W25 PDFBibTeX XMLCite \textit{M. Ahmad} et al., Inf. Sci. 519, 215--228 (2020; Zbl 1457.68198) Full Text: DOI arXiv
Yao, Yanqing; Li, Zhoujun; Guo, Hua A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes. (English) Zbl 1457.68034 Inf. Sci. 516, 505-514 (2020). MSC: 68M25 94A62 PDFBibTeX XMLCite \textit{Y. Yao} et al., Inf. Sci. 516, 505--514 (2020; Zbl 1457.68034) Full Text: DOI
Avarikioti, Zeta; Thyfronitis Litos, Orfeas Stefanos; Wattenhofer, Roger Cerberus channels: incentivizing watchtowers for Bitcoin. (English) Zbl 1459.94092 Bonneau, Joseph (ed.) et al., Financial cryptography and data security. 24th international conference, FC 2020 , Kota Kinabalu, Malaysia, February 10–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12059, 346-366 (2020). MSC: 94A60 91B64 91G20 PDFBibTeX XMLCite \textit{Z. Avarikioti} et al., Lect. Notes Comput. Sci. 12059, 346--366 (2020; Zbl 1459.94092) Full Text: DOI
Pérez-Solà, Cristina; Ranchal-Pedrosa, Alejandro; Herrera-Joancomartí, Jordi; Navarro-Arribas, Guillermo; Garcia-Alfaro, Joaquin LockDown: balance availability attack against lightning network channels. (English) Zbl 1459.94139 Bonneau, Joseph (ed.) et al., Financial cryptography and data security. 24th international conference, FC 2020 , Kota Kinabalu, Malaysia, February 10–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12059, 245-263 (2020). MSC: 94A60 91B64 91G20 PDFBibTeX XMLCite \textit{C. Pérez-Solà} et al., Lect. Notes Comput. Sci. 12059, 245--263 (2020; Zbl 1459.94139) Full Text: DOI
Cohn-Gordon, Katriel; Cremers, Cas; Dowling, Benjamin; Garratt, Luke; Stebila, Douglas A formal security analysis of the Signal messaging protocol. (English) Zbl 1453.94133 J. Cryptology 33, No. 4, 1914-1983 (2020). MSC: 94A62 68M12 PDFBibTeX XMLCite \textit{K. Cohn-Gordon} et al., J. Cryptology 33, No. 4, 1914--1983 (2020; Zbl 1453.94133) Full Text: DOI
Sanna Passino, Francesco; Heard, Nicholas A. Classification of periodic arrivals in event time data for filtering computer network traffic. (English) Zbl 1452.62465 Stat. Comput. 30, No. 5, 1241-1254 (2020). MSC: 62H30 62M10 62M20 62P30 PDFBibTeX XMLCite \textit{F. Sanna Passino} and \textit{N. A. Heard}, Stat. Comput. 30, No. 5, 1241--1254 (2020; Zbl 1452.62465) Full Text: DOI
Seres, István András; Gulyás, László; Nagy, Dániel A.; Burcsi, Péter Topological analysis of Bitcoin’s lightning network. (English) Zbl 07215912 Pardalos, Panos (ed.) et al., Mathematical research for blockchain economy. Proceedings of the 1st international conference on mathematical research for blockchain economy, MARBLE 2019, Santorini, Greece, May 6–9, 2019. Cham: Springer. Springer Proc. Bus. Econ., 1-12 (2020). MSC: 68P25 94A60 91B64 PDFBibTeX XMLCite \textit{I. A. Seres} et al., in: Mathematical research for blockchain economy. Proceedings of the 1st international conference on mathematical research for blockchain economy, MARBLE 2019, Santorini, Greece, May 6--9, 2019. Cham: Springer. 1--12 (2020; Zbl 07215912) Full Text: DOI arXiv
Applebaum, Benny; Holenstein, Thomas; Mishra, Manoj; Shayevitz, Ofer The communication complexity of private simultaneous messages, revisited. (English) Zbl 1457.94003 J. Cryptology 33, No. 3, 917-953 (2020). MSC: 94A05 94A15 94A60 94A62 68M12 68P25 PDFBibTeX XMLCite \textit{B. Applebaum} et al., J. Cryptology 33, No. 3, 917--953 (2020; Zbl 1457.94003) Full Text: DOI