King's College London

Research portal

IEEE Transactions on Information Forensics and Security, 1556-6013

Journal

  1. GLYPH: Efficient ML-based Detection of Heap Spraying Attacks

    Pierazzi, F., Cristalli, S., Bruschi, D., Colajanni, M., Marchetti, M. & Lanzi, A., 5 Aug 2020, (Accepted/In press) In: IEEE Transactions on Information Forensics and Security.

    Research output: Contribution to journalArticlepeer-review

  2. Private and Secure Distributed Matrix Multiplication with Flexible Communication Load

    Aliasgari, M., Simeone, O. & Kliewer, J., 6 Feb 2020, In: IEEE Transactions on Information Forensics and Security. 15, p. 2722-2734 13 p., 8985291.

    Research output: Contribution to journalArticlepeer-review

  3. Automatically Dismantling Online Dating Fraud

    Suarez-Tangil, G., Edwards, M., Peersman, C., Stringhini, G., Rashid, A. & Whitty, M., 2020, In: IEEE Transactions on Information Forensics and Security. 15, p. 1128-1137 10 p., 8768406.

    Research output: Contribution to journalArticlepeer-review

  4. On the Dissection of Evasive Malware

    Cono D'Elia, D., Coppa, E., Palmaro, F. & Cavallaro, L., 2020, In: IEEE Transactions on Information Forensics and Security. 15, p. 2750-2765 16 p., 9018111.

    Research output: Contribution to journalArticlepeer-review

  5. Energy-Constrained SWIPT Networks: Enhancing Physical Layer Security With FD Self-Jamming

    Tang, X., Cai, Y., Deng, Y., Huang, Y., Yang, W. & Yang, W., Jan 2019, In: IEEE Transactions on Information Forensics and Security. 14, 1, p. 212-222 11 p.

    Research output: Contribution to journalArticlepeer-review

  6. A Probabilistic Logic of Cyber Deception

    Jajodia, S., Park, N., Pierazzi, F., Pugliese, A., Serra, E., Simari, G. & Subrahmanian, V. S., 1 Nov 2017, In: IEEE Transactions on Information Forensics and Security. 12, 11, p. 2532-2544 13 p., 7937934.

    Research output: Contribution to journalArticlepeer-review

  7. Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity

    Dong, C. & Loukidis, G., Nov 2017, In: IEEE Transactions on Information Forensics and Security. 12, 11, p. 2792-2806

    Research output: Contribution to journalArticlepeer-review

  8. Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting

    Li, L., Li, D., Bissyande, T. F., Klein, J., Le Traon, Y., Lo, D. & Cavallaro, L., 1 Jun 2017, In: IEEE Transactions on Information Forensics and Security. 12, 6, p. 1269-1284 16 p.

    Research output: Contribution to journalArticlepeer-review

  9. Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach

    Deng, Y., Wang, L., Elkashlan, M., Nallanathan, A. & Mallik, R., Jun 2016, In: IEEE Transactions on Information Forensics and Security. 11, 6, p. 1128 - 1138

    Research output: Contribution to journalArticlepeer-review

View graph of relations

© 2020 King's College London | Strand | London WC2R 2LS | England | United Kingdom | Tel +44 (0)20 7836 5454