default search action
DSC 2022: Edinburgh, UK
- IEEE Conference on Dependable and Secure Computing, DSC 2022, Edinburgh, UK, June 22-24, 2022. IEEE 2022, ISBN 978-1-6654-2141-6
- Robert L. Freas, Heather F. Adair, Eman M. Hammad:
An Engineering Process Framework for Cybersecurity Incident Response Assessment. 1-8 - Wei-Loon Mow, Shih-Kun Huang, Hsu-Chun Hsiao:
LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR. 1-8 - Heba Takruri Tamemi, Manar Rabayah, Kareem Abu Raad, Mai Kanaan, Ahmed Awad:
A Low Cost Blockchain-Based Framework for Preserving Critical Data in Health-Care IoT Systems Using Classification. 1-8 - Jason Dejesus, John A. Chandy:
Cache Locking and Encryption to Prevent Memory Snooping in Embedded Systems. 1-8 - Sharifah Roziah Binti Mohd Kassim, Solahuddin Bin Shamsuddin, Shujun Li, Budi Arief:
How National CSIRTs Operate: Personal Observations and Opinions from MyCERT. 1-2 - Upendra Bartwal, Subhasis Mukhopadhyay, Rohit Negi, Sandeep K. Shukla:
Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots. 1-8 - Rishi Rabheru, Hazim Hanif, Sergio Maffeis:
A Hybrid Graph Neural Network Approach for Detecting PHP Vulnerabilities. 1-9 - Alexander Köberl, Holger Bock, Christian Steger:
A Novel Approach for Providing Client-Verifiable and Efficient Access to Private Smart Contracts. 1-8 - Shao-Fu Chen, Yu-Sung Wu:
Linux Kernel Module Development with Rust. 1-2 - Awais Aziz Shah, Ahsan Adeel, Jawad Ahmad, Ahmed Yassin Al-Dubai, Mandar Gogate, Abhijeet Bishnu, Muhammad Diyan, Tassadaq Hussain, Kia Dashtipour, Tharm Ratnarajah, Amir Hussain:
A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids. 1-6 - Qiang Wen, Fumio Machida:
Reliability Models and Analysis for Triple-model with Triple-input Machine Learning Systems. 1-8 - Changgang Zheng, Chen Zhen, Haiyong Xie, Shufan Yang:
Towards Secure Multi-Agent Deep Reinforcement Learning: Adversarial Attacks and Countermeasures. 1-8 - Emma Scott, Sakshyam Panda, George Loukas, Emmanouil Panaousis:
Optimising user security recommendations for AI-powered smart-homes. 1-8 - Spencer Vecile, Kyle Lacroix, Katarina Grolinger, Jagath Samarabandu:
Malicious and Benign URL Dataset Generation Using Character-Level LSTM Models. 1-8 - Sudhir Kumar Rai, Ashish Mittal, Sparsh Mittal:
A Node-Embedding Features Based Machine Learning Technique for Dynamic Malware Detection. 1-8 - Nanjiang Xie, Zheng Gong, Yufeng Tang, Lei Wang, Yamin Wen:
Protecting White-Box Block Ciphers with Galois/Counter Mode. 1-7 - Jawhara Aljabri, Anna Lito Michala, Jeremy Singer:
ELSA: Edge Lightweight Searchable Attribute-based encryption Multi-keyword Scalability. 1-4 - Thalia Laing, Eduard Marin, Mark D. Ryan, Joshua Schiffman, Gaëtan Wattiau:
Symbolon: Enabling Flexible Multi-device-based User Authentication. 1-12 - Ipshita Roy Chowdhury, Deepayan Bhowmik:
Capturing Malware Behaviour with Ontology-based Knowledge Graphs. 1-7 - Bowen Zhao, Yingjiu Li, Ximeng Liu, HweeHwa Pang, Robert H. Deng:
FREED: An Efficient Privacy-Preserving Solution for Person Re-IDentification. 1-8 - Jiang-Yi Zeng, Li-En Chang, Hsin-Hung Cho, Chi-Yuan Chen, Han-Chieh Chao, Kuo-Hui Yeh:
Using Poisson Distribution to Enhance CNN-based NB-IoT LDoS Attack Detection. 1-7 - Talal Halabi, Aawista Chaudhry, Sarra M. Alqahtani, Mohammad Zulkernine:
A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments. 1-8 - Zijie Huang, Yulei Wu:
A Survey on Explainable Anomaly Detection for Industrial Internet of Things. 1-9 - Wai Weng Lo, Siamak Layeghy, Mohanad Sarhan, Marcus Gallagher, Marius Portmann:
Graph Neural Network-based Android Malware Classification with Jumping Knowledge. 1-9 - Haiyue Yuan, Shujun Li:
Cyber Security Risks of Net Zero Technologies. 1-11 - Fangwei Wang, Yuanyuan Lu, Qingru Li, Changguang Wang, Yonglei Bai:
A Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation Method. 1-8 - Chun-I Fan, Yen-Lin Lai, Cheng-Han Shie:
Clustering-Based Network Intrusion Detection System. 1-8 - Mariam Varkey, Jacob John, Umadevi K. S.:
Automated Anomaly Detection Tool for Industrial Control System. 1-6 - Peter T. Breuer:
High Speed Encrypted Computing: Stochastic Confusion and Lies in a Secret Computer. 1-8 - Yufeng Xie, Mingchu Li, Kun Lu, Syed Bilal Hussain Shah, Xiao Zheng:
Multi-task Learning Model based on Multiple Characteristics and Multiple Interests for CTR prediction. 1-7 - Daniel Fraunholz, Richard Schörghofer-Vrinssen, Hartmut König, Richard M. Zahoransky:
Show Me Your Attach Request and I'll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile Networks. 1-8 - Abel O. Gomez Rivera, Evan M. White, Jaime C. Acosta, Deepak K. Tosh:
Enabling Device Trustworthiness for SDN-Enabled Internet -of- Battlefield Things. 1-7 - Mingchu Li, Linlin Yang, Kun Lu, Syed Bilal Hussain Shah, Xiao Zheng:
Device-to-Device Task Offloading in a Stochastic Invalid-Device Scenario with Social Awareness. 1-7 - Leigh Turnbull, Zhiyuan Tan, Kehinde O. Babaagba:
A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling. 1-9 - Lu Zhang, Reginald Cushing, Paola Grosso:
Defending OC-SVM based IDS from poisoning attacks. 1-8 - Joshua Streiff, Naheem Noah, Sanchari Das:
A Call for a New Privacy & Security Regime for IoT Smart Toys. 1-8 - Warren Z. Cabral, Leslie F. Sikos, Craig Valli:
Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization. 1-7 - Chun-I Fan, Cheng-Han Shie, Che-Ming Hsu, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi:
IoT Botnet Detection Based on the Behaviors of DNS Queries. 1-7 - Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, Akshay Kakkar, Deepak Kushwaha, Paul Park, Peter A. Beling, Edward Bowen:
Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs. 1-8 - Teik Guan Tan, Pawel Szalachowski, Jianying Zhou:
Securing Password Authentication for Web-based Applications. 1-10 - Andrew Scholey, Pooneh Bagheri Zadeh:
A Digital Forensics Live Suspicious Activity Toolkit To Assist Investigators With Sexual Harm Prevention Order Monitoring. 1-6 - Abdullah Alsalemi, Abbes Amira, Hossein Malekmohamadi, Kegong Diao:
Facilitating Deep Learning for Edge Computing: A Case Study on Data Classification. 1-4 - Muhammad Omer Shahid, Chuadhry Mujeeb Ahmed, Venkata Reddy Palleti, Jianying Zhou:
Curse of System Complexity and Virtue of Operational Invariants: Machine Learning based System Modeling and Attack Detection in CPS. 1-8 - Eva Papadogiannaki, Giorgos Tsirantonakis, Sotiris Ioannidis:
Network Intrusion Detection in Encrypted Traffic. 1-8 - Yash Khare, Kumud Lakara, Maruthi Seshidhar Inukonda, Sparsh Mittal, Mahesh Chandra, Arvind Kaushik:
Design and Analysis of Novel Bit-flip Attacks and Defense Strategies for DNNs. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.