


default search action
27th ISC 2024: Arlington, VA, USA - Part II
- Nicky Mouha

, Nick Nikiforakis
:
Information Security - 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part II. Lecture Notes in Computer Science 15258, Springer 2025, ISBN 978-3-031-75763-1
Post-Quantum Cryptography
- Shintaro Narisada

, Shusaku Uemura, Hiroki Okada
, Hiroki Furue, Yusuke Aikawa, Kazuhide Fukushima
:
Solving McEliece-1409 in One Day - Cryptanalysis with the Improved BJMM Algorithm. 3-23 - Yang Zhou, Heyang Cao, Mingsheng Wang:

Deep LLL on Module Lattices. 24-40 - Xuan Yu

, Jipeng Zhang
, Junhao Huang, Donglong Chen, Lu Zhou:
Multi-way High-Throughput Implementation of Kyber. 41-60 - Samed Düzlü, Patrick Struck:

The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys. 61-80 - Shota Inoue, Yusuke Aikawa, Tsuyoshi Takagi:

A Faster Variant of CGL Hash Function via Efficient Backtracking Checks. 81-100 - Ahmed Zawia, M. Anwar Hasan:

Streamlining CSIDH: Cost-Effective Strategies for Group Actions Evaluation. 101-118
System Security
- Sardor Mamarasulov

, Yang Li
, Changbo Wang
:
Channel Robust Strategies with Data Augmentation for Audio Anti-spoofing. 121-139 - You Li

, Kaiyu Hou
, Yunqi He
, Yan Chen
, Hai Zhou
:
Property Guided Secure Configuration Space Search. 140-160 - Ekaterina Ivanova

, Natalia Stakhanova
, Bahman Sistany:
Adversarial Analysis of Software Composition Analysis Tools. 161-182 - Anuradha Mandal

, Cagri Arisoy
, Nitesh Saxena
:
News Reader: A News Interest Identification Attack Using Single-Electrode Brainwave Signals. 183-202
Web Security
- Shaown Sarker

, Kasimir Schulz
, Aleksandr Nahapetyan
, Anupam Das
, Alexandros Kapravelos
:
JSHint: Revealing API Usage to Improve Detection of Malicious JavaScript. 205-225 - Shaown Sarker

, William Melicher
, Oleksii Starov
, Anupam Das
, Alexandros Kapravelos
:
Automated Generation of Behavioral Signatures for Malicious Web Campaigns. 226-245 - Daniel Köhler

, Wenzel Pünter
, Christoph Meinel:
We have Phishing at Home: Quantitative Study on Email Phishing Susceptibility in Private Contexts. 246-265
Intrusion Detection
- Zhuoqun Xia, Longfei Huang, Jingjing Tan, Faqun Jiang, Zhenzhen Hu:

TIDL-IDS: A Time-Series Imaging and Deep Learning-Based IDS for Connected Autonomous Vehicles. 269-285 - Shihua Sun

, Pragya Sharma
, Kenechukwu Nwodo
, Angelos Stavrou
, Haining Wang:
FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method. 286-306 - Yiming Wei, Weiye Qi, Zechuan Li, Yufan Han, Yingxu Lai:

MVDetector: Malicious Vehicles Detection Under Sybil Attacks in VANETs. 307-322 - Yue Song

, Jianting Yuan:
Insider Threat Detection Based on User and Entity Behavior Analysis with a Hybrid Model. 323-340

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














