


default search action
17th SIN 2024: Sydney, Australia
- 17th International Conference on Security of Information and Networks, SIN 2024, Sydney, Australia, December 2-4, 2024. IEEE 2024, ISBN 979-8-3315-0973-6

- Amin Rois Sinung Nugroho, Muhammad Ikram

, Mohamed Ali Kâafar
:
Performance Evaluation of Quantum-Secure Symmetric Key Agreement. 1-9 - Nicholas D'Silva

, Toran Shahi, Øyvind Timian Dokk Husveg, Adith Sanjeeve
, Erik Buchholz
, Salil S. Kanhere:
Demystifying Trajectory Recovery from Ash: An Open-Source Evaluation and Enhancement. 1-8 - Wael Jefry

, Firas Al-Doghman
, Farookh Khadeer Hussain
:
BERT-LA: Leveraging BERT and AraBERT With Bi-LSTM for Cross-Lingual Sentiment Analysis of English and Arabic Texts. 1-10 - Ghazaleh Keshavarzkalhori

, Cristina Pérez-Solà
, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí
:
Building Resilient AI: A Solution to Data and Model Poisoning Prevention. 1-8 - Stuart Weir, Muhammad Shahbaz Khan, Naghmeh Moradpoor, Jawad Ahmad:

Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis. 1-7 - Carlos A. Rivera Alvarez, Arash Shaghaghi, Gustavo Batista, Salil S. Kanhere:

Towards Weaknesses and Attack Patterns Prediction for IoT Devices. 1-10 - Halimcan Yasar, Serif Bahtiyar

:
Secure Communication for MUM-T: A Blockchain and Lightweight Cryptography Framework. 1-8 - Christoforus Yoga Haryanto

, Anne Maria Elvira, Trung Duc Nguyen, Minh Hieu Vu, Yoshiano Hartanto, Emily Lomempow, Arathi Arakala:
Contextualized AI for Cyber Defense: An Automated Survey Using LLMs. 1-8 - Mehdi Houichi

, Faouzi Jaïdi
, Adel Bouhoula
:
A Novel Framework for Attack Detection and Localization in Smart Cities. 1-9 - Hiep Vo

, Shui Yu
, Xi Zheng
:
Prompt Engineering Adversarial Attack Against Image Captioning Models. 1-7 - Pankaj Hariom Sharma, Priyanka Singh

:
CDCEF: A Cloud-Based Data Volatility & CSP Reliance Eradication Framework. 1-6 - Pirunthavi Wijikumar, Shouthiri Partheepan, Jahan Hassan, Farzad Sanati

, Biplop Rakshit Ray:
Bushfire Severity Prediction Optimization: Feature Combination Study with XGBoost Regression and Satellite-Derived Data. 1-7 - Indu Parajuli, Biplob Rakshit Ray, Jahan Hassan, Michael Cowling:

Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWAN. 1-10 - Asad Faraz Khan, Priyadarsi Nanda:

Comprehensive Security of SDN Controllers in NFVI-Based 5G Network. 1-10 - Saleh Mansor Alqahtani, Priyadarsi Nanda

:
Enhancing Phishing Resilience in Academia: The Mediating Role of Anti-Phishing Tools on Student Awareness and Behavior. 1-8 - Devi Listiyani

, Priyanka Singh
:
IRIS-SAFE: Privacy-Preserving Biometric Authentication. 1-7 - Asad Faraz Khan, Priyadarsi Nanda:

Dynamic Network Slicing and Deep Learning Based Intrusion Detection System with Virtual Load Balancing in Edge Enabled SDN/NFV Based 5G Networks. 1-10 - Erkan Uslu, Oguz Yayla:

Dilithium-Based Verifiable Timed Signature Scheme. 1-8 - Tarun Bisht, Sarath Babu, Virendra Singh:

Critical Behavior Sequence Monitoring for Early Malware Detection. 1-8 - Ny Hasina Andriambelo, Naghmeh Moradpoor:

Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles With Lightweight Blockchain and Binius ZeroKnowledge Proofs. 1-8 - Lanlan Pan

, Ruonan Qiu, Minghui Yang:
A Lightweight Hybrid Signcryption Scheme for Smart Devices. 1-8 - Shunmika Chidambaram, Bhagya Sony, Nithya Nedungadi, Sriram Sankaran:

Empirical Analysis of Anomaly Detection Systems for Internet of Things. 1-7 - Taher M. Ghazal, Jamshaid Iqbal Janjua, Walid Abushiba, Munir Ahmad, Anuam Ihsan, Nidal A. Al-Dmour:

Cybersecurity Revolution via Large Language Models and Explainable AI. 1-6 - Liang Liu, Kazumasa Omote:

A Blockchain-Based System for Dynamic Redundancy in IoT Communications. 1-8 - Rajesh Nayak

, C. D. Jaidhar:
Experimental Study on Impact of Appliance ID-Based Normalization on SimDataset for Anomalous Power Consumption Classification. 1-8 - Saleh Mansor Alqahtani, Priyadarsi Nanda

:
Effects of Personal Characteristics on Phishing Awareness, Anti-Phishing Tool Usage, and Phishing Avoidance Behavior: A Structural Equation Modeling Approach. 1-9 - Kaisei Kajita, Go Ohtake:

EncPDS: Encrypted Personal Data Stores via Key-Aggregate ID-Based Proxy Re-Encryption. 1-8 - Akshitha K. Subran, Sriram Sankaran:

A Novel Biometric-Based Multi-Factor Authentication Protocol for EV Charging Infrastructures. 1-7 - Dominic Ayamga

, Priyadarsi Nanda
, Manoranjan Mohanty
:
The Bell-LaPadula (BLP) Enterprise Security Architecture Model vs Inference Attacks. 1-8 - Beyazit Bestami Yuksel

, Ayse Yilmazer-Metin
:
ECG- PPS: Privacy Preserving Disease Diagnosis and Monitoring System for Real-Time ECG Signals. 1-7 - Büsra Çaliskan, Ibrahim Gulatas

, H. Hakan Kilinc, Abdul Halim Zaim
:
The Recent Trends in Ransomware Detection and Behaviour Analysis. 1-8 - Mizuki Tsuchida, Kazumasa Omote:

A Secure Contact Tracing Method Using Blockchain for Criminal Investigation. 1-8 - Farag El Zegil

, Priyadarsi Nanda, Manoranjan Mohanty, Majed Alzahrani
:
Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based Applications. 1-8 - Rahat Mehmood, Priyanka Singh

, Zoe Jeffery:
Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach. 1-7 - Fei Du

, Jinai Ge, Wen Wang, Yuwen Zou, Sang-Yoon Chang, Wenjun Fan:
Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking. 1-8 - Harshit Gupta, Luca D'Agati, Francesco Longo, Antonio Puliafito, Giovanni Merlino:

Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends. 1-8 - Márton Bertalan Limpek, Géza Szabó, László Hévizi, István Gódor:

Spatial Prediction of UAV Position Using Deep Learning. 1-6 - Muntathar Abid, Priyadarsi Nanda, Manoranjan Mohanty:

Incident Response Adaptive Metrics Framework. 1-8 - Yaser Saei, Jafar Tahmoresnezhad, Sima Jafarikhah, Hossein Siadati:

Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework. 1-8 - Amir Javadpour, Forough Ja'fari, Tarik Taleb

, Chafika Benzaïd:
5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning. 1-9 - Kerem Alpdag, Naghmeh Moradpoor, Ny Hasina Andriambelo, Paul Wooderson, Leandros Maglaras

:
EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit. 1-10 - Shayesta Naziri, Xu Wang

, Guangsheng Yu, Jian Xu, Sudhir Shrestha, Christy Jie Liang:
SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems. 1-8 - Kaie Maennel, Olaf Manuel Maennel:

Human-AI Collaboration and Cyber Security Training: Learning Analytics Opportunities and Challenges. 1-8 - Mert Yildiz, Serif Bahtiyar

:
A Novel Key Management Framework for Secure and Scalable Decentralized Identity Systems. 1-8 - Adel Atieh, Priyadarsi Nanda, Manoranjan Mohanty:

A Zero-Trust Framework Based on Machine Learning for Industrial Internet of Things. 1-8 - En Jie Tan

, Kowit Tan, Royce Yu Feng Chong, Xingxing Chen, Yi Ching Tan, Liming Lu, Huaqun Guo:
Simulation of Pre-Ransomware Attacks on Active Directory. 1-9 - Valeriy O. Osipyan, E. T. J. Algharib, Arseniy Zhuck, Kirill I. Litvinov:

Mathematical Models of Security Information Systems Based on the Generalized Multiplicative Knapsacks. 1-5 - Yulduz Muradova, Jennifer Amachree, Louis Henry, Anu G. Bourgeois:

Implementation of Natural Language UAV Control Using OpenAI's ChatGPT in a Simulated University Environment. 1-5 - Jay Dave, Nikumani Choudhury, Dantu Havishteja, Katuri Revanth:

Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks. 1-8 - Sajal Bhatia, Saaid Elhadad, Irfan Ahmed

:
PATCH: Problem-Based Learning Approach for Teaching Cybersecurity and Ethical Hacking in Community Colleges. 1-9 - Xufeng Liu, Quoc Hoan Vu, Priyanka Singh

:
FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces. 1-7 - Swapnoneel Roy, Charlene H. Crawshaw, Debajyoti Mukhopadhyay, Meera Narvekar:

Security Inspection and Enhancement of a Modern Multi-Factor Authentication Protocol. 1-6 - Sunil Arora

, John D. Hastings
:
Microsegmented Cloud Network Architecture Using Open-Source Tools for a Zero Trust Foundation. 1-8 - Qisheng Chen

, Kazumasa Omote
:
A Token-Level Adversarial Example Attack Method for Machine Learning Based Malicious URL Detectors. 1-7 - Charisee Zhi Ling Yip, Tee Kiat Chua, Clarabel Jinghui Teo, Jing Rui Goh, Brandon Jia Le Loo, Huaqun Guo, Liming Lu, Kan Chen:

Security Situation Awareness Platform. 1-8 - Abdullah Al Noman, Md Tanvir Rahman Tarafder, S. M. Tamim Hossain Rimon

, Asif Ahamed
, Shahriar Ahmed, Abdullah Al Sakib:
Discoverable Hidden Patterns in Water Quality Through AI, LLMs, and Transparent Remote Sensing. 1-6 - Xiaocui Dang, Priyadarsi Nanda, Heng Xu, Haiyu Deng, Manoranjan Mohanty:

Recommendation System Model Ownership Verification via Non-Influential Watermarking. 1-8 - Alexey Rusakov, Naghmeh Moradpoor, Aida Akbarzadeh:

Lightweight Blockchain Prototype for Food Supply Chain Management. 1-8 - Azadeh Arnaz, Justin Lipman

, Mehran Abolhasan:
Adversarial Attack Vectors Against Near-Real-Time AI xApps in the Open RAN. 1-9 - Xin Lin Gan, Zhi Ren James Tan, Yu En Bernice Goo, Xin Ling Jocelyn Yeo, Vi Shean Lim, Yan Cong Boo, Huaqun Guo:

Ransomware Insight Analyzer. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














