


default search action
39th SP 2018: San Francisco, CA, USA - Workshops
- 2018 IEEE Security and Privacy Workshops, SP Workshops 2018, San Francisco, CA, USA, May 24, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-8276-0

DLS: Deep Learning and Security Workshop
- Nicholas Carlini, David A. Wagner:

Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. 1-7 - Joshua Saxe, Richard E. Harang, Cody Wild, Hillary Sanders:

A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content. 8-14 - Penny Chong, Yi Xiang Marcus Tan, Juan Guarnizo, Yuval Elovici, Alexander Binder

:
Mouse Authentication Without the Temporal Aspect - What Does a 2D-CNN Learn? 15-21 - Jonathan Woodbridge, Hyrum S. Anderson, Anjum Ahuja, Daniel Grant:

Detecting Homoglyph Attacks with a Siamese Neural Network. 22-28 - Rohan Doshi, Noah J. Apthorpe, Nick Feamster:

Machine Learning DDoS Detection for Consumer Internet of Things Devices. 29-35 - Jernej Kos, Ian Fischer, Dawn Song:

Adversarial Examples for Generative Models. 36-42 - Jamie Hayes, George Danezis:

Learning Universal Adversarial Perturbations with Generative Models. 43-49 - Ji Gao, Jack Lanchantin, Mary Lou Soffa, Yanjun Qi:

Black-Box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers. 50-56 - Ruggiero Dargenio, Shashank Srikant, Erik Hemberg, Una-May O'Reilly:

Exploring the Use of Autoencoders for Botnets Traffic Representation. 57-62 - Savvas Zannettou, Sotirios Chatzis, Kostantinos Papadamou

, Michael Sirivianos:
The Good, the Bad and the Bait: Detecting and Characterizing Clickbait on YouTube. 63-69 - Maria Rigaki

, Sebastián García
:
Bringing a GAN to a Knife-Fight: Adapting Malware Communication to Avoid Detection. 70-75 - Abdullah Al-Dujaili, Alex Huang, Erik Hemberg, Una-May O'Reilly:

Adversarial Deep Learning for Robust Detection of Binary Encoded Malware. 76-82 - Z. Berkay Celik, Patrick D. McDaniel:

Extending Detection with Privileged Information via Generalized Distillation. 83-88 - Hojjat Aghakhani, Aravind Machiry, Shirin Nilizadeh, Christopher Kruegel, Giovanni Vigna:

Detecting Deceptive Reviews Using Generative Adversarial Networks. 89-95 - Michael McCoyd, David A. Wagner:

Background Class Defense Against Adversarial Examples. 96-102 - Amir Asiaee T., Hardik Goel, Shalini Ghosh, Vinod Yegneswaran, Arindam Banerjee:

Time Series Deinterleaving of DNS Traffic. 103-108 - Li Chen, Salmin Sultana, Ravi Sahita:

HeNet: A Deep Learning Approach on Intel® Processor Trace for Effective Exploit Detection. 109-115 - Konstantin Böttinger, Patrice Godefroid, Rishabh Singh:

Deep Reinforcement Fuzzing. 116-122 - Qixue Xiao, Kang Li, Deyue Zhang, Weilin Xu:

Security Risks in Deep Learning Implementations. 123-128
SADFE: Systematic Approaches to Digital Forensic Engineering
- Felix Anda, David Lillis

, Nhien-An Le-Khac
, Mark Scanlon
:
Evaluating Automated Facial Age Estimation Techniques for Digital Forensics. 129-139 - Qian Chen, Qing Liao, Zoe Lin Jiang, Junbin Fang

, Siu-Ming Yiu, Guikai Xi, Rong Li, Zhengzhong Yi, Xuan Wang, Lucas C. K. Hui, Dong Liu, En Zhang:
File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics. 140-147 - Chi Yuen Tseung, Kam-Pui Chow:

Forensic-Aware Anti-DDoS Device. 148-159 - Zhen Xu, Chen Shi, Chris Chao-Chun Cheng, Neil Zhenqiang Gong, Yong Guan:

A Dynamic Taint Analysis Tool for Android App Forensics. 160-169 - Shoufu Luo, Jeremy D. Seideman, Sven Dietrich

:
Fingerprinting Cryptographic Protocols with Key Exchange Using an Entropy Measure. 170-179 - Kul Prasad Subedi, Daya Ram Budhathoki, Dipankar Dasgupta:

Forensic Analysis of Ransomware Families Using Static and Dynamic Analysis. 180-185 - Ananya Yarramreddy, Peter Gromkowski, Ibrahim M. Baggili

:
Forensic Analysis of Immersive Virtual Reality Social Applications: A Primary Account. 186-196
WRIT: Workshop on Research for Insider Threat
- Frank L. Greitzer, Justin Purl, Yung Mei Leong, D. E. Sunny Becker:

SOFIT: Sociotechnical and Organizational Factors for Insider Threat. 197-206 - Michael Mylrea, Sri Nikhil Gupta Gourisetti, Curtis Larimer, Christine F. Noonan:

Insider Threat Cybersecurity Framework Webtool & Methodology: Defending Against Complex Cyber-Physical Threats. 207-216 - Flavio Toffalini, Ivan Homoliak

, Athul Harilal, Alexander Binder
, Martín Ochoa:
Detection of Masqueraders Based on Graph Partitioning of File System Access Events. 217-227 - Preetam Dutta, Gabriel Ryan, Aleksander Zieba, Salvatore J. Stolfo:

Simulated User Bots: Real Time Testing of Insider Threat Detection Systems. 228-236 - Andrew P. Moore, Tracy M. Cassidy, Michael C. Theis, Daniel Bauer, Denise M. Rousseau

, Susan B. Moore:
Balancing Organizational Incentives to Counter Insider Threat. 237-246 - Derrick Spooner, George Silowash, Daniel Costa, Michael Albrethsen:

Navigating the Insider Threat Tool Landscape: Low Cost Technical Solutions to Jump Start an Insider Threat Program. 247-257
BioStar: Workshop on Bio-inspired Security, Trust, Assurance and Resilience
- Vysakh S. Mohan, R. Vinayakumar

, Soman K. P, Prabaharan Poornachandran
:
S.P.O.O.F Net: Syntactic Patterns for identification of Ominous Online Factors. 258-263 - Abbas Acar

, Hidayet Aksu, A. Selcuk Uluagac
, Kemal Akkaya:
WACA: Wearable-Assisted Continuous Authentication. 264-269 - Duc C. Le

, Nur Zincir-Heywood
:
Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning. 270-275 - Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen

, Jouni Isoaho
:
Towards Human Bio-Inspired Defence Mechanism for Cyber Security. 276-280 - Gonzalo P. Suárez

, Lazaros K. Gallos, Nina H. Fefferman:
A Case Study in Tailoring a Bio-Inspired Cyber-Security Algorithm: Designing Anomaly Detection for Multilayer Networks. 281-286 - Esraa M. Ghourab, Effat Samir, Mohamed Azab, Mohamed Eltoweissy:

Diversity-Based Moving-Target Defense for Secure Wireless Vehicular Communications. 287-292 - Denis Gracanin

, Adam D'Amico, Mark Manuel, Walter Carson, Mohamed Eltoweissy, Liang Cheng:
Biologically Inspired Safety and Security for Smart Built Environments: Position Paper. 293-298
LangSec: Workshop on Language-theoretic Security and Applications
- Keith Irwin:

Redesigning Secure Protocols to Compel Grammatical Compliance Checking. 299-305 - Jayakrishna Menon, Christophe Hauser, Yan Shoshitaishvili, Stephen Schwab:

A Binary Analysis Approach to Retrofit Security in Input Parsing Routines. 306-322 - Rodrigo Branco, Kekai Hu, Henrique Kawakami, Ke Sun:

A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory. 323-328 - Erik Poll:

LangSec Revisited: Input Security Flaws of the Second Kind. 329-334

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














