Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/sgcrc:"
@inproceedings{DBLP:conf/sgcrc/DaiCBT17, author = {Zhongmin Dai and Tong{-}Wei Chua and Dinesh Kumar Balakrishnan and Vrizlynn L. L. Thing}, editor = {Abhik Roychoudhury and Yang Liu}, title = {Chat-App Decryption Key Extraction Through Information Flow Analysis}, booktitle = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February 21-22, 2017}, series = {Cryptology and Information Security Series}, volume = {15}, pages = {3--18}, publisher = {{IOS} Press}, year = {2017}, url = {https://doi.org/10.3233/978-1-61499-744-3-3}, doi = {10.3233/978-1-61499-744-3-3}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/DaiCBT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/KhanTS17, author = {Wilayat Khan and Alwen Tiu and David San{\'{a}}n}, editor = {Abhik Roychoudhury and Yang Liu}, title = {VeriFormal: An Executable Formal Model of a Hardware Description Language}, booktitle = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February 21-22, 2017}, series = {Cryptology and Information Security Series}, volume = {15}, pages = {19--36}, publisher = {{IOS} Press}, year = {2017}, url = {https://doi.org/10.3233/978-1-61499-744-3-19}, doi = {10.3233/978-1-61499-744-3-19}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/KhanTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/LeeZZT17, author = {Chien Eao Lee and Lilei Zheng and Ying Zhang and Vrizlynn L. L. Thing}, editor = {Abhik Roychoudhury and Yang Liu}, title = {Low-Dimensional Bigram Analysis for Mobile Data Fragment Classification}, booktitle = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February 21-22, 2017}, series = {Cryptology and Information Security Series}, volume = {15}, pages = {129--142}, publisher = {{IOS} Press}, year = {2017}, url = {https://doi.org/10.3233/978-1-61499-744-3-129}, doi = {10.3233/978-1-61499-744-3-129}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sgcrc/LeeZZT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/NissimCWLREG17, author = {Nir Nissim and Aviad Cohen and Jian Wu and Andrea Lanzi and Lior Rokach and Yuval Elovici and C. Lee Giles}, editor = {Abhik Roychoudhury and Yang Liu}, title = {Scholarly Digital Libraries as a Platform for Malware Distribution}, booktitle = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February 21-22, 2017}, series = {Cryptology and Information Security Series}, volume = {15}, pages = {107--128}, publisher = {{IOS} Press}, year = {2017}, url = {https://doi.org/10.3233/978-1-61499-744-3-107}, doi = {10.3233/978-1-61499-744-3-107}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sgcrc/NissimCWLREG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/PohCDL17, author = {Zhi Yuan Poh and Hui Cui and Robert H. Deng and Yingjiu Li}, editor = {Abhik Roychoudhury and Yang Liu}, title = {Attribute-Based Secure Messaging in the Public Cloud}, booktitle = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February 21-22, 2017}, series = {Cryptology and Information Security Series}, volume = {15}, pages = {86--96}, publisher = {{IOS} Press}, year = {2017}, url = {https://doi.org/10.3233/978-1-61499-744-3-86}, doi = {10.3233/978-1-61499-744-3-86}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sgcrc/PohCDL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/PomponiuT17, author = {Victor Pomponiu and Vrizlynn L. L. Thing}, editor = {Abhik Roychoudhury and Yang Liu}, title = {A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification}, booktitle = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February 21-22, 2017}, series = {Cryptology and Information Security Series}, volume = {15}, pages = {57--69}, publisher = {{IOS} Press}, year = {2017}, url = {https://doi.org/10.3233/978-1-61499-744-3-57}, doi = {10.3233/978-1-61499-744-3-57}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/PomponiuT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/Seo17, author = {Hwajung Seo}, editor = {Abhik Roychoudhury and Yang Liu}, title = {Faster {ECC} over (feat. {PMULL)}}, booktitle = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February 21-22, 2017}, series = {Cryptology and Information Security Series}, volume = {15}, pages = {97--106}, publisher = {{IOS} Press}, year = {2017}, url = {https://doi.org/10.3233/978-1-61499-744-3-97}, doi = {10.3233/978-1-61499-744-3-97}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/Seo17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/SmithP17, author = {Matthew David Smith and Marie{-}Elisabeth Pat{\'{e}}{-}Cornell}, editor = {Abhik Roychoudhury and Yang Liu}, title = {Cyber Risk Analysis for a Smart Grid: How Smart is Smart Enough? {A} Multi-Armed Bandit Approach}, booktitle = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February 21-22, 2017}, series = {Cryptology and Information Security Series}, volume = {15}, pages = {37--56}, publisher = {{IOS} Press}, year = {2017}, url = {https://doi.org/10.3233/978-1-61499-744-3-37}, doi = {10.3233/978-1-61499-744-3-37}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/SmithP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/SumathiSMKM17, author = {G. Sumathi and L. Srivani and D. Thirugnana Murthy and Anish Kumar and K. Madhusoodanan}, editor = {Abhik Roychoudhury and Yang Liu}, title = {Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs}, booktitle = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February 21-22, 2017}, series = {Cryptology and Information Security Series}, volume = {15}, pages = {143--157}, publisher = {{IOS} Press}, year = {2017}, url = {https://doi.org/10.3233/978-1-61499-744-3-143}, doi = {10.3233/978-1-61499-744-3-143}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/SumathiSMKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/ZhouGLWZ17, author = {Luying Zhou and Huaqun Guo and Dong Li and Jun Wen Wong and Jianying Zhou}, editor = {Abhik Roychoudhury and Yang Liu}, title = {Mind the Gap: Security Analysis of Metro Platform Screen Door System}, booktitle = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February 21-22, 2017}, series = {Cryptology and Information Security Series}, volume = {15}, pages = {70--85}, publisher = {{IOS} Press}, year = {2017}, url = {https://doi.org/10.3233/978-1-61499-744-3-70}, doi = {10.3233/978-1-61499-744-3-70}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/ZhouGLWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sgcrc/2017, editor = {Abhik Roychoudhury and Yang Liu}, title = {A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R{\&}D Conference {(SG-CRC} 2017), Singapore, February 21-22, 2017}, series = {Cryptology and Information Security Series}, volume = {15}, publisher = {{IOS} Press}, year = {2017}, isbn = {978-1-61499-743-6}, timestamp = {Wed, 22 Mar 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sgcrc/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/AdepuM16, author = {Sridhar Adepu and Aditya P. Mathur}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {59--74}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-59}, doi = {10.3233/978-1-61499-617-0-59}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/AdepuM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/BulleeMJH16, author = {Jan{-}Willem Bullee and Lorena Montoya and Marianne Junger and Pieter H. Hartel}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {107--114}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-107}, doi = {10.3233/978-1-61499-617-0-107}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/BulleeMJH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/CastellanosWOR16, author = {John Henry Castellanos and Tobias W{\"{u}}chner and Mart{\'{\i}}n Ochoa and Sandra Julieta Rueda}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Q-Floid: Android Malware detection with Quantitative Data Flow Graphs}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {13--25}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-13}, doi = {10.3233/978-1-61499-617-0-13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/CastellanosWOR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/DivakaranLT16, author = {Dinil Mon Divakaran and Yung Siang Liau and Vrizlynn L. L. Thing}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Accurate in-network file-type classification}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {139--146}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-139}, doi = {10.3233/978-1-61499-617-0-139}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/DivakaranLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/JunejoY16, author = {Khurum Nazir Junejo and David K. Y. Yau}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Data Driven Physical Modelling For Intrusion Detection In Cyber Physical Systems}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {43--57}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-43}, doi = {10.3233/978-1-61499-617-0-43}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/JunejoY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/MengHK16, author = {Weizhi Meng and Lee Wang Hao and S. P. T. Krishnan}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {A Framework for Large-Scale Collection of Information from Smartphone Users based on Juice Filming Attacks}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {99--106}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-99}, doi = {10.3233/978-1-61499-617-0-99}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sgcrc/MengHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/RajR16, author = {Edward Jero Sam Jeeva Raj and Palaniappan Ramu}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {{ECG} Steganography Using Contourlet Transform For Transmission of Secured Patient Identity}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {131--138}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-131}, doi = {10.3233/978-1-61499-617-0-131}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/RajR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/TaorminaGTSO16, author = {Riccardo Taormina and Stefano Galelli and Nils Ole Tippenhauer and Elad Salomons and Avi Ostfeld}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Simulation of Cyber-Physical Attacks on Water Distribution Systems with {EPANET}}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {123--130}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-123}, doi = {10.3233/978-1-61499-617-0-123}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/TaorminaGTSO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/TranDP16, author = {Ngoc Hieu Tran and Robert H. Deng and HweeHwa Pang}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Privacy-Preserving and Verifiable Data Aggregation}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {115--122}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-115}, doi = {10.3233/978-1-61499-617-0-115}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/TranDP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/UrbinaGTC16, author = {David I. Urbina and Jairo Alonso Giraldo and Nils Ole Tippenhauer and Alvaro A. C{\'{a}}rdenas}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Attacking Fieldbus Communications in {ICS:} Applications to the SWaT Testbed}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {75--89}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-75}, doi = {10.3233/978-1-61499-617-0-75}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sgcrc/UrbinaGTC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/XuCZ16, author = {Jia Xu and Ee{-}Chien Chang and Jianying Zhou}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Directed Transitive Signature on Directed Tree}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {91--98}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-91}, doi = {10.3233/978-1-61499-617-0-91}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/XuCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/XuZL16, author = {Jia Xu and Jianying Zhou and Liming Lu}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Cyber and Physical Access Control in Legacy System Using Passwords}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {27--42}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-27}, doi = {10.3233/978-1-61499-617-0-27}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/XuZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/ZhangGWT16, author = {Ying Zhang and Jonathan Goh and Lei Lei Win and Vrizlynn L. L. Thing}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Image Region Forgery Detection: {A} Deep Learning Approach}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {1--11}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-1}, doi = {10.3233/978-1-61499-617-0-1}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sgcrc/ZhangGWT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sgcrc/2016, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, publisher = {{IOS} Press}, year = {2016}, isbn = {978-1-61499-616-3}, timestamp = {Wed, 22 Mar 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sgcrc/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.