Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/scisec/scisec2023.bht:"
@inproceedings{DBLP:conf/scisec/AnWLLL23, author = {Zhuo An and Mingsheng Wang and Dongdong Liu and Taotao Li and Qiang Lai}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Hydra: An Efficient Asynchronous DAG-Based {BFT} Protocol}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {439--459}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_26}, doi = {10.1007/978-3-031-45933-7\_26}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/AnWLLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/CaiCL23, author = {Weixia Cai and Huashan Chen and Feng Liu}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {42--59}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_3}, doi = {10.1007/978-3-031-45933-7\_3}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/CaiCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ChenMW23, author = {Kaiming Chen and Atsuko Miyaji and Yuntao Wang}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Privacy-Enhanced Anonymous and Deniable Post-quantum {X3DH}}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {157--177}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_10}, doi = {10.1007/978-3-031-45933-7\_10}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/ChenMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/GaoZ23, author = {Zongning Gao and Shunliang Zhang}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Research on Encrypted Malicious 5G Access Network Traffic Identification Based on Deep Learning}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {496--512}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_29}, doi = {10.1007/978-3-031-45933-7\_29}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/GaoZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/GuoWP23, author = {Fusen Guo and Jianzhang Wu and Lei Pan}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {An Empirical Study of {AI} Model's Performance for Electricity Load Forecasting with Extreme Weather Conditions}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {193--204}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_12}, doi = {10.1007/978-3-031-45933-7\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/GuoWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/HeZFS23, author = {Pengju He and Haibo Zhang and Yaokai Feng and Kouichi Sakurai}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional Network}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {513--523}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_30}, doi = {10.1007/978-3-031-45933-7\_30}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/HeZFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LeGrowKA23, author = {Jason T. LeGrow and Brian Koziel and Reza Azarderakhsh}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {347--366}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_21}, doi = {10.1007/978-3-031-45933-7\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LeGrowKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiCSD23, author = {Jinyang Li and Zhenfu Cao and Jiachen Shen and Xiaolei Dong}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {{MCVDSSE:} Secure Multi-client Verifiable Dynamic Symmetric Searchable Encryption}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {85--96}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_5}, doi = {10.1007/978-3-031-45933-7\_5}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LiCSD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiYW23, author = {Xiuxiu Li and Wei Yu and Kunpeng Wang}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Implementation of the Elliptic Curve Method}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {115--126}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_7}, doi = {10.1007/978-3-031-45933-7\_7}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LiYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiYWL23, author = {Xiuxiu Li and Wei Yu and Kunpeng Wang and Luying Li}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Almost Injective and Invertible Encodings for Jacobi Quartic Curves}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {127--138}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_8}, doi = {10.1007/978-3-031-45933-7\_8}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LiYWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LuoCSD23, author = {Kaifeng Luo and Zhenfu Cao and Jiachen Shen and Xiaolei Dong}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {{SVFL:} Secure Vertical Federated Learning on Linear Models}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {332--344}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_20}, doi = {10.1007/978-3-031-45933-7\_20}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LuoCSD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/MaLXWLZ23, author = {Bin Ma and Kun Li and Jian Xu and Chunpeng Wang and Jian Li and Liwei Zhang}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Enhancing the Anti-steganalysis Ability of Image Steganography via Multiple Adversarial Networks}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {181--192}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_11}, doi = {10.1007/978-3-031-45933-7\_11}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/MaLXWLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/MaTXWLZ23, author = {Bin Ma and Zhongquan Tao and Jian Xu and Chunpeng Wang and Jian Li and Liwei Zhang}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {386--397}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_23}, doi = {10.1007/978-3-031-45933-7\_23}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/MaTXWLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/MaWXWLL23, author = {Bin Ma and Songkun Wang and Jian Xu and Chunpeng Wang and Jian Li and Xiaolong Li}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {A Multi-level Sorting Prediction Enhancement-Based Two-Dimensional Reversible Data Hiding Algorithm for {JPEG} Images}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {481--495}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_28}, doi = {10.1007/978-3-031-45933-7\_28}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/MaWXWLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/MiaoBTLWCLS23, author = {Han Miao and Huaifeng Bao and Zixian Tang and Wenhao Li and Wen Wang and Huashan Chen and Feng Liu and Yanhui Sun}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {AST2Vec: {A} Robust Neural Code Representation for Malicious PowerShell Detection}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {207--224}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_13}, doi = {10.1007/978-3-031-45933-7\_13}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/MiaoBTLWCLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/PengXLTT23, author = {Chunying Peng and Haixia Xu and Huimei Liao and Jinling Tang and Tao Tang}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Redactable Blockchain in the Permissioned Setting}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {460--477}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_27}, doi = {10.1007/978-3-031-45933-7\_27}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/PengXLTT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/QinL23, author = {Xinyuan Qin and Wenjuan Li}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {A Graphical Password Scheme Based on Rounded Image Selection}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {97--114}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_6}, doi = {10.1007/978-3-031-45933-7\_6}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/QinL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/RenJY23, author = {Mengxia Ren and Joshua Josey and Chuan Yue}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {WebMea: {A} Google Chrome Extension for Web Security and Privacy Measurement Studies}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {305--318}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_18}, doi = {10.1007/978-3-031-45933-7\_18}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/RenJY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/RodriguezLGEAKX23, author = {Rosana Monta{\~{n}}ez Rodriguez and Theodore Tangie Longtchi and Kora Gwartney and Ekzhin Ear and David P. Azari and Christopher P. Kelley and Shouhuai Xu}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Quantifying Psychological Sophistication of Malicious Emails}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {319--331}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_19}, doi = {10.1007/978-3-031-45933-7\_19}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/RodriguezLGEAKX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/RuanWLDY23, author = {Wenwen Ruan and Wenhao Wang and Shuang Liu and Ran Duan and Shoumeng Yan}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {23--41}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_2}, doi = {10.1007/978-3-031-45933-7\_2}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/RuanWLDY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/SunXSBKX23, author = {Zheyuan Sun and Maochao Xu and Kristin M. Schweitzer and Raymond M. Bateman and Alexander Kott and Shouhuai Xu}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Cyber Attacks Against Enterprise Networks: Characterization, Modeling and Forecasting}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {60--81}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_4}, doi = {10.1007/978-3-031-45933-7\_4}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/SunXSBKX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/TrivediT23, author = {Devharsh Trivedi and Nikos Triandopoulos}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {VaultBox: Enhancing the Security and Effectiveness of Security Analytics}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {401--422}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_24}, doi = {10.1007/978-3-031-45933-7\_24}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/TrivediT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangCALLMW23, author = {Yipeng Wang and Peixian Chen and Shan Ai and Weipeng Liang and Binjie Liao and Weichuan Mo and Heng Wang}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Two-Stage Anomaly Detection in {LEO} Satellite Network}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {423--438}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_25}, doi = {10.1007/978-3-031-45933-7\_25}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WangCALLMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangDZ23, author = {Peng Wang and Guangxiang Dai and Lidong Zhai}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Event-Based Threat Intelligence Ontology Model}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {261--282}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_16}, doi = {10.1007/978-3-031-45933-7\_16}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WangDZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangLZYQJD23, author = {Haiping Wang and Binbin Li and Tianning Zang and Yifei Yang and Zisen Qi and Siyu Jia and Yu Ding}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Real-Time Aggregation for Massive Alerts Based on Dynamic Attack Granularity Graph}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {225--243}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_14}, doi = {10.1007/978-3-031-45933-7\_14}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WangLZYQJD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangYXWYCH23, author = {Xiaowei Wang and Zimu Yuan and Yang Xiao and Liyan Wang and Yican Yao and Haiming Chen and Wei Huo}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Decompilation Based Deep Binary-Source Function Matching}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {244--260}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_15}, doi = {10.1007/978-3-031-45933-7\_15}, timestamp = {Thu, 25 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WangYXWYCH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/XiHZWF23, author = {Ning Xi and Yihuan He and Yuchen Zhang and Zhi Wang and Pengbin Feng}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {ACDroid: Detecting Collusion Applications on Smart Devices}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {3--22}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_1}, doi = {10.1007/978-3-031-45933-7\_1}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/XiHZWF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZamanTMLSXC23, author = {Md Mahabub Uz Zaman and Liangde Tao and Mark Maldonado and Chang Liu and Ahmed Sunny and Shouhuai Xu and Lin Chen}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Optimally Blending Honeypots into Production Networks: Hardness and Algorithms}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {285--304}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_17}, doi = {10.1007/978-3-031-45933-7\_17}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ZamanTMLSXC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZanLX23, author = {Yao Zan and Hongda Li and Haixia Xu}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Adaptively Secure Constrained Verifiable Random Function}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {367--385}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_22}, doi = {10.1007/978-3-031-45933-7\_22}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ZanLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZhangQZCJL23, author = {Linkang Zhang and Yunyang Qin and Yujia Zhu and Yifei Cheng and Zhen Jie and Qingyun Liu}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {SeeStar: An Efficient Starlink Asset Detection Framework}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {139--156}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_9}, doi = {10.1007/978-3-031-45933-7\_9}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ZhangQZCJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scisec/2023, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7}, doi = {10.1007/978-3-031-45933-7}, isbn = {978-3-031-45932-0}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.