Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:conf/scisec:"
@inproceedings{DBLP:conf/scisec/AnWLLL23, author = {Zhuo An and Mingsheng Wang and Dongdong Liu and Taotao Li and Qiang Lai}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Hydra: An Efficient Asynchronous DAG-Based {BFT} Protocol}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {439--459}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_26}, doi = {10.1007/978-3-031-45933-7\_26}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/AnWLLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/CaiCL23, author = {Weixia Cai and Huashan Chen and Feng Liu}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {42--59}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_3}, doi = {10.1007/978-3-031-45933-7\_3}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/CaiCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ChenMW23, author = {Kaiming Chen and Atsuko Miyaji and Yuntao Wang}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Privacy-Enhanced Anonymous and Deniable Post-quantum {X3DH}}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {157--177}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_10}, doi = {10.1007/978-3-031-45933-7\_10}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/ChenMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/GaoZ23, author = {Zongning Gao and Shunliang Zhang}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Research on Encrypted Malicious 5G Access Network Traffic Identification Based on Deep Learning}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {496--512}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_29}, doi = {10.1007/978-3-031-45933-7\_29}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/GaoZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/GuoWP23, author = {Fusen Guo and Jianzhang Wu and Lei Pan}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {An Empirical Study of {AI} Model's Performance for Electricity Load Forecasting with Extreme Weather Conditions}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {193--204}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_12}, doi = {10.1007/978-3-031-45933-7\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/GuoWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/HeZFS23, author = {Pengju He and Haibo Zhang and Yaokai Feng and Kouichi Sakurai}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional Network}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {513--523}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_30}, doi = {10.1007/978-3-031-45933-7\_30}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/HeZFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LeGrowKA23, author = {Jason T. LeGrow and Brian Koziel and Reza Azarderakhsh}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {347--366}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_21}, doi = {10.1007/978-3-031-45933-7\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LeGrowKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiCSD23, author = {Jinyang Li and Zhenfu Cao and Jiachen Shen and Xiaolei Dong}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {{MCVDSSE:} Secure Multi-client Verifiable Dynamic Symmetric Searchable Encryption}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {85--96}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_5}, doi = {10.1007/978-3-031-45933-7\_5}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LiCSD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiYW23, author = {Xiuxiu Li and Wei Yu and Kunpeng Wang}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Implementation of the Elliptic Curve Method}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {115--126}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_7}, doi = {10.1007/978-3-031-45933-7\_7}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LiYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiYWL23, author = {Xiuxiu Li and Wei Yu and Kunpeng Wang and Luying Li}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Almost Injective and Invertible Encodings for Jacobi Quartic Curves}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {127--138}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_8}, doi = {10.1007/978-3-031-45933-7\_8}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LiYWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LuoCSD23, author = {Kaifeng Luo and Zhenfu Cao and Jiachen Shen and Xiaolei Dong}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {{SVFL:} Secure Vertical Federated Learning on Linear Models}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {332--344}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_20}, doi = {10.1007/978-3-031-45933-7\_20}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LuoCSD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/MaLXWLZ23, author = {Bin Ma and Kun Li and Jian Xu and Chunpeng Wang and Jian Li and Liwei Zhang}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Enhancing the Anti-steganalysis Ability of Image Steganography via Multiple Adversarial Networks}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {181--192}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_11}, doi = {10.1007/978-3-031-45933-7\_11}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/MaLXWLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/MaTXWLZ23, author = {Bin Ma and Zhongquan Tao and Jian Xu and Chunpeng Wang and Jian Li and Liwei Zhang}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {386--397}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_23}, doi = {10.1007/978-3-031-45933-7\_23}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/MaTXWLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/MaWXWLL23, author = {Bin Ma and Songkun Wang and Jian Xu and Chunpeng Wang and Jian Li and Xiaolong Li}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {A Multi-level Sorting Prediction Enhancement-Based Two-Dimensional Reversible Data Hiding Algorithm for {JPEG} Images}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {481--495}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_28}, doi = {10.1007/978-3-031-45933-7\_28}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/MaWXWLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/MiaoBTLWCLS23, author = {Han Miao and Huaifeng Bao and Zixian Tang and Wenhao Li and Wen Wang and Huashan Chen and Feng Liu and Yanhui Sun}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {AST2Vec: {A} Robust Neural Code Representation for Malicious PowerShell Detection}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {207--224}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_13}, doi = {10.1007/978-3-031-45933-7\_13}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/MiaoBTLWCLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/PengXLTT23, author = {Chunying Peng and Haixia Xu and Huimei Liao and Jinling Tang and Tao Tang}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Redactable Blockchain in the Permissioned Setting}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {460--477}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_27}, doi = {10.1007/978-3-031-45933-7\_27}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/PengXLTT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/QinL23, author = {Xinyuan Qin and Wenjuan Li}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {A Graphical Password Scheme Based on Rounded Image Selection}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {97--114}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_6}, doi = {10.1007/978-3-031-45933-7\_6}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/QinL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/RenJY23, author = {Mengxia Ren and Joshua Josey and Chuan Yue}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {WebMea: {A} Google Chrome Extension for Web Security and Privacy Measurement Studies}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {305--318}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_18}, doi = {10.1007/978-3-031-45933-7\_18}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/RenJY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/RodriguezLGEAKX23, author = {Rosana Monta{\~{n}}ez Rodriguez and Theodore Tangie Longtchi and Kora Gwartney and Ekzhin Ear and David P. Azari and Christopher P. Kelley and Shouhuai Xu}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Quantifying Psychological Sophistication of Malicious Emails}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {319--331}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_19}, doi = {10.1007/978-3-031-45933-7\_19}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/RodriguezLGEAKX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/RuanWLDY23, author = {Wenwen Ruan and Wenhao Wang and Shuang Liu and Ran Duan and Shoumeng Yan}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {23--41}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_2}, doi = {10.1007/978-3-031-45933-7\_2}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/RuanWLDY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/SunXSBKX23, author = {Zheyuan Sun and Maochao Xu and Kristin M. Schweitzer and Raymond M. Bateman and Alexander Kott and Shouhuai Xu}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Cyber Attacks Against Enterprise Networks: Characterization, Modeling and Forecasting}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {60--81}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_4}, doi = {10.1007/978-3-031-45933-7\_4}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/SunXSBKX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/TrivediT23, author = {Devharsh Trivedi and Nikos Triandopoulos}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {VaultBox: Enhancing the Security and Effectiveness of Security Analytics}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {401--422}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_24}, doi = {10.1007/978-3-031-45933-7\_24}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/TrivediT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangCALLMW23, author = {Yipeng Wang and Peixian Chen and Shan Ai and Weipeng Liang and Binjie Liao and Weichuan Mo and Heng Wang}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Two-Stage Anomaly Detection in {LEO} Satellite Network}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {423--438}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_25}, doi = {10.1007/978-3-031-45933-7\_25}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WangCALLMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangDZ23, author = {Peng Wang and Guangxiang Dai and Lidong Zhai}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Event-Based Threat Intelligence Ontology Model}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {261--282}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_16}, doi = {10.1007/978-3-031-45933-7\_16}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WangDZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangLZYQJD23, author = {Haiping Wang and Binbin Li and Tianning Zang and Yifei Yang and Zisen Qi and Siyu Jia and Yu Ding}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Real-Time Aggregation for Massive Alerts Based on Dynamic Attack Granularity Graph}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {225--243}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_14}, doi = {10.1007/978-3-031-45933-7\_14}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WangLZYQJD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangYXWYCH23, author = {Xiaowei Wang and Zimu Yuan and Yang Xiao and Liyan Wang and Yican Yao and Haiming Chen and Wei Huo}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Decompilation Based Deep Binary-Source Function Matching}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {244--260}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_15}, doi = {10.1007/978-3-031-45933-7\_15}, timestamp = {Thu, 25 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WangYXWYCH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/XiHZWF23, author = {Ning Xi and Yihuan He and Yuchen Zhang and Zhi Wang and Pengbin Feng}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {ACDroid: Detecting Collusion Applications on Smart Devices}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {3--22}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_1}, doi = {10.1007/978-3-031-45933-7\_1}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/XiHZWF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZamanTMLSXC23, author = {Md Mahabub Uz Zaman and Liangde Tao and Mark Maldonado and Chang Liu and Ahmed Sunny and Shouhuai Xu and Lin Chen}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Optimally Blending Honeypots into Production Networks: Hardness and Algorithms}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {285--304}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_17}, doi = {10.1007/978-3-031-45933-7\_17}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ZamanTMLSXC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZanLX23, author = {Yao Zan and Hongda Li and Haixia Xu}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Adaptively Secure Constrained Verifiable Random Function}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {367--385}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_22}, doi = {10.1007/978-3-031-45933-7\_22}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ZanLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZhangQZCJL23, author = {Linkang Zhang and Yunyang Qin and Yujia Zhu and Yifei Cheng and Zhen Jie and Qingyun Liu}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {SeeStar: An Efficient Starlink Asset Detection Framework}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {139--156}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_9}, doi = {10.1007/978-3-031-45933-7\_9}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ZhangQZCJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scisec/2023, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7}, doi = {10.1007/978-3-031-45933-7}, isbn = {978-3-031-45932-0}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/AlkhattabiBMY22, author = {Khalid Alkhattabi and Davita Bird and Kai Miller and Chuan Yue}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Question Answering Models for Privacy Policies of Mobile Apps: Are We There Yet?}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {333--352}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_22}, doi = {10.1007/978-3-031-17551-0\_22}, timestamp = {Fri, 07 Oct 2022 16:33:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/AlkhattabiBMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/BelarbiKCS22, author = {Othmane Belarbi and Aftab Khan and Pietro Edoardo Carnelli and Theodoros Spyridopoulos}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {An Intrusion Detection System Based on Deep Belief Networks}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {377--392}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_25}, doi = {10.1007/978-3-031-17551-0\_25}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/BelarbiKCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/CastilloBC22, author = {Jorge Castillo and Kevin Barba and Qian Chen}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {ChainSCAN: {A} Blockchain-Based Supply Chain Alerting Framework for Food Safety}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {3--20}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_1}, doi = {10.1007/978-3-031-17551-0\_1}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/CastilloBC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ChenJWJLW22, author = {Xiao Chen and Zhengwei Jiang and Shuwei Wang and Rongqi Jing and Chen Ling and Qiuyun Wang}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Malware Detected and Tell Me Why: An Verifiable Malware Detection Model with Graph Metric Learning}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {302--314}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_20}, doi = {10.1007/978-3-031-17551-0\_20}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/ChenJWJLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ChenW22, author = {Tao Chen and Kun Wen}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Feature Transfer Based Network Anomaly Detection}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {155--169}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_10}, doi = {10.1007/978-3-031-17551-0\_10}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/ChenW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/Chien22, author = {Hung{-}Yu Chien}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Design of End-To-End Security for {MQTT} 5.0}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {353--363}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_23}, doi = {10.1007/978-3-031-17551-0\_23}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/Chien22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/CuiMZWZSZL22, author = {Huajun Cui and Guozhu Meng and Yan Zhang and Weiping Wang and Dali Zhu and Ting Su and Xiaodong Zhang and Yuejun Li}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {TraceDroid: {A} Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {541--556}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_35}, doi = {10.1007/978-3-031-17551-0\_35}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/CuiMZWZSZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/DingZLXQQGJW22, author = {Yu Ding and Xiaoyu Zhang and Binbin Li and Jian Xing and Qian Qiang and Zisen Qi and Menghan Guo and Siyu Jia and Haiping Wang}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Malware Classification Based on Semi-Supervised Learning}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {287--301}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_19}, doi = {10.1007/978-3-031-17551-0\_19}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/DingZLXQQGJW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/DuJJZFDLL22, author = {Xiangyu Du and Zhengwei Jiang and Jun Jiang and Kai Zhang and Zijing Fan and Fangming Dong and Ning Li and Baoxu Liu}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {{BASNEA:} Threat Hunting for Ethereum Smart Contract Based on Backtrackless Aligned-Spatial Network Entity Alignment}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {421--436}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_28}, doi = {10.1007/978-3-031-17551-0\_28}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/DuJJZFDLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/GleerupLTW22, author = {Thomas Gleerup and Wenjuan Li and Jiao Tan and Yu Wang}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {ZoomPass: {A} Zoom-Based Android Unlock Scheme on Smart Devices}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {245--259}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_16}, doi = {10.1007/978-3-031-17551-0\_16}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/GleerupLTW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/HamidiG22, author = {Amirreza Hamidi and Hossein Ghodosi}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Verifiable {DOPE} from Somewhat Homomorphic Encryption, and the Extension to {DOT}}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {105--120}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_7}, doi = {10.1007/978-3-031-17551-0\_7}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/HamidiG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/HongC22, author = {Zhexuan Hong and Jiageng Chen}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {A Solution for the Offline Double-Spending Issue of Digital Currencies}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {455--471}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_30}, doi = {10.1007/978-3-031-17551-0\_30}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/HongC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/HsuM22, author = {Po{-}Chu Hsu and Atsuko Miyaji}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Scalable M+1st-Price Auction with Infinite Bidding Price}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {121--136}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_8}, doi = {10.1007/978-3-031-17551-0\_8}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/HsuM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/JensenJCM22, author = {Wictor Lang Jensen and Sille Jessing and Wei{-}Yang Chiu and Weizhi Meng}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {A Practical Blockchain-Based Maintenance Record System for Better Aircraft Security}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {51--67}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_4}, doi = {10.1007/978-3-031-17551-0\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/JensenJCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/JiaLWL22, author = {Kun Jia and Jiazhi Liu and Wen Wang and Feng Liu}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Hybrid Routing for Efficient Fine-Grained Management of Specific Services in {SDN}}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {170--185}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_11}, doi = {10.1007/978-3-031-17551-0\_11}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/JiaLWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/KangYML22, author = {Yanze Kang and Xiaobo Yu and Weizhi Meng and Yining Liu}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {BlockRAT: An Enhanced Remote Access Trojan Framework via Blockchain}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {21--35}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_2}, doi = {10.1007/978-3-031-17551-0\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/KangYML22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/KasperG22, author = {Daniel Kasper and Jens Grossklags}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {A Hierarchical Macroeconomic Copula Model for Cyber Damages Based on Current Cyber Insurance Prices}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {472--483}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_31}, doi = {10.1007/978-3-031-17551-0\_31}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/KasperG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiTF22, author = {Chen Li and Bibo Tu and Yanchang Feng}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {The Shared Memory Based Cryptographic Card Virtualization}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {137--151}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_9}, doi = {10.1007/978-3-031-17551-0\_9}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/LiTF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LingFDWGY22, author = {Zhiting Ling and Huamin Feng and Xiong Ding and Xuren Wang and Chang Gao and Peian Yang}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {522--538}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_34}, doi = {10.1007/978-3-031-17551-0\_34}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/LingFDWGY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiuHA22, author = {Yi Liu and Yanni Han and Wei An}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {AttVAE: {A} Novel Anomaly Detection Framework for Multivariate Time Series}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {407--420}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_27}, doi = {10.1007/978-3-031-17551-0\_27}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/LiuHA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiuZCL22, author = {Xinyu Liu and Wu Zhao and Langping Chen and Qixu Liu}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {DroidFP: {A} Zero-Permission Detection Framework for Android Devices Based on Gated Recurrent Unit}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {364--374}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_24}, doi = {10.1007/978-3-031-17551-0\_24}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/LiuZCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/NounRZRL22, author = {Hassan Noun and Florian Rehm and Guillaume Zeller and G. Rajesh and Roland Lachmayer}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Integration of Cybersecurity Related Development Processes by Using a Quantification Method}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {233--242}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_15}, doi = {10.1007/978-3-031-17551-0\_15}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/NounRZRL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/PengX22, author = {Chunying Peng and Haixia Xu}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Redactable Blockchain with Fine-Grained Autonomy and Transaction Rollback}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {68--84}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_5}, doi = {10.1007/978-3-031-17551-0\_5}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/PengX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/QinPYTZ22, author = {Wenjie Qin and Chengwei Peng and Tao Yin and Changbo Tian and Guangze Zhao}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {AtNet: {A} Novel Anti-tracking Network with Multi-Party Judgement Capability Based on Cross-Domain Small-World Topology}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {186--200}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_12}, doi = {10.1007/978-3-031-17551-0\_12}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/QinPYTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/QuXS22, author = {Leilei Qu and Ruojin Xiao and Wenchang Shi}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Towards Practical Personalized Security Nudge Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge Effects}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {505--521}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_33}, doi = {10.1007/978-3-031-17551-0\_33}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/QuXS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/RodriguezX22, author = {Rosana Montanez Rodriguez and Shouhuai Xu}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Cyber Social Engineering Kill Chain}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {487--504}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_32}, doi = {10.1007/978-3-031-17551-0\_32}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/RodriguezX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ShresthaLF22, author = {Sulav Lal Shrestha and Taylor Lee and Sebastian Fischmeister}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Metasploit for Cyber-Physical Security Testing with Real-Time Constraints}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {260--275}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_17}, doi = {10.1007/978-3-031-17551-0\_17}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/ShresthaLF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/SiXTZLCH22, author = {Qin Si and Hui Xu and Ying Tong and Yu Zhou and Jian Liang and Lei Cui and Zhiyu Hao}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Malware Detection Using Automated Generation of Yara Rules on Dynamic Features}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {315--330}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_21}, doi = {10.1007/978-3-031-17551-0\_21}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/SiXTZLCH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/SunWYQLLW22, author = {Jiawei Sun and Guangjun Wu and Junnan Yin and Qiang Qian and Junjiao Liu and Jun Li and Yong Wang}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {{HINCDG:} Multi-Meta-Path Graph Auto-Encoders for Mining of Weak Association Malicious Domains}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {393--406}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_26}, doi = {10.1007/978-3-031-17551-0\_26}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/SunWYQLLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangXFGQL22, author = {Bingxu Wang and Gang Xiong and Peipei Fu and Gaopeng Gou and Yingchao Qin and Zhen Li}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {A Two-Stage Method for Fine-Grained {DNS} Covert Tunnel Behavior Detection}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {201--216}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_13}, doi = {10.1007/978-3-031-17551-0\_13}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/WangXFGQL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/XieLS22, author = {Jiang Xie and Shuhao Li and Peishuai Sun}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Analysis and Detection Against Overlapping Phenomenon of Behavioral Attribute in Network Attacks}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {217--232}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_14}, doi = {10.1007/978-3-031-17551-0\_14}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/XieLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/YanXMD22, author = {Chuyi Yan and Haixia Xu and Yongheng Mu and Jiong Ding}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Pitch in: {A} Secure Extension Signature Based on {SM9}}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {87--104}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_6}, doi = {10.1007/978-3-031-17551-0\_6}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/YanXMD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/YangH22, author = {Ling Yang and Huawei Huang}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Adapted {PBFT} Consensus Protocol for Sharded Blockchain}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {36--50}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_3}, doi = {10.1007/978-3-031-17551-0\_3}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/YangH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/YuYYLC22, author = {Jing Yu and Shuguang Yuan and Yulin Yuan and Yafan Li and Chi Chen}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {A k-Anonymity-Based Robust Watermarking Scheme for Relational Database}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {557--573}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_36}, doi = {10.1007/978-3-031-17551-0\_36}, timestamp = {Sat, 27 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/YuYYLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZhaoZSJ22, author = {Guozhu Zhao and Pinchang Zhang and Yulong Shen and Xiaohong Jiang}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {276--284}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_18}, doi = {10.1007/978-3-031-17551-0\_18}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/ZhaoZSJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZouZGKL22, author = {Qian Zou and Ning Zhang and Feng Guo and Qingshan Kong and Zhiqiang Lv}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Multi-region SRAM-Based {TCAM} for Longest Prefix}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {437--452}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_29}, doi = {10.1007/978-3-031-17551-0\_29}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/ZouZGKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scisec/2022, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0}, doi = {10.1007/978-3-031-17551-0}, isbn = {978-3-031-17550-3}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/CharltonDX21, author = {John Charlton and Pang Du and Shouhuai Xu}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {A New Method for Inferring Ground-Truth Labels and Malware Detector Effectiveness Metrics}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {77--92}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_6}, doi = {10.1007/978-3-030-89137-4\_6}, timestamp = {Mon, 15 Aug 2022 09:54:01 +0200}, biburl = {https://dblp.org/rec/conf/scisec/CharltonDX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ChengSCFL21, author = {Hua Cheng and Yinda Shen and Tao Cheng and Yiquan Fang and Jianfan Ling}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {Botnet Detection Based on Multilateral Attribute Graph}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {66--76}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_5}, doi = {10.1007/978-3-030-89137-4\_5}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ChengSCFL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/FanLCYZW21, author = {Yulin Fan and Yang Li and Huajun Cui and Huiran Yang and Yan Zhang and Weiping Wang}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {An Intrusion Detection Framework for IoT Using Partial Domain Adaptation}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {36--50}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_3}, doi = {10.1007/978-3-030-89137-4\_3}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/FanLCYZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LinZLC21, author = {Wei Lin and Shuming Zhou and Min Li and Gaolin Chen}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {Dismantling Interdependent Networks Based on Supra-Laplacian Energy}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {205--213}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_14}, doi = {10.1007/978-3-030-89137-4\_14}, timestamp = {Tue, 12 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/LinZLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiuLL21, author = {Zhaofeng Liu and Wenlian Lu and Yingying Lang}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {An Event-Based Parameter Switching Method for Controlling Cybersecurity Dynamics}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {236--251}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_17}, doi = {10.1007/978-3-030-89137-4\_17}, timestamp = {Tue, 12 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/LiuLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiuWCL21, author = {Zhaofeng Liu and Yinchong Wang and Huashan Chen and Wenlian Lu}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {Simulations of Event-Based Cyber Dynamics via Adversarial Machine Learning}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {187--201}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_13}, doi = {10.1007/978-3-030-89137-4\_13}, timestamp = {Tue, 12 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/LiuWCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/MatthewsSM21, author = {Isaac Matthews and Sadegh Soudjani and Aad van Moorsel}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {171--186}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_12}, doi = {10.1007/978-3-030-89137-4\_12}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/MatthewsSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/MeiYH21, author = {Rui Mei and Han{-}Bing Yan and Zhihui Han}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {RansomLens: Understanding Ransomware via Causality Analysis on System Provenance Graph}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {252--267}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_18}, doi = {10.1007/978-3-030-89137-4\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/MeiYH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/QinMF21, author = {Liangcheng Qin and Ling Ma and Xiongjun Fu}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {DWT-DQFT-Based Color Image Blind Watermark with {QR} Decomposition}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {214--224}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_15}, doi = {10.1007/978-3-030-89137-4\_15}, timestamp = {Tue, 12 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/QinMF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ShenGLLW21, author = {Zhuoxiang Shen and Neng Gao and Zeyi Liu and Min Li and Chuanyin Wang}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {Using Chinese Natural Language to Configure Authorization Policies in Attribute-Based Access Control System}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {110--125}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_8}, doi = {10.1007/978-3-030-89137-4\_8}, timestamp = {Tue, 12 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/ShenGLLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/TangWLBLW21, author = {Zixian Tang and Qiang Wang and Wenhao Li and Huaifeng Bao and Feng Liu and Wen Wang}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {Mining Trojan Detection Based on Multi-dimensional Static Features}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {51--65}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_4}, doi = {10.1007/978-3-030-89137-4\_4}, timestamp = {Fri, 23 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/TangWLBLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/TangYLLWWJL21, author = {Jiyue Tang and Le Yang and Song Liu and Wenmao Liu and Meng Wang and Chonghua Wang and Bo Jiang and Zhigang Lu}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {Caps-LSTM: {A} Novel Hierarchical Encrypted {VPN} Network Traffic Identification Using CapsNet and {LSTM}}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {139--153}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_10}, doi = {10.1007/978-3-030-89137-4\_10}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/TangYLLWWJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangBZ21, author = {Xiaoyu Wang and Tao Bai and Jun Zhao}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {A Data-Free Approach for Targeted Universal Adversarial Perturbation}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {126--138}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_9}, doi = {10.1007/978-3-030-89137-4\_9}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WangBZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangMLGZS21, author = {Chuanyin Wang and Cunqing Ma and Min Li and Neng Gao and Yifei Zhang and Zhuoxiang Shen}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {Protecting Data Privacy in Federated Learning Combining Differential Privacy and Weak Encryption}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {95--109}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_7}, doi = {10.1007/978-3-030-89137-4\_7}, timestamp = {Tue, 12 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/WangMLGZS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangZLLH21, author = {Caimei Wang and Zijian Zhou and Hong Li and Zhengmao Li and Bowen Huang}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {A Multi-level Elastic Encryption Protection Model}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {225--235}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_16}, doi = {10.1007/978-3-030-89137-4\_16}, timestamp = {Tue, 12 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/WangZLLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/Xu21, author = {Shouhuai Xu}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {{SARR:} {A} Cybersecurity Metrics and Quantification Framework (Keynote)}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {3--17}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_1}, doi = {10.1007/978-3-030-89137-4\_1}, timestamp = {Tue, 12 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/Xu21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/YanLBYZS21, author = {Zhaoteng Yan and Zhi Li and Wenping Bai and Nan Yu and Hongsong Zhu and Limin Sun}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {Detecting Internet-Scale Surveillance Devices Using {RTSP} Recessive Features}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {21--35}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_2}, doi = {10.1007/978-3-030-89137-4\_2}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/YanLBYZS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZhangGXLTY21, author = {Hui Zhang and Gaopeng Gou and Gang Xiong and Chang Liu and Yuewen Tan and Ke Ye}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {Multi-granularity Mobile Encrypted Traffic Classification Based on Fusion Features}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {154--170}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_11}, doi = {10.1007/978-3-030-89137-4\_11}, timestamp = {Sat, 20 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/ZhangGXLTY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scisec/2021, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4}, doi = {10.1007/978-3-030-89137-4}, isbn = {978-3-030-89136-7}, timestamp = {Mon, 15 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/0003Y0019, author = {Bin Xia and Junjie Yin and Jian Xu and Yun Li}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {LogGAN: {A} Sequence-Based Generative Adversarial Network for Anomaly Detection Based on System Logs}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {61--76}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_5}, doi = {10.1007/978-3-030-34637-9\_5}, timestamp = {Thu, 12 Dec 2019 16:11:31 +0100}, biburl = {https://dblp.org/rec/conf/scisec/0003Y0019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ChenDC19, author = {Yun Chen and Yunlan Du and Xiaomei Cao}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Density Peak Clustering Algorithm Based on Differential Privacy Preserving}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {20--32}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_2}, doi = {10.1007/978-3-030-34637-9\_2}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ChenDC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ChenIHB19, author = {Qian (Guenevere) Chen and Sheikh Rabiul Islam and Henry Haswell and Robert A. Bridges}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {199--214}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_15}, doi = {10.1007/978-3-030-34637-9\_15}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/ChenIHB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ChenQC19, author = {Tianfu Chen and Zhenghua Qi and Jiagen Cheng}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Fully Anonymous Blockchain Constructed Based on Aggregate Signature and Ring Signature}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {250--261}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_19}, doi = {10.1007/978-3-030-34637-9\_19}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ChenQC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ChenZCW19, author = {Kangyang Chen and Xinyi Zou and Xingguo Chen and Huihui Wang}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {An Automated Online Spam Detector Based on Deep Cascade Forest}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {33--46}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_3}, doi = {10.1007/978-3-030-34637-9\_3}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ChenZCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/HongjiW19, author = {Yin Hongji and Chen Wei}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Knowledge Graph Based Semi-automatic Code Auditing System}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {224--231}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_17}, doi = {10.1007/978-3-030-34637-9\_17}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/HongjiW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/HuangYZW19, author = {Xin Huang and Fei Yan and Liqiang Zhang and Kai Wang}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {HoneyGadget: {A} Deception Based {ROP} Detection Scheme}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {121--135}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_9}, doi = {10.1007/978-3-030-34637-9\_9}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/HuangYZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/JiangX19, author = {Shuai Jiang and Xiaolong Xu}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Application and Performance Analysis of Data Preprocessing for Intrusion Detection System}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {163--177}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_12}, doi = {10.1007/978-3-030-34637-9\_12}, timestamp = {Fri, 19 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/JiangX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiSZJS19, author = {Yinwei Li and Bo Song and Xu Zhang and Guo{-}Ping Jiang and Yurong Song}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {New Robustness Measures of Communication Networks Against Virus Attacks}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {151--162}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_11}, doi = {10.1007/978-3-030-34637-9\_11}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/LiSZJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiZX19, author = {Yuxi Li and Fucai Zhou and Zifeng Xu}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {{PAFR:} Privacy-Aware Friends Retrieval over Online Social Networks}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {323--338}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_24}, doi = {10.1007/978-3-030-34637-9\_24}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LiZX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LingHPLXL19, author = {Hang Ling and Jing Han and Jiayi Pang and Jianwei Liu and Jia Xu and Zheng Liu}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Behavior Flow Graph Construction from System Logs for Anomaly Analysis}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {215--223}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_16}, doi = {10.1007/978-3-030-34637-9\_16}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LingHPLXL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiuHH019, author = {Binghui Liu and Keji Han and Jie Hang and Yun Li}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Adversarial Training Based Feature Selection}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {92--105}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_7}, doi = {10.1007/978-3-030-34637-9\_7}, timestamp = {Wed, 08 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LiuHH019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiuJL19, author = {Zhaofeng Liu and Zhen Jia and Wenlian Lu}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Security Comparison of Machine Learning Models Facing Different Attack Targets}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {77--91}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_6}, doi = {10.1007/978-3-030-34637-9\_6}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LiuJL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/MeiXXLYY19, author = {Lin Mei and Chungen Xu and Lei Xu and Zhongyi Liu and Xiaoling Yu and Zhigang Yao}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Towards Realizing Authorized Encrypted Search with Designed Access Policy}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {293--307}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_22}, doi = {10.1007/978-3-030-34637-9\_22}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/MeiXXLYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/PengDPZM19, author = {Datian Peng and Jianmin Dong and Qinke Peng and Bo Zeng and Zhi{-}Hong Mao}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {FDIA-Identified Overloaded Power Lines}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {262--277}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_20}, doi = {10.1007/978-3-030-34637-9\_20}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/PengDPZM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/QiaoZWY19, author = {Zhi Qiao and Congcong Zhu and Zhiwei Wang and Nianhua Yang}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Anonymous IoT Data Storage and Transaction Protocol Based on Blockchain and Edge Computing}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {181--189}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_13}, doi = {10.1007/978-3-030-34637-9\_13}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/QiaoZWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/TuJS19, author = {Xiao Tu and Guo{-}Ping Jiang and Yurong Song}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Multiplex PageRank in Multilayer Networks Considering Shunt}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {47--58}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_4}, doi = {10.1007/978-3-030-34637-9\_4}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/TuJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangCY19, author = {Zhiwei Wang and Zhiyuan Cheng and Nianhua Yang}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {An ID-Based Linear Homomorphic Cryptosystem and Its Applications for the Isolated Smart Grid Devices}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {339--353}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_25}, doi = {10.1007/978-3-030-34637-9\_25}, timestamp = {Mon, 16 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WangCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangWGHSW19, author = {Yuan Wang and Jinzhi Wang and Jianhong Gao and Shengsheng Hu and Huacheng Sun and Yongli Wang}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Cross-Domain Recommendation System Based on Tensor Decomposition for Cybersecurity Data Analytics}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {3--19}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_1}, doi = {10.1007/978-3-030-34637-9\_1}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WangWGHSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangZKXW19, author = {Shaohui Wang and Yanxuan Zhang and Changbo Ke and Fu Xiao and Ruchuan Wang}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Optimal Key-Tree for {RFID} Authentication Protocols with Storage Constraints}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {278--292}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_21}, doi = {10.1007/978-3-030-34637-9\_21}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WangZKXW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WuYSJT19, author = {Yang Wu and Shikang Yu and Yurong Song and Guoping Jiang and Xiao Tu}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {High-Efficiency Triangle Counting on the {GPU}}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {363--370}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_27}, doi = {10.1007/978-3-030-34637-9\_27}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WuYSJT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/XueXWLX19, author = {Gang Xue and Jia Xu and Hanwen Wu and Weifeng Lu and Lijie Xu}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Incentive Mechanism for Bitcoin Mining Pool Based on Stackelberg Game}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {190--198}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_14}, doi = {10.1007/978-3-030-34637-9\_14}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/XueXWLX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/YaoXXM19, author = {Zhigang Yao and Chungen Xu and Lei Xu and Lin Mei}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Forward Private Searchable Encryption with Conjunctive Keywords Query}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {308--322}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_23}, doi = {10.1007/978-3-030-34637-9\_23}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/YaoXXM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/YuWSJS19, author = {Shikang Yu and Yang Wu and Yurong Song and Guoping Jiang and Xiaoping Su}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Application of DeepWalk Based on Hyperbolic Coordinates on Unsupervised Clustering}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {106--118}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_8}, doi = {10.1007/978-3-030-34637-9\_8}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/YuWSJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZhangLYL19, author = {Zhenchao Zhang and Yali Liu and Xinchun Yin and Xincheng Li}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {A New Pairing-Free Certificateless Signature Scheme for Internet of Things}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {371--379}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_28}, doi = {10.1007/978-3-030-34637-9\_28}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ZhangLYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZhangZ19, author = {Jie Zhang and Zhihao Zhang}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {LET-Attack: Latent Encodings of Normal-Data Manifold Transferring to Adversarial Examples}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {136--150}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_10}, doi = {10.1007/978-3-030-34637-9\_10}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ZhangZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZhengH19, author = {Mengce Zheng and Honggang Hu}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Implicit-Key Attack on the {RSA} Cryptosystem}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {354--362}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_26}, doi = {10.1007/978-3-030-34637-9\_26}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ZhengH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZhouYXW19, author = {Hao Zhou and Geng Yang and Yahong Xu and Weiya Wang}, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Effective Matrix Factorization for Recommendation with Local Differential Privacy}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, pages = {235--249}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9\_18}, doi = {10.1007/978-3-030-34637-9\_18}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/ZhouYXW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scisec/2019, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9}, doi = {10.1007/978-3-030-34637-9}, isbn = {978-3-030-34636-2}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/CaoLH18, author = {Ningyuan Cao and Kun Lv and Changzhen Hu}, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {An Attack Graph Generation Method Based on Parallel Computing}, booktitle = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, pages = {34--48}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1\_3}, doi = {10.1007/978-3-030-03026-1\_3}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scisec/CaoLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ChengDPHFL18, author = {Yexia Cheng and Yuejin Du and Jin Peng and Shen He and Jun Fu and Baoxu Liu}, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {New Security Attack and Defense Mechanisms Based on Negative Logic System and Its Applications}, booktitle = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, pages = {172--180}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1\_12}, doi = {10.1007/978-3-030-03026-1\_12}, timestamp = {Thu, 25 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/ChengDPHFL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/HeY18, author = {Kuan He and Bin Yu}, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {An Inducing Localization Scheme for Reactive Jammer in ZigBee Networks}, booktitle = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, pages = {156--171}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1\_11}, doi = {10.1007/978-3-030-03026-1\_11}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/HeY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/KongL18, author = {Qingshan Kong and Bo Liu}, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {Security and Protection in Optical Networks}, booktitle = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, pages = {115--125}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1\_8}, doi = {10.1007/978-3-030-03026-1\_8}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/KongL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiZFSJ18, author = {Yinwei Li and Zhen{-}Hao Zhang and Dongmei Fan and Yurong Song and Guo{-}Ping Jiang}, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {Influence of Clustering on Network Robustness Against Epidemic Propagation}, booktitle = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, pages = {19--33}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1\_2}, doi = {10.1007/978-3-030-03026-1\_2}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/LiZFSJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiangWZX18, author = {Xiang{-}Qian Liang and Sha{-}sha Wang and Yong{-}hua Zhang and Guang{-}Bao Xu}, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {Multi-party Quantum Key Agreement Against Collective Noise}, booktitle = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, pages = {141--155}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1\_10}, doi = {10.1007/978-3-030-03026-1\_10}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LiangWZX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/LiuQ18, author = {Anyi Liu and Guangzhi Qu}, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {H-Verifier: Verifying Confidential System State with Delegated Sandboxes}, booktitle = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, pages = {126--140}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1\_9}, doi = {10.1007/978-3-030-03026-1\_9}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/LiuQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/PengDJPZM18, author = {Datian Peng and Jianmin Dong and Jianan Jian and Qinke Peng and Bo Zeng and Zhi{-}Hong Mao}, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {Economic-Driven {FDI} Attack in Electricity Market}, booktitle = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, pages = {216--224}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1\_17}, doi = {10.1007/978-3-030-03026-1\_17}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/PengDJPZM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/QiangL18, author = {Hao Qiang and Wenlian Lu}, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {A Note on Dependence of Epidemic Threshold on State Transition Diagram in the {SEIC} Cybersecurity Dynamical System Model}, booktitle = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, pages = {51--64}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1\_4}, doi = {10.1007/978-3-030-03026-1\_4}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/QiangL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/SahaySMJB18, author = {Rishikesh Sahay and D. A. Sepulveda and Weizhi Meng and Christian Damsgaard Jensen and Michael Bruhn Barfod}, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {CyberShip: An SDN-Based Autonomic Attack Mitigation Framework for Ship Systems}, booktitle = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, pages = {191--198}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1\_14}, doi = {10.1007/978-3-030-03026-1\_14}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/SahaySMJB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WangZLCS18, author = {Zhi Wang and Jinli Zhang and Qixu Liu and Xiang Cui and Junwei Su}, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {Practical Metrics for Evaluating Anonymous Networks}, booktitle = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, pages = {3--18}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1\_1}, doi = {10.1007/978-3-030-03026-1\_1}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/WangZLCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WuLLT18, author = {Jiaxi Wu and Xiaotong Lin and Zhiqiang Lin and Yi Tang}, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {A Security Concern About Deep Learning Models}, booktitle = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, pages = {199--206}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1\_15}, doi = {10.1007/978-3-030-03026-1\_15}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WuLLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/YanLZJZ18, author = {Dingyu Yan and Feng Liu and Yaqin Zhang and Kun Jia and Yuantian Zhang}, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic Attacks with Limited Resources}, booktitle = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, pages = {65--80}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1\_5}, doi = {10.1007/978-3-030-03026-1\_5}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/YanLZJZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/Zhang18, author = {Chunming Zhang}, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {Computer Viruses Propagation Model on Dynamic Switching Networks}, booktitle = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, pages = {81--95}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1\_6}, doi = {10.1007/978-3-030-03026-1\_6}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/Zhang18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZhangLH18, author = {Zhengyuan Zhang and Kun Lv and Changzhen Hu}, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {Establishing an Optimal Network Defense System: {A} Monte Carlo Graph Search Method}, booktitle = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, pages = {181--190}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1\_13}, doi = {10.1007/978-3-030-03026-1\_13}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ZhangLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZhangPX18, author = {Chunming Zhang and Junbiao Peng and Jingwei Xiao}, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {Advanced Persistent Distributed Denial of Service Attack Model on Scale-Free Networks}, booktitle = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, pages = {96--112}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1\_7}, doi = {10.1007/978-3-030-03026-1\_7}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ZhangPX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/ZhongYYXWT18, author = {Xiang Zhong and Luxing Yang and Xiaofan Yang and Qingyu Xiong and Junhao Wen and Yuan Yan Tang}, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {Defending Against Advanced Persistent Threat: {A} Risk Management Perspective}, booktitle = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, pages = {207--215}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1\_16}, doi = {10.1007/978-3-030-03026-1\_16}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/ZhongYYXWT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scisec/2018, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1}, doi = {10.1007/978-3-030-03026-1}, isbn = {978-3-030-03025-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.