default search action
17th SecureComm 2021: Virtual Event
- Joaquín García-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung:
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 398, Springer 2021, ISBN 978-3-030-90018-2
Cyber Threats and Defence
- Renzheng Wei, Lijun Cai, Lixin Zhao, Aimin Yu, Dan Meng:
DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting. 3-24 - Pejman Najafi, Feng Cheng, Christoph Meinel:
SIEMA: Bringing Advanced Analytics to Legacy Security Information and Event Management. 25-43 - Yuheng Wei, Futai Zou:
Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces. 44-61 - Philip Dale Huff, Qinghua Li:
Towards Automated Assessment of Vulnerability Exposures in Security Operations. 62-81 - Jaime C. Acosta, Luisana Clarke, Stephanie Medina, Monika Akbar, Mahmud Shahriar Hossain, Frederica Free-Nelson:
Repeatable Experimentation for Cybersecurity Moving Target Defense. 82-99 - Yongsheng Mei, Kailash Gogineni, Tian Lan, Guru Venkataramani:
MPD: Moving Target Defense Through Communication Protocol Dialects. 100-119
Blockchain and P2P Security
- Andriy Panchenko, Asya Mitseva, Torsten Ziemann, Till Hering:
GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy Networks. 123-143 - Mohammadreza Ashouri:
An Extensive Security Analysis on Ethereum Smart Contracts. 144-163 - Philip Dale Huff, Qinghua Li:
A Distributed Ledger for Non-attributable Cyber Threat Intelligence Exchange. 164-184
AI and Security/Privacy
- Narges Ashena, Daniele Dell'Aglio, Abraham Bernstein:
Understanding ε for Differential Privacy in Differencing Attack Scenarios. 187-206 - Abderrahmen Amich, Birhanu Eshete:
Explanation-Guided Diagnosis of Machine Learning Evasion Attacks. 207-228 - Qi Xia, Zeyi Tao, Qun Li:
ToFi: An Algorithm to Defend Against Byzantine Attacks in Federated Learning. 229-248 - Lipeng Wan, Fangyu Zheng, Jingqiang Lin:
TESLAC: Accelerating Lattice-Based Cryptography with AI Accelerator. 249-269 - Xiaoyi Duan, You Li, Jianmin Tong, Xiuying Li, Siman He, Peishu Zhang:
Research of CPA Attack Methods Based on Ant Colony Algorithm. 270-286 - Kaiyun Pan, Daojing He, Chuan Xu:
Local Model Privacy-Preserving Study for Federated Learning. 287-307
Applied Cryptography
- Ryan Karl, Jonathan Takeshita, Taeho Jung:
Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Non-interactive Fault Recovery. 311-331 - Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung:
Cryptonomial: A Framework for Private Time-Series Polynomial Calculations. 332-351 - Jonathan Takeshita, Ryan Karl, Alamin Mohammed, Aaron Striegel, Taeho Jung:
Provably Secure Contact Tracing with Conditional Private Set Intersection. 352-373 - Enrico Branca, Farzaneh Abazari, Ronald Rivera Carranza, Natalia Stakhanova:
Origin Attribution of RSA Public Keys. 374-396
Network Security
- Lijia Xie, Shuang Zhao, Xiao Zhang, Yiming Shi, Xin Xiao, Zhiming Zheng:
Fine-Grained Intra-domain Bandwidth Allocation Against DDoS Attack. 399-417 - Panpan Zhao, Gaopeng Gou, Chang Liu, Yangyang Guan, Mingxin Cui, Gang Xiong:
TMT-RF: Tunnel Mixed Traffic Classification Based on Random Forest. 418-437 - Carlos Silva, Bruno Sousa, João P. Vilela:
CROCUS: An Objective Approach for SDN Controllers Security Assessment. 438-455 - Henry Clausen, Robert Flood, David Aspinall:
Controlling Network Traffic Microstructures for Machine-Learning Model Probing. 456-475 - Martin Fejrskov, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
Using NetFlow to Measure the Impact of Deploying DNS-based Blacklists. 476-496
Digital Forensics
- M. A. Hannan Bin Azhar, German Abadia:
A Forensic Tool to Acquire Radio Signals Using Software Defined Radio. 499-512 - Mohammad Kavousi, Runqing Yang, Shiqing Ma, Yan Chen:
SemFlow: Accurate Semantic Identification from Low-Level System Data. 513-535
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.