Science of Cyber Security

Science of Cyber Security

4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers

Liu, Feng; Sakurai, Kouichi; Su, Chunhua

Springer International Publishing AG

09/2022

576

Mole

Inglês

9783031175503

15 a 20 dias

Descrição não disponível.
?Blockchain and Applications.- ChainSCAN: A Blockchain-based Supply Chain Alerting Framework for Food Safety.- BlockRAT: An Enhanced Remote Access Trojan Framework via Blockchain.- Adapted PBFT Consensus Protocol for Sharded Blockchain.- A Practical Blockchain-based Maintenance Record System for Better Aircraft Security.- Redactable Blockchain with Fine-Grained Autonomy and Transaction Rollback.- Cryptography and Applications.- Pitch in: A Secure Extension Signature based on SM9.- Verifiable DOPE from Semi-homomorphic Encryption, and the Extension to DOT.- Scalable M+1st-Price Auction with Infinite Bidding Price.- The Shared Memory based Cryptographic Card Virtualization.- Network Security.- Feature Transfer based Network Anomaly Detection.- Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN.- AtNet: A Novel Anti-tracking Network with Multi-party JudgementCapability based on Cross-domain Small-world Topology.- A Two-stage Method for Fine-grained DNS Covert Tunnel Behavior Detection.- Analysis and Detection against Overlapping Phenomenon of Behavioral Attribute in Network Attacks.- Integration of Cybersecurity related Development Processes by using a Quantification Method.- Cyber-Physical System.- ZoomPass: A Zoom-based Android Unlock Scheme on Smart Devices.- Metasploit for Cyber-Physical Security Testing with Real-Time Constraints.- Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems.- Malware.- Malware Classification Based on Semi-Supervised Learning.- Malware detected and tell me why: An verifiable malware detection model with graph metric learning.- Malware Detection using Automated Generation of Yara rules on Dynamic Features.- Mobile System Security.- Question Answering Models For Privacy Policies of Mobile Apps: Are We There Yet?.- Design of End-to-End Security for MQTT 5.0.- DroidFP: A Zero-Permission Detection Framework for Android Device Based on Gated Recurrent Unit.- System and Web Security.- An Intrusion Detection System based on Deep Belief Networks.- HINCDG: Multi-Meta-Path Graph Auto-Encoders for Mining of Weak Association Malicious Domains.- AttVAE: A Novel Anomaly Detection Framework for Multivariate Time Series.- BASNEA: Threat Hunting for Ethereum Smart Contract based on Backtrackless Aligned-Spatial Network Entity Alignment.- Multi-region SRAM-Based TCAM for Longest Prefix.- Security in Financial Industry.- A solution for the offline double-spending issue of digital currencies.- A Hierarchical Macroeconomic Copula Model for Cyber Damages based on current Cyber Insurance Prices.- Social Engineering and Personalized Security.- Cyber Social Engineering Kill Chain.- Towards Practical Personalized Security Nudge Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge Effects.- Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement.- Privacy and Anonymity.- TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps.- A k-anonymity-based Robust Watermarking Scheme for Relational Database.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
artificial intelligence;authentication;communication systems;computer crime;computer hardware;computer networks;computer security;computer systems;data communication systems;data security;distributed computer systems;network protocols;network security;signal processing;telecommunication networks;telecommunication systems;wireless telecommunication systems