Science of Cyber Security

Science of Cyber Security

6th International Conference, SciSec 2024, Copenhagen, Denmark, August 14-16, 2024, Proceedings

Zhao, Jun; Meng, Weizhi

Springer Nature Switzerland AG

03/2025

467

Mole

9789819624164

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
.- A Novel Scoring Algorithm Against HID Attacks Based on Static Text Feature Matching.


.- Identifying Ransomware Functions through Microarchitectural Side-channel Analysis.


.- STARMAP: Multi-machine Malware Analysis System for Lateral Movement Observation.


.- LogSHIELD: A Graph-based Real-time Anomaly Detection Framework using Frequency Analysis.


.- Completeness Analysis of Mobile Apps' Privacy Policies by Using Deep Learning.


.- Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails.


.- Matching Knowledge Graphs for Cybersecurity Countermeasures Selection.


.- Graph-Based Profiling of Dependency Vulnerability Remediation.


.- Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails.


.- An Enhanced Firewall for IoT Security.


.- Exploring the Effects of Cybersecurity Awareness and Decision-Making Under Risk.


.- SVSM-KMS: Safeguarding Keys for Cloud Services with Encrypted Virtualization.


.- GNNexPIDS: An Interpretation Method for Provenance-based Intrusion Detection Based on GNNExplainer.


.- Performance Evaluation of Lightweight Cryptographic Ciphers on ARM Processor for IoT Deployments.


.- AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees.


.- FAF-BM: An Approach for False Alerts Filtering using BERT Model with Semi-supervised Active Learning.


.- Smart Home Cyber Insurance Pricing.


.- Exhaustive Exploratory Analysis of Low Degree Maximum Period NLFSRs By Graph Analysis.


.- Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model.


.- Multi-Modal Multi-Task Tiered Expert (M3TTE): An Effective Method for CDN Website Classification.


.- Malware Variant Detection Based on Knowledge Transfer and Ensemble Learning.


.- An Efficient IOC-Driven BigData Tracing and Backtracking Model for Emergency Response.


.- Integrating CP-ABE and Device Fingerprint into Federated Learning.


.- Automatic Alert Categories Standardization for Heterogeneous Devices with Incomplete Semantic Knowledge Based on LSTM.


.- Family Similarity-Enhanced Implicit Data Augmentation for Malware Classification.
Cybersecurity Awareness;Cryptography;Privacy;Intrusion Detection;Malware Analysis;Threat Management;IoT Security;Blockchain Security;Vulnerability Remediation;AI in Cybersecurity;Data Augmentation;Network Security