Science of Cyber Security
Science of Cyber Security
6th International Conference, SciSec 2024, Copenhagen, Denmark, August 14-16, 2024, Proceedings
Zhao, Jun; Meng, Weizhi
Springer Nature Switzerland AG
03/2025
467
Mole
9789819624164
Pré-lançamento - envio 15 a 20 dias após a sua edição
.- Identifying Ransomware Functions through Microarchitectural Side-channel Analysis.
.- STARMAP: Multi-machine Malware Analysis System for Lateral Movement Observation.
.- LogSHIELD: A Graph-based Real-time Anomaly Detection Framework using Frequency Analysis.
.- Completeness Analysis of Mobile Apps' Privacy Policies by Using Deep Learning.
.- Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails.
.- Matching Knowledge Graphs for Cybersecurity Countermeasures Selection.
.- Graph-Based Profiling of Dependency Vulnerability Remediation.
.- Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails.
.- An Enhanced Firewall for IoT Security.
.- Exploring the Effects of Cybersecurity Awareness and Decision-Making Under Risk.
.- SVSM-KMS: Safeguarding Keys for Cloud Services with Encrypted Virtualization.
.- GNNexPIDS: An Interpretation Method for Provenance-based Intrusion Detection Based on GNNExplainer.
.- Performance Evaluation of Lightweight Cryptographic Ciphers on ARM Processor for IoT Deployments.
.- AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees.
.- FAF-BM: An Approach for False Alerts Filtering using BERT Model with Semi-supervised Active Learning.
.- Smart Home Cyber Insurance Pricing.
.- Exhaustive Exploratory Analysis of Low Degree Maximum Period NLFSRs By Graph Analysis.
.- Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model.
.- Multi-Modal Multi-Task Tiered Expert (M3TTE): An Effective Method for CDN Website Classification.
.- Malware Variant Detection Based on Knowledge Transfer and Ensemble Learning.
.- An Efficient IOC-Driven BigData Tracing and Backtracking Model for Emergency Response.
.- Integrating CP-ABE and Device Fingerprint into Federated Learning.
.- Automatic Alert Categories Standardization for Heterogeneous Devices with Incomplete Semantic Knowledge Based on LSTM.
.- Family Similarity-Enhanced Implicit Data Augmentation for Malware Classification.
.- Identifying Ransomware Functions through Microarchitectural Side-channel Analysis.
.- STARMAP: Multi-machine Malware Analysis System for Lateral Movement Observation.
.- LogSHIELD: A Graph-based Real-time Anomaly Detection Framework using Frequency Analysis.
.- Completeness Analysis of Mobile Apps' Privacy Policies by Using Deep Learning.
.- Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails.
.- Matching Knowledge Graphs for Cybersecurity Countermeasures Selection.
.- Graph-Based Profiling of Dependency Vulnerability Remediation.
.- Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails.
.- An Enhanced Firewall for IoT Security.
.- Exploring the Effects of Cybersecurity Awareness and Decision-Making Under Risk.
.- SVSM-KMS: Safeguarding Keys for Cloud Services with Encrypted Virtualization.
.- GNNexPIDS: An Interpretation Method for Provenance-based Intrusion Detection Based on GNNExplainer.
.- Performance Evaluation of Lightweight Cryptographic Ciphers on ARM Processor for IoT Deployments.
.- AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees.
.- FAF-BM: An Approach for False Alerts Filtering using BERT Model with Semi-supervised Active Learning.
.- Smart Home Cyber Insurance Pricing.
.- Exhaustive Exploratory Analysis of Low Degree Maximum Period NLFSRs By Graph Analysis.
.- Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model.
.- Multi-Modal Multi-Task Tiered Expert (M3TTE): An Effective Method for CDN Website Classification.
.- Malware Variant Detection Based on Knowledge Transfer and Ensemble Learning.
.- An Efficient IOC-Driven BigData Tracing and Backtracking Model for Emergency Response.
.- Integrating CP-ABE and Device Fingerprint into Federated Learning.
.- Automatic Alert Categories Standardization for Heterogeneous Devices with Incomplete Semantic Knowledge Based on LSTM.
.- Family Similarity-Enhanced Implicit Data Augmentation for Malware Classification.