default search action
4th SciSec 2022: Matsue, Japan
- Chunhua Su, Kouichi Sakurai, Feng Liu:
Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13580, Springer 2022, ISBN 978-3-031-17550-3
Blockchain and Applications
- Jorge Castillo, Kevin Barba, Qian Chen:
ChainSCAN: A Blockchain-Based Supply Chain Alerting Framework for Food Safety. 3-20 - Yanze Kang, Xiaobo Yu, Weizhi Meng, Yining Liu:
BlockRAT: An Enhanced Remote Access Trojan Framework via Blockchain. 21-35 - Ling Yang, Huawei Huang:
Adapted PBFT Consensus Protocol for Sharded Blockchain. 36-50 - Wictor Lang Jensen, Sille Jessing, Wei-Yang Chiu, Weizhi Meng:
A Practical Blockchain-Based Maintenance Record System for Better Aircraft Security. 51-67 - Chunying Peng, Haixia Xu:
Redactable Blockchain with Fine-Grained Autonomy and Transaction Rollback. 68-84
Cryptography and Applications
- Chuyi Yan, Haixia Xu, Yongheng Mu, Jiong Ding:
Pitch in: A Secure Extension Signature Based on SM9. 87-104 - Amirreza Hamidi, Hossein Ghodosi:
Verifiable DOPE from Somewhat Homomorphic Encryption, and the Extension to DOT. 105-120 - Po-Chu Hsu, Atsuko Miyaji:
Scalable M+1st-Price Auction with Infinite Bidding Price. 121-136 - Chen Li, Bibo Tu, Yanchang Feng:
The Shared Memory Based Cryptographic Card Virtualization. 137-151
Network Security
- Tao Chen, Kun Wen:
Feature Transfer Based Network Anomaly Detection. 155-169 - Kun Jia, Jiazhi Liu, Wen Wang, Feng Liu:
Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN. 170-185 - Wenjie Qin, Chengwei Peng, Tao Yin, Changbo Tian, Guangze Zhao:
AtNet: A Novel Anti-tracking Network with Multi-Party Judgement Capability Based on Cross-Domain Small-World Topology. 186-200 - Bingxu Wang, Gang Xiong, Peipei Fu, Gaopeng Gou, Yingchao Qin, Zhen Li:
A Two-Stage Method for Fine-Grained DNS Covert Tunnel Behavior Detection. 201-216 - Jiang Xie, Shuhao Li, Peishuai Sun:
Analysis and Detection Against Overlapping Phenomenon of Behavioral Attribute in Network Attacks. 217-232 - Hassan Noun, Florian Rehm, Guillaume Zeller, G. Rajesh, Roland Lachmayer:
Integration of Cybersecurity Related Development Processes by Using a Quantification Method. 233-242
Cyber-Physical System
- Thomas Gleerup, Wenjuan Li, Jiao Tan, Yu Wang:
ZoomPass: A Zoom-Based Android Unlock Scheme on Smart Devices. 245-259 - Sulav Lal Shrestha, Taylor Lee, Sebastian Fischmeister:
Metasploit for Cyber-Physical Security Testing with Real-Time Constraints. 260-275 - Guozhu Zhao, Pinchang Zhang, Yulong Shen, Xiaohong Jiang:
Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems. 276-284
Malware
- Yu Ding, Xiaoyu Zhang, Binbin Li, Jian Xing, Qian Qiang, Zisen Qi, Menghan Guo, Siyu Jia, Haiping Wang:
Malware Classification Based on Semi-Supervised Learning. 287-301 - Xiao Chen, Zhengwei Jiang, Shuwei Wang, Rongqi Jing, Chen Ling, Qiuyun Wang:
Malware Detected and Tell Me Why: An Verifiable Malware Detection Model with Graph Metric Learning. 302-314 - Qin Si, Hui Xu, Ying Tong, Yu Zhou, Jian Liang, Lei Cui, Zhiyu Hao:
Malware Detection Using Automated Generation of Yara Rules on Dynamic Features. 315-330
Mobile System Security
- Khalid Alkhattabi, Davita Bird, Kai Miller, Chuan Yue:
Question Answering Models for Privacy Policies of Mobile Apps: Are We There Yet? 333-352 - Hung-Yu Chien:
Design of End-To-End Security for MQTT 5.0. 353-363 - Xinyu Liu, Wu Zhao, Langping Chen, Qixu Liu:
DroidFP: A Zero-Permission Detection Framework for Android Devices Based on Gated Recurrent Unit. 364-374
System and Web Security
- Othmane Belarbi, Aftab Khan, Pietro Edoardo Carnelli, Theodoros Spyridopoulos:
An Intrusion Detection System Based on Deep Belief Networks. 377-392 - Jiawei Sun, Guangjun Wu, Junnan Yin, Qiang Qian, Junjiao Liu, Jun Li, Yong Wang:
HINCDG: Multi-Meta-Path Graph Auto-Encoders for Mining of Weak Association Malicious Domains. 393-406 - Yi Liu, Yanni Han, Wei An:
AttVAE: A Novel Anomaly Detection Framework for Multivariate Time Series. 407-420 - Xiangyu Du, Zhengwei Jiang, Jun Jiang, Kai Zhang, Zijing Fan, Fangming Dong, Ning Li, Baoxu Liu:
BASNEA: Threat Hunting for Ethereum Smart Contract Based on Backtrackless Aligned-Spatial Network Entity Alignment. 421-436 - Qian Zou, Ning Zhang, Feng Guo, Qingshan Kong, Zhiqiang Lv:
Multi-region SRAM-Based TCAM for Longest Prefix. 437-452
Security in Financial Industry
- Zhexuan Hong, Jiageng Chen:
A Solution for the Offline Double-Spending Issue of Digital Currencies. 455-471 - Daniel Kasper, Jens Grossklags:
A Hierarchical Macroeconomic Copula Model for Cyber Damages Based on Current Cyber Insurance Prices. 472-483
Social Engineering and Personalized Security
- Rosana Montanez Rodriguez, Shouhuai Xu:
Cyber Social Engineering Kill Chain. 487-504 - Leilei Qu, Ruojin Xiao, Wenchang Shi:
Towards Practical Personalized Security Nudge Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge Effects. 505-521 - Zhiting Ling, Huamin Feng, Xiong Ding, Xuren Wang, Chang Gao, Peian Yang:
Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement. 522-538
Privacy and Anonymity
- Huajun Cui, Guozhu Meng, Yan Zhang, Weiping Wang, Dali Zhu, Ting Su, Xiaodong Zhang, Yuejun Li:
TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps. 541-556 - Jing Yu, Shuguang Yuan, Yulin Yuan, Yafan Li, Chi Chen:
A k-Anonymity-Based Robust Watermarking Scheme for Relational Database. 557-573
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.