


default search action
DSC 2022: Edinburgh, UK
- IEEE Conference on Dependable and Secure Computing, DSC 2022, Edinburgh, UK, June 22-24, 2022. IEEE 2022, ISBN 978-1-6654-2141-6

- Robert L. Freas, Heather F. Adair

, Eman M. Hammad
:
An Engineering Process Framework for Cybersecurity Incident Response Assessment. 1-8 - Wei-Loon Mow, Shih-Kun Huang, Hsu-Chun Hsiao:

LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR. 1-8 - Heba Takruri Tamemi, Manar Rabayah, Kareem Abu Raad, Mai Kanaan, Ahmed Awad:

A Low Cost Blockchain-Based Framework for Preserving Critical Data in Health-Care IoT Systems Using Classification. 1-8 - Jason Dejesus, John A. Chandy

:
Cache Locking and Encryption to Prevent Memory Snooping in Embedded Systems. 1-8 - Sharifah Roziah Binti Mohd Kassim, Solahuddin Bin Shamsuddin, Shujun Li

, Budi Arief
:
How National CSIRTs Operate: Personal Observations and Opinions from MyCERT. 1-2 - Upendra Bartwal, Subhasis Mukhopadhyay, Rohit Negi

, Sandeep K. Shukla:
Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots. 1-8 - Rishi Rabheru, Hazim Hanif

, Sergio Maffeis:
A Hybrid Graph Neural Network Approach for Detecting PHP Vulnerabilities. 1-9 - Alexander Köberl, Holger Bock, Christian Steger

:
A Novel Approach for Providing Client-Verifiable and Efficient Access to Private Smart Contracts. 1-8 - Shao-Fu Chen, Yu-Sung Wu:

Linux Kernel Module Development with Rust. 1-2 - Awais Aziz Shah, Ahsan Adeel, Jawad Ahmad, Ahmed Yassin Al-Dubai

, Mandar Gogate, Abhijeet Bishnu, Muhammad Diyan, Tassadaq Hussain, Kia Dashtipour
, Tharm Ratnarajah, Amir Hussain
:
A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids. 1-6 - Qiang Wen, Fumio Machida:

Reliability Models and Analysis for Triple-model with Triple-input Machine Learning Systems. 1-8 - Changgang Zheng, Chen Zhen, Haiyong Xie, Shufan Yang:

Towards Secure Multi-Agent Deep Reinforcement Learning: Adversarial Attacks and Countermeasures. 1-8 - Emma Scott, Sakshyam Panda

, George Loukas, Emmanouil Panaousis:
Optimising user security recommendations for AI-powered smart-homes. 1-8 - Spencer Vecile

, Kyle Lacroix, Katarina Grolinger, Jagath Samarabandu:
Malicious and Benign URL Dataset Generation Using Character-Level LSTM Models. 1-8 - Sudhir Kumar Rai, Ashish Mittal, Sparsh Mittal:

A Node-Embedding Features Based Machine Learning Technique for Dynamic Malware Detection. 1-8 - Nanjiang Xie, Zheng Gong, Yufeng Tang

, Lei Wang, Yamin Wen:
Protecting White-Box Block Ciphers with Galois/Counter Mode. 1-7 - Jawhara Aljabri, Anna Lito Michala

, Jeremy Singer:
ELSA: Edge Lightweight Searchable Attribute-based encryption Multi-keyword Scalability. 1-4 - Thalia Laing, Eduard Marin, Mark D. Ryan, Joshua Schiffman, Gaëtan Wattiau:

Symbolon: Enabling Flexible Multi-device-based User Authentication. 1-12 - Ipshita Roy Chowdhury, Deepayan Bhowmik:

Capturing Malware Behaviour with Ontology-based Knowledge Graphs. 1-7 - Bowen Zhao, Yingjiu Li, Ximeng Liu, HweeHwa Pang

, Robert H. Deng
:
FREED: An Efficient Privacy-Preserving Solution for Person Re-IDentification. 1-8 - Jiang-Yi Zeng, Li-En Chang, Hsin-Hung Cho, Chi-Yuan Chen, Han-Chieh Chao

, Kuo-Hui Yeh
:
Using Poisson Distribution to Enhance CNN-based NB-IoT LDoS Attack Detection. 1-7 - Talal Halabi, Aawista Chaudhry, Sarra M. Alqahtani, Mohammad Zulkernine:

A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments. 1-8 - Zijie Huang

, Yulei Wu:
A Survey on Explainable Anomaly Detection for Industrial Internet of Things. 1-9 - Wai Weng Lo

, Siamak Layeghy
, Mohanad Sarhan, Marcus Gallagher
, Marius Portmann
:
Graph Neural Network-based Android Malware Classification with Jumping Knowledge. 1-9 - Haiyue Yuan, Shujun Li

:
Cyber Security Risks of Net Zero Technologies. 1-11 - Fangwei Wang, Yuanyuan Lu, Qingru Li, Changguang Wang, Yonglei Bai:

A Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation Method. 1-8 - Chun-I Fan, Yen-Lin Lai, Cheng-Han Shie

:
Clustering-Based Network Intrusion Detection System. 1-8 - Mariam Varkey, Jacob John, Umadevi K. S.:

Automated Anomaly Detection Tool for Industrial Control System. 1-6 - Peter T. Breuer:

High Speed Encrypted Computing: Stochastic Confusion and Lies in a Secret Computer. 1-8 - Yufeng Xie, Mingchu Li, Kun Lu, Syed Bilal Hussain Shah, Xiao Zheng:

Multi-task Learning Model based on Multiple Characteristics and Multiple Interests for CTR prediction. 1-7 - Daniel Fraunholz, Richard Schörghofer-Vrinssen, Hartmut König, Richard M. Zahoransky:

Show Me Your Attach Request and I'll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile Networks. 1-8 - Abel O. Gomez Rivera, Evan M. White, Jaime C. Acosta, Deepak K. Tosh

:
Enabling Device Trustworthiness for SDN-Enabled Internet -of- Battlefield Things. 1-7 - Mingchu Li, Linlin Yang, Kun Lu, Syed Bilal Hussain Shah, Xiao Zheng:

Device-to-Device Task Offloading in a Stochastic Invalid-Device Scenario with Social Awareness. 1-7 - Leigh Turnbull, Zhiyuan Tan, Kehinde O. Babaagba:

A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling. 1-9 - Lu Zhang, Reginald Cushing, Paola Grosso

:
Defending OC-SVM based IDS from poisoning attacks. 1-8 - Joshua Streiff, Naheem Noah, Sanchari Das:

A Call for a New Privacy & Security Regime for IoT Smart Toys. 1-8 - Warren Z. Cabral, Leslie F. Sikos, Craig Valli

:
Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization. 1-7 - Chun-I Fan, Cheng-Han Shie

, Che-Ming Hsu, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi:
IoT Botnet Detection Based on the Behaviors of DNS Queries. 1-7 - Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, Akshay Kakkar, Deepak Kushwaha, Paul Park, Peter A. Beling, Edward Bowen:

Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs. 1-8 - Teik Guan Tan, Pawel Szalachowski, Jianying Zhou:

Securing Password Authentication for Web-based Applications. 1-10 - Andrew Scholey

, Pooneh Bagheri Zadeh:
A Digital Forensics Live Suspicious Activity Toolkit To Assist Investigators With Sexual Harm Prevention Order Monitoring. 1-6 - Abdullah Alsalemi, Abbes Amira, Hossein Malekmohamadi

, Kegong Diao:
Facilitating Deep Learning for Edge Computing: A Case Study on Data Classification. 1-4 - Muhammad Omer Shahid, Chuadhry Mujeeb Ahmed

, Venkata Reddy Palleti, Jianying Zhou:
Curse of System Complexity and Virtue of Operational Invariants: Machine Learning based System Modeling and Attack Detection in CPS. 1-8 - Eva Papadogiannaki, Giorgos Tsirantonakis, Sotiris Ioannidis:

Network Intrusion Detection in Encrypted Traffic. 1-8 - Yash Khare, Kumud Lakara, Maruthi Seshidhar Inukonda, Sparsh Mittal, Mahesh Chandra, Arvind Kaushik:

Design and Analysis of Novel Bit-flip Attacks and Defense Strategies for DNNs. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














