


default search action
8th CSNet 2024: Paris, France
- 8th Cyber Security in Networking Conference, CSNet 2024, Paris, France, December 4-6, 2024. IEEE 2024, ISBN 979-8-3315-3410-3

- Sana Ullah, Shanshan Tu, Akhtar Badshah, Muhammad Waqas:

A Robust Anonymous Authentication Scheme for Securing IoT-Enabled Healthcare Services. 1-6 - Henry Chima Ukwuoma

, Gilles Dusserre, Gouenou Coatrieux, Johanne Vincent, Nasir Baba Ahmed:
Optimising Intrusion Detection in Cyber-Physical Systems. 7-14 - Zaid Allal, Hassan Noura, Ola Salman, Ali Chehab:

Advanced Anomaly Detection in Energy Control Systems Using Machine Learning and Feature Engineering. 15-21 - Walid El Gadal, Sudhakar Ganti:

Dynamic Defense Framework: A Unified Approach for Intrusion Detection and Mitigation in SDN. 22-27 - Betül Güvenç Paltun, Ramin Fuladi:

Introspective Intrusion Detection System Through Explainable AI. 28-32 - Zakaria Alomari, Zhida Li, Adetokunbo Makanju:

Lightweight Machine Learning-Based IDS for IoT Environments. 33-37 - Saeid Sheikhi, Panos Kostakos, Susanna Pirttikangas:

Effective Anomaly Detection in 5G Networks via Transformer-Based Models and Contrastive Learning. 38-43 - Fatemeh Stodt

, Philipp Ruf, Christoph Reich
:
Blockchain-Enabled Digital Product Passports for Enhancing Security and Lifecycle Management in Healthcare Devices. 44-51 - Adrián Guayasamín, Walter Fuertes, Nahir Carrera, Luis Tello-Oquendo, Valeria Suango:

Blockchain-Enhanced E-Ticket Distribution System to Effective Transactions, Validation, and Audits. 52-59 - Ali Jalooli, Huzaif Khan, Lokesh Purohit:

Blockchain-Enabled Collaborative Forged Message Detection in RSU-Based VANETs. 60-67 - Majd Latah, Kübra Kalkan:

SDN-API-Sec: A Conflict-Free BC-Based Authorization for Cross-Domain SDNs. 68-75 - Halvor Nybø Risto, Steven Bos

, Olaf Hallan Graven:
Keystroke Dynamics Authentication with MLP, CNN, and LSTM on a Fixed-Text Data Set. 76-82 - Stefan Machmeier, Vincent Heuveline

:
Detecting DNS Tunnelling and Data Exfiltration Using Dynamic Time Warping. 83-91 - Yuan-Chen Chang, Esma Aïmeur:

Chat or Trap? Detecting Scams in Messaging Applications with Large Language Models. 92-99 - Ioannis Arakas, Nikolaos Myrtakis, Thomas Marchioro, Evangelos P. Markatos:

Ransomwise: A Transaction-Based Dataset for Ransomware Bitcoin Wallet Detection. 100-107 - Zi Heng Phang, Wei Ming Tan, Joshua Sheng Xiong Choo, Zhi Kang Ong, Weng Hong Isaac Tan, Huaqun Guo:

VishGuard: Defending Against Vishing. 108-115 - Robin Chataut, Aadesh Upadhyay, Yusuf Usman, Mary Nankya, Prashnna K. Gyawali:

Spam No More: A Cross-Model Analysis of Machine Learning Techniques and Large Language Model Efficacies. 116-122 - Rizwan Ahmed Kango, Mehak Fatima Qureshi, Wai-Yiu Keung, Umair Mujtaba Qureshi, Zuneera Umair, Ho Chuen Kam:

Predicting User Activities and Device Interactions Using Adversarial Sensor Data: A Machine Learning Approach. 123-127 - Dhia Ben Ali, Mohamed Belaoued, Samir Dawaliby:

Anticipating Cyber Threats: Deep Learning Approaches for DDoS Attacks Forecasting. 128-132 - Ornella Lucresse Soh, Issa Traoré, Isaac Woungang, Wei Lu, Marcelo L. Brocardo:

Identifying APT Attack Stages Using Anomaly Score Calibration. 133-137 - Roberto O. Andrade, Jenny Torres, Pamela Flores, Erick Cabezas, Jorge Segovia:

Convergence of AI for Secure Software Development. 138-142 - Believe Ayodele

, Victor Buttigieg:
A Multi-Level Network Traffic Classification in Combating Cyberattacks Using Stack Deep Learning Models. 143-146 - Binh Le Thanh Thai, Tsubasa Takii, Hidema Tanaka:

Password Classification Using Machine Learning and Natural Language Processing Techniques: Methods and Evaluations. 147-150 - Jun Peng, Derick Kwok, Huaqun Guo:

Detecting Spam Emails Using Machine Learning and Lemmatization vs Traditional Methods. 151-152 - Anika Maisha Tasnim, Amrin Hassan Heya, Md Maraj Rashid, Nafis Shahriar, Raqeebir Rab, Abderrahmane Leshob:

A Machine Learning Approach of Predicting Ransomware Addresses in BlockChain Networks. 153-156 - Bilel Saghrouchni, Frédéric Le Mouël, Bogdan Szanto:

Towards an Unsupervised Reward Function for a Deep Reinforcement Learning Based Intrusion Detection System. 157-160 - Guy Pujolle, Pascal Urien:

A New Generation of Security for the 6G. 161-164 - Thomas Rosenstatter

, Christian Schäfer, Olaf Saßnick, Stefan Huber:
AsIf: Asset Interface Analysis of Industrial Automation Devices. 165-172 - Beny Nugraha, Abhishek Venkatesh Jnanashree, Thomas Bauschert:

An Efficient Explainable Artificial Intelligence (XAI)-Based Framework for a Robust and Explainable IDS. 173-181 - Ferhat Karakoç, Betül Güvenç Paltun, Leyli Karaçay, Ömer Faruk Tuna, Ramin Fuladi, Utku Gülen:

FASIL: A Challenge-Based Framework for Secure and Privacy-Preserving Federated Learning. 182-189 - Jayanthi Ramamoorthy, Cihan Varol, Narasimha K. Shashidhar:

APT Warfare: Technical Arsenal and Target Profiles of Linux Malware in Advanced Persistent Threats. 190-196 - Fatema El Husseini, Hassan Noura, Flavien Vernier:

Security and Privacy-Preserving for Machine Learning Models: Attacks, Countermeasures, and Future Directions. 197-204 - Antonin Verdier

, Romain Laborde, Abir Laraba, Abdelmalek Benzekri:
DID U Misbehave? A New Dataset for In-Depth Understanding of Inconspicuous Software. 205-212 - Ivana Burgetova, Ondrej Rysavý, Petr Matousek:

Towards Identification of Network Applications in Encrypted Traffic. 213-221 - Andrew Bengtson, Christopher Rouff, Ali Tekeoglu:

An Autonomic Chess Bot Detection & Defeat System. 222-227 - Prathibha Keshavamurthy, Sarvesh Kulkarni:

A Hybrid Machine Learning - Fuzzy Cognitive Map Approach for Fast, Reliable DDoS Attack Detection. 228-235 - Tushar Gupta

:
Kubernetes-Driven Network Security for Distributed ACL Management. 236-242 - David A. Cordova Morales, Ahmad Samer Wazan, Romain Laborde, Muhammad Imran Taj, Adib Habbal, Gina Gallegos-García:

Towards the Removal of Identification and Authentication Authority from IM Systems. 243-247 - Wael Alsabbagh

, Samuel Amogbonjaye, Chaerin Kim, Peter Langendörfer:
Pirates of the MQTT: Raiding IIoT Systems with a Rogue Client. 248-253 - Salah Dine Maham, Guy Pujolle, Atiq Ahmed, Dominique Gaïti:

A New Similarity-Based Classification Scheme of Drone Network Attacks. 254-258 - Ilham Laabab, Abdellatif Ezzouhairi, Nour El Madhoun, Muhammad Haris Khan:

Blockchain and Biometric Systems Integration for IoMT Security. 259-262 - Massimo Morello, Petri Sainio, Mohammed B. Alshawki:

Regulatory Compliance Verification: A Privacy Preserving Approach. 263-267 - Thijs Van Ede, Trix Mulder, Evgeni Moyakine

:
Interdisciplinary Research Project 'AI Shield'. 268-271 - Jörn Bodenhausen, Laurenz Grote, Michael Rademacher, Martin Henze:

Adaptive Optimization of TLS Overhead for Wireless Communication in Critical Infrastructure. 272-275 - Enes Begecarslan, Burcu Ozbay:

A Situational Assessment Module for CCAM Applications. 276-277 - Patricio Zambrano, Jenny Torres, Carlos E. Anchundia, Johan Illicachi

:
Mobbing: AI-Powered Cyberthreat Behavior Analysis and Modeling. 278-281 - Emmanuel Song Shombot

, Gilles Dusserre, Robert Bestak, Nasir Baba Ahmed:
Cross ML for Io(H)T Network Traffic Classification: A New Approach Towards Standardization. 282-288 - Fatemeh Erfan, Mohammad Yahyatabar, Martine Bellaïche, Talal Halabi:

Advanced Smart Contract Vulnerability Detection Using Large Language Models. 289-296 - Fatema El Husseini, Hassan Noura, Ola Salman, Ali Chehab:

Advanced Machine Learning Approaches for Zero-Day Attack Detection: A Review. 297-304 - Kamal Singh, Rohit Saxena

, Brijesh Kumar
:
AI Security: Cyber Threats and Threat-Informed Defense. 305-312

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














