


default search action
52nd DSN 2022: Baltimore, MD, USA - Workshops
- 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN Workshops 2022, Baltimore, MD, USA, June 27-30, 2022. IEEE 2022, ISBN 978-1-6654-0262-0

- Aawista Chaudhry, Talal Halabi

, Mohammad Zulkernine:
Stealthy Data Corruption Attack Against Road Traffic Congestion Avoidance Applications. 1-7 - Marcello Cinque, Luigi De Simone

, Andrea Marchetta:
Certify the Uncertified: Towards Assessment of Virtualization for Mixed-criticality in the Automotive Domain. 8-11 - Connor Sexton, Joseph Callenes:

Tiny Black Boxes: A nano-Drone Safety Architecture. 12-19 - Sidney La Fontaine, Naveen Muralidhar, Michael Clifford, Tina Eliassi-Rad, Cristina Nita-Rotaru:

Alternative Route-Based Attacks in Metropolitan Traffic Systems. 20-27 - John Mern, Kyle Hatch, Ryan Silva, Cameron Hickert, Tamim Sookoor

, Mykel J. Kochenderfer:
Autonomous Attack Mitigation for Industrial Control Systems. 28-36 - Shu Liu, Yanlei Shang:

Federated Learning with Anomaly Client Detection and Decentralized Parameter Aggregation. 37-43 - Xugui Zhou, Maxfield Kouzel, Homa Alemzadeh:

Robustness Testing of Data and Knowledge Driven Anomaly Detection in Cyber-Physical Systems. 44-51 - Saba Amiri, Adam Belloum, Eric T. Nalisnick, Sander Klous, Leon Gommans:

On the impact of non-IID data on the performance and fairness of differentially private federated learning. 52-58 - Arunava Roy, Dipankar Dasgupta:

A Robust Framework for Adaptive Selection of Filter Ensembles to Detect Adversarial Inputs. 59-67 - Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan:

Towards Building Resilient Ensembles against Training Data Faults. 68-69 - Avraham Shinnar, Barry M. Trager:

General Probability in Coq. 70-71 - Sahiti Bommareddy, Benjamin Gilby, Maher Khan, Imes Chiu, Mathaios Panteli, John W. van de Lindt, Linton Wells, Yair Amir, Amy Babay

:
Data-Centric Analysis of Compound Threats to Critical Infrastructure Control Systems. 72-79 - Stephan Kleber

, Frank Kargl, Milan Stute, Matthias Hollick
:
Network Message Field Type Clustering for Reverse Engineering of Unknown Binary Protocols. 80-87 - João R. Campos

, Ernesto Costa, Marco Vieira
:
A Dataset of Linux Failure Data for Dependability Evaluation and Improvement. 88-95 - Junzhe Wang, Lannan Luo:

Privacy Leakage Analysis for Colluding Smart Apps. 96-102 - Tina Moghaddam

, Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson, Dan Dongseong Kim
:
A Practical Security Evaluation of a Moving Target Defence against Multi-Phase Cyberattacks. 103-110 - Kai Huang, Su Yang, Hongyu Sun, Chengyi Sun, Xuejun Li, Yuqing Zhang:

Repairing Security Vulnerabilities Using Pre-trained Programming Language Models. 111-116 - Haonan Yang, Yongchao Zhong, Bo Yang, Yiyu Yang, Zifeng Xu, Longjuan Wang, Yuqing Zhang:

An Overview of Sybil Attack Detection Mechanisms in VFC. 117-122 - Qinghan Lai, Shuai Ding, Jinghao Gong, Jin'an Cui, Song Liu:

A Chinese Multi-modal Relation Extraction Model for Internet Security of Finance. 123-128 - Xudong Cao, Tianwei Liu, Jiayuan Zhang, Mengyue Feng, Xin Zhang, Wanying Cao, Hongyu Sun, Yuqing Zhang:

SbrPBert: A BERT-Based Model for Accurate Security Bug Report Prediction. 129-134 - Guangxia Xu, Li Wang:

SCUC-DSAC: A Data Sharing Access Control Model Based on Smart Contract and User Credit. 135-140 - Yuhao Lin, Ying Li, Mianxue Gu, Hongyu Sun, Qiuling Yue, Jinglu Hu, Chunjie Cao, Yuqing Zhang:

Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey. 141-146 - Junfeng Tian, Ruxin Bai, Tianfeng Zhang:

Multi-authoritative Users Assured Data Deletion Scheme in Cloud Computing. 147-154 - Wenbin Yao, Longcan Hu, Yingying Hou, Xiaoyong Li:

A Two-Layer Soft-Voting Ensemble Learning Model For Network Intrusion Detection. 155-161 - Seth Lyles, Mark Desantis, John Donaldson, Micaela Gallegos, Hannah Nyholm, Claire Taylor, Kristine Monteith:

Machine Learning Analysis of Memory Images for Process Characterization and Malware Detection. 162-169 - Junfeng Tian, Qianqian Song, Haoning Wang:

Blockchain-Based Incentive and Arbitrable Data Auditing Scheme. 170-177 - Menghan Wang, Libin Yang, Wei Lou:

A Comprehensive Dynamic Quality Assessment Method for Cyber Threat Intelligence. 178-181 - Ruizhong Du, Yan Gao:

DTC: A Dynamic Trusted Collaboration Architecture for Mobile Edge Computing. 182-185 - Xin Zhang, Hongyu Sun, Zhipeng He, Mianxue Gu, Jingyu Feng, Yuqing Zhang:

VDBWGDL: Vulnerability Detection Based On Weight Graph And Deep Learning. 186-190 - Jiawei Wu, Xiuquan Qiao, Huijuan Lu:

Dynamic Multipath Routing Mechanism for Multimedia Data Flow Scheduling Over Software Defined Networks. 191-198

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














