


default search action
4th SciSec 2022: Matsue, Japan
- Chunhua Su

, Kouichi Sakurai, Feng Liu:
Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13580, Springer 2022, ISBN 978-3-031-17550-3
Blockchain and Applications
- Jorge Castillo

, Kevin Barba
, Qian Chen
:
ChainSCAN: A Blockchain-Based Supply Chain Alerting Framework for Food Safety. 3-20 - Yanze Kang, Xiaobo Yu, Weizhi Meng

, Yining Liu
:
BlockRAT: An Enhanced Remote Access Trojan Framework via Blockchain. 21-35 - Ling Yang, Huawei Huang:

Adapted PBFT Consensus Protocol for Sharded Blockchain. 36-50 - Wictor Lang Jensen, Sille Jessing, Wei-Yang Chiu

, Weizhi Meng
:
A Practical Blockchain-Based Maintenance Record System for Better Aircraft Security. 51-67 - Chunying Peng, Haixia Xu:

Redactable Blockchain with Fine-Grained Autonomy and Transaction Rollback. 68-84
Cryptography and Applications
- Chuyi Yan, Haixia Xu, Yongheng Mu, Jiong Ding:

Pitch in: A Secure Extension Signature Based on SM9. 87-104 - Amirreza Hamidi, Hossein Ghodosi:

Verifiable DOPE from Somewhat Homomorphic Encryption, and the Extension to DOT. 105-120 - Po-Chu Hsu

, Atsuko Miyaji
:
Scalable M+1st-Price Auction with Infinite Bidding Price. 121-136 - Chen Li, Bibo Tu, Yanchang Feng:

The Shared Memory Based Cryptographic Card Virtualization. 137-151
Network Security
- Tao Chen, Kun Wen:

Feature Transfer Based Network Anomaly Detection. 155-169 - Kun Jia

, Jiazhi Liu, Wen Wang, Feng Liu
:
Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN. 170-185 - Wenjie Qin, Chengwei Peng, Tao Yin, Changbo Tian, Guangze Zhao:

AtNet: A Novel Anti-tracking Network with Multi-Party Judgement Capability Based on Cross-Domain Small-World Topology. 186-200 - Bingxu Wang, Gang Xiong

, Peipei Fu, Gaopeng Gou, Yingchao Qin, Zhen Li:
A Two-Stage Method for Fine-Grained DNS Covert Tunnel Behavior Detection. 201-216 - Jiang Xie, Shuhao Li, Peishuai Sun:

Analysis and Detection Against Overlapping Phenomenon of Behavioral Attribute in Network Attacks. 217-232 - Hassan Noun, Florian Rehm, Guillaume Zeller, G. Rajesh, Roland Lachmayer:

Integration of Cybersecurity Related Development Processes by Using a Quantification Method. 233-242
Cyber-Physical System
- Thomas Gleerup, Wenjuan Li, Jiao Tan, Yu Wang:

ZoomPass: A Zoom-Based Android Unlock Scheme on Smart Devices. 245-259 - Sulav Lal Shrestha

, Taylor Lee
, Sebastian Fischmeister
:
Metasploit for Cyber-Physical Security Testing with Real-Time Constraints. 260-275 - Guozhu Zhao, Pinchang Zhang, Yulong Shen, Xiaohong Jiang:

Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems. 276-284
Malware
- Yu Ding, Xiaoyu Zhang, Binbin Li, Jian Xing, Qian Qiang, Zisen Qi, Menghan Guo, Siyu Jia, Haiping Wang:

Malware Classification Based on Semi-Supervised Learning. 287-301 - Xiao Chen, Zhengwei Jiang, Shuwei Wang, Rongqi Jing, Chen Ling, Qiuyun Wang:

Malware Detected and Tell Me Why: An Verifiable Malware Detection Model with Graph Metric Learning. 302-314 - Qin Si, Hui Xu, Ying Tong, Yu Zhou, Jian Liang, Lei Cui, Zhiyu Hao:

Malware Detection Using Automated Generation of Yara Rules on Dynamic Features. 315-330
Mobile System Security
- Khalid Alkhattabi, Davita Bird, Kai Miller, Chuan Yue:

Question Answering Models for Privacy Policies of Mobile Apps: Are We There Yet? 333-352 - Hung-Yu Chien

:
Design of End-To-End Security for MQTT 5.0. 353-363 - Xinyu Liu, Wu Zhao, Langping Chen, Qixu Liu:

DroidFP: A Zero-Permission Detection Framework for Android Devices Based on Gated Recurrent Unit. 364-374
System and Web Security
- Othmane Belarbi

, Aftab Khan
, Pietro Edoardo Carnelli
, Theodoros Spyridopoulos
:
An Intrusion Detection System Based on Deep Belief Networks. 377-392 - Jiawei Sun, Guangjun Wu, Junnan Yin, Qiang Qian, Junjiao Liu, Jun Li, Yong Wang:

HINCDG: Multi-Meta-Path Graph Auto-Encoders for Mining of Weak Association Malicious Domains. 393-406 - Yi Liu

, Yanni Han
, Wei An:
AttVAE: A Novel Anomaly Detection Framework for Multivariate Time Series. 407-420 - Xiangyu Du, Zhengwei Jiang, Jun Jiang, Kai Zhang, Zijing Fan, Fangming Dong, Ning Li, Baoxu Liu:

BASNEA: Threat Hunting for Ethereum Smart Contract Based on Backtrackless Aligned-Spatial Network Entity Alignment. 421-436 - Qian Zou, Ning Zhang, Feng Guo, Qingshan Kong, Zhiqiang Lv:

Multi-region SRAM-Based TCAM for Longest Prefix. 437-452
Security in Financial Industry
- Zhexuan Hong, Jiageng Chen

:
A Solution for the Offline Double-Spending Issue of Digital Currencies. 455-471 - Daniel Kasper

, Jens Grossklags
:
A Hierarchical Macroeconomic Copula Model for Cyber Damages Based on Current Cyber Insurance Prices. 472-483
Social Engineering and Personalized Security
- Rosana Montanez Rodriguez, Shouhuai Xu:

Cyber Social Engineering Kill Chain. 487-504 - Leilei Qu

, Ruojin Xiao, Wenchang Shi:
Towards Practical Personalized Security Nudge Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge Effects. 505-521 - Zhiting Ling, Huamin Feng, Xiong Ding, Xuren Wang, Chang Gao, Peian Yang:

Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement. 522-538
Privacy and Anonymity
- Huajun Cui, Guozhu Meng, Yan Zhang, Weiping Wang, Dali Zhu, Ting Su, Xiaodong Zhang, Yuejun Li:

TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps. 541-556 - Jing Yu

, Shuguang Yuan, Yulin Yuan, Yafan Li, Chi Chen
:
A k-Anonymity-Based Robust Watermarking Scheme for Relational Database. 557-573

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














