


default search action
6th SciSec 2024: Copenhagen, Denmark
- Jun Zhao
, Weizhi Meng
:
Science of Cyber Security - 6th International Conference, SciSec 2024, Copenhagen, Denmark, August 14-16, 2024, Proceedings. Lecture Notes in Computer Science 15441, Springer 2025, ISBN 978-981-96-2416-4 - Haiyang Li, Zhiqiang Lv, Yixin Zhang
, Yanan Xue:
A Novel Scoring Algorithm Against HID Attacks Based on Static Text Feature Matching. 1-18 - Connor Startzel, Dane Brown
, T. Owens Walker
, Jennie Hill
:
Identifying Ransomware Functions Through Microarchitectural Side-Channel Analysis. 19-36 - Shota Fujii
, Yoichi Tsuzuki, Takanori Okamoto, Yu Tamura, Takayuki Sato:
STARMAP: Multi-machine Malware Analysis System for Lateral Movement Observation. 37-55 - Krishna Chandra Roy
, Qian Chen
:
LogSHIELD: A Graph-Based Real-Time Anomaly Detection Framework Using Frequency Analysis. 56-75 - Khalid Alkhattabi, Chuan Yue:
Completeness Analysis of Mobile Apps' Privacy Policies by Using Deep Learning. 76-96 - Theodore Tangie Longtchi, Shouhuai Xu:
Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails. 97-117 - Kéren Saint-Hilaire
, Christopher Neal
, Frédéric Cuppens
, Nora Boulahia-Cuppens
, Makhlouf Hadji
:
Matching Knowledge Graphs for Cybersecurity Countermeasures Selection. 118-137 - Fernando Vera Buschmann, Palina Pauliuchenka, Ethan Oh, Bai Chien Kao, Louis DiValentin, David A. Bader:
Graph-Based Profiling of Dependency Vulnerability Remediation. 138-157 - Theodore Tangie Longtchi, Shouhuai Xu:
Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails. 158-178 - Sai Veerya Mahadevan, Yuuki Takano, Atsuko Miyaji:
An Enhanced Firewall for IoT Security. 179-195 - Jan Hörnemann, Oskar Braun, Daniel Theis, Norbert Pohlmann
, Tobias Urban
, Matteo Große-Kampmann
:
Exploring the Effects of Cybersecurity Awareness and Decision-Making Under Risk. 196-216 - Benshan Mei
, Wenhao Wang, Dongdai Lin:
SVSM-KMS: Safeguarding Keys for Cloud Services with Encrypted Virtualization. 217-235 - Ziyang Yu, Wentao Li, Xiu Ma, Baorui Zheng, Xinbo Han, Ning Li, Qiujian Lv, Weiqing Huang:
GNNexPIDS: An Interpretation Method for Provenance-Based Intrusion Detection Based on GNNExplainer. 236-253 - Mohsin Khan
, Dag Johansen
, Håvard D. Johansen
:
Performance Evaluation of Lightweight Cryptographic Ciphers on ARM Processor for IoT Deployments. 254-272 - Eric Ficke
, Raymond M. Bateman
, Shouhuai Xu
:
AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees. 273-294 - Dan Du, Yunpeng Li, Yiyang Cao, Yuling Liu, Guozhu Meng, Ning Li, Dongxu Han, Huamin Feng:
FAF-BM: An Approach for False Alerts Filtering Using BERT Model with Semi-supervised Active Learning. 295-312 - Xiaoyu Zhang, Maochao Xu, Shouhuai Xu:
Smart Home Cyber Insurance Pricing. 313-333 - Eric Filiol, Pierre Filiol:
Exhaustive Exploratory Analysis of Low Degree Maximum Period NLFSRs By Graph Analysis. 334-349 - Tiange Xie, Feng Liu, Jiechao Gao, Yinghui Wang:
Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model. 350-368 - Yulong Zhan, Yang Cai, Gang Xiong, Gaopeng Gou, Xiaoqian Li:
Multi-modal Multi-task Tiered Expert (M3TTE): An Effective Method for CDN Website Classification. 369-386 - Yu Ding, Haoliang Sun, Binbin Li, Zisen Qi, Siyu Jia, Haiping Wang, Xingbang Tan:
Malware Variant Detection Based on Knowledge Transfer and Ensemble Learning. 387-401 - Haiping Wang
, Jianqiang Li, Binbin Li, Tianning Zang, Zisen Qi, Siyu Jia, Yu Ding, Yifei Yang:
An Efficient IOC-Driven BigData Tracing and Backtracking Model for Emergency Response. 402-419 - Chunlu Chen, Rodrigo Roman, Kevin I-Kai Wang, Kouichi Sakurai:
Integrating CP-ABE and Device Fingerprint Into Federated Learning. 420-436 - Haiping Wang
, Jianqiang Li, Binbin Li, Tianning Zang, Yifei Yang, Siyu Jia, Zisen Qi, Yu Ding:
Automatic Alert Categories Standardization for Heterogeneous Devices with Incomplete Semantic Knowledge Based on LSTM. 437-456 - Zisen Qi, Yijing Wang, Binbin Li, Tianning Zang, Hao Cui, Xingbang Tan, Yu Ding:
Family Similarity-Enhanced Implicit Data Augmentation for Malware Classification. 457-472

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
