


default search action
6th SciSec 2024: Copenhagen, Denmark
- Jun Zhao

, Weizhi Meng
:
Science of Cyber Security - 6th International Conference, SciSec 2024, Copenhagen, Denmark, August 14-16, 2024, Proceedings. Lecture Notes in Computer Science 15441, Springer 2025, ISBN 978-981-96-2416-4 - Haiyang Li, Zhiqiang Lv, Yixin Zhang

, Yanan Xue:
A Novel Scoring Algorithm Against HID Attacks Based on Static Text Feature Matching. 1-18 - Connor Startzel, Dane Brown

, T. Owens Walker
, Jennie Hill
:
Identifying Ransomware Functions Through Microarchitectural Side-Channel Analysis. 19-36 - Shota Fujii

, Yoichi Tsuzuki, Takanori Okamoto, Yu Tamura, Takayuki Sato:
STARMAP: Multi-machine Malware Analysis System for Lateral Movement Observation. 37-55 - Krishna Chandra Roy

, Qian Chen
:
LogSHIELD: A Graph-Based Real-Time Anomaly Detection Framework Using Frequency Analysis. 56-75 - Khalid Alkhattabi, Chuan Yue:

Completeness Analysis of Mobile Apps' Privacy Policies by Using Deep Learning. 76-96 - Theodore Tangie Longtchi, Shouhuai Xu:

Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails. 97-117 - Kéren Saint-Hilaire

, Christopher Neal
, Frédéric Cuppens
, Nora Boulahia-Cuppens
, Makhlouf Hadji
:
Matching Knowledge Graphs for Cybersecurity Countermeasures Selection. 118-137 - Fernando Vera Buschmann, Palina Pauliuchenka, Ethan Oh, Bai Chien Kao, Louis DiValentin, David A. Bader:

Graph-Based Profiling of Dependency Vulnerability Remediation. 138-157 - Theodore Tangie Longtchi, Shouhuai Xu:

Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails. 158-178 - Sai Veerya Mahadevan, Yuuki Takano, Atsuko Miyaji:

An Enhanced Firewall for IoT Security. 179-195 - Jan Hörnemann

, Oskar Braun, Daniel Theis, Norbert Pohlmann
, Tobias Urban
, Matteo Große-Kampmann
:
Exploring the Effects of Cybersecurity Awareness and Decision-Making Under Risk. 196-216 - Benshan Mei

, Wenhao Wang, Dongdai Lin:
SVSM-KMS: Safeguarding Keys for Cloud Services with Encrypted Virtualization. 217-235 - Ziyang Yu, Wentao Li, Xiu Ma, Baorui Zheng, Xinbo Han, Ning Li, Qiujian Lv, Weiqing Huang:

GNNexPIDS: An Interpretation Method for Provenance-Based Intrusion Detection Based on GNNExplainer. 236-253 - Mohsin Khan

, Dag Johansen
, Håvard D. Johansen
:
Performance Evaluation of Lightweight Cryptographic Ciphers on ARM Processor for IoT Deployments. 254-272 - Eric Ficke

, Raymond M. Bateman
, Shouhuai Xu
:
AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees. 273-294 - Dan Du, Yunpeng Li, Yiyang Cao, Yuling Liu, Guozhu Meng, Ning Li, Dongxu Han, Huamin Feng:

FAF-BM: An Approach for False Alerts Filtering Using BERT Model with Semi-supervised Active Learning. 295-312 - Xiaoyu Zhang, Maochao Xu, Shouhuai Xu:

Smart Home Cyber Insurance Pricing. 313-333 - Eric Filiol, Pierre Filiol:

Exhaustive Exploratory Analysis of Low Degree Maximum Period NLFSRs By Graph Analysis. 334-349 - Tiange Xie, Feng Liu, Jiechao Gao, Yinghui Wang:

Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model. 350-368 - Yulong Zhan, Yang Cai, Gang Xiong, Gaopeng Gou, Xiaoqian Li:

Multi-modal Multi-task Tiered Expert (M3TTE): An Effective Method for CDN Website Classification. 369-386 - Yu Ding, Haoliang Sun, Binbin Li, Zisen Qi, Siyu Jia, Haiping Wang, Xingbang Tan:

Malware Variant Detection Based on Knowledge Transfer and Ensemble Learning. 387-401 - Haiping Wang

, Jianqiang Li, Binbin Li, Tianning Zang, Zisen Qi, Siyu Jia, Yu Ding, Yifei Yang:
An Efficient IOC-Driven BigData Tracing and Backtracking Model for Emergency Response. 402-419 - Chunlu Chen, Rodrigo Roman, Kevin I-Kai Wang, Kouichi Sakurai:

Integrating CP-ABE and Device Fingerprint Into Federated Learning. 420-436 - Haiping Wang

, Jianqiang Li, Binbin Li, Tianning Zang, Yifei Yang, Siyu Jia, Zisen Qi, Yu Ding:
Automatic Alert Categories Standardization for Heterogeneous Devices with Incomplete Semantic Knowledge Based on LSTM. 437-456 - Zisen Qi, Yijing Wang, Binbin Li, Tianning Zang, Hao Cui, Xingbang Tan, Yu Ding:

Family Similarity-Enhanced Implicit Data Augmentation for Malware Classification. 457-472

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














