


default search action
17th SecureComm 2021: Virtual Event
- Joaquín García-Alfaro

, Shujun Li
, Radha Poovendran
, Hervé Debar
, Moti Yung
:
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 398, Springer 2021, ISBN 978-3-030-90018-2
Cyber Threats and Defence
- Renzheng Wei, Lijun Cai, Lixin Zhao, Aimin Yu, Dan Meng:

DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting. 3-24 - Pejman Najafi, Feng Cheng, Christoph Meinel:

SIEMA: Bringing Advanced Analytics to Legacy Security Information and Event Management. 25-43 - Yuheng Wei, Futai Zou:

Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces. 44-61 - Philip Dale Huff, Qinghua Li:

Towards Automated Assessment of Vulnerability Exposures in Security Operations. 62-81 - Jaime C. Acosta, Luisana Clarke, Stephanie Medina, Monika Akbar, Mahmud Shahriar Hossain, Frederica Free-Nelson:

Repeatable Experimentation for Cybersecurity Moving Target Defense. 82-99 - Yongsheng Mei

, Kailash Gogineni, Tian Lan, Guru Venkataramani:
MPD: Moving Target Defense Through Communication Protocol Dialects. 100-119
Blockchain and P2P Security
- Andriy Panchenko, Asya Mitseva, Torsten Ziemann, Till Hering:

GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy Networks. 123-143 - Mohammadreza Ashouri

:
An Extensive Security Analysis on Ethereum Smart Contracts. 144-163 - Philip Dale Huff, Qinghua Li:

A Distributed Ledger for Non-attributable Cyber Threat Intelligence Exchange. 164-184
AI and Security/Privacy
- Narges Ashena

, Daniele Dell'Aglio
, Abraham Bernstein
:
Understanding ε for Differential Privacy in Differencing Attack Scenarios. 187-206 - Abderrahmen Amich, Birhanu Eshete

:
Explanation-Guided Diagnosis of Machine Learning Evasion Attacks. 207-228 - Qi Xia, Zeyi Tao, Qun Li

:
ToFi: An Algorithm to Defend Against Byzantine Attacks in Federated Learning. 229-248 - Lipeng Wan, Fangyu Zheng, Jingqiang Lin:

TESLAC: Accelerating Lattice-Based Cryptography with AI Accelerator. 249-269 - Xiaoyi Duan

, You Li
, Jianmin Tong
, Xiuying Li, Siman He, Peishu Zhang:
Research of CPA Attack Methods Based on Ant Colony Algorithm. 270-286 - Kaiyun Pan, Daojing He

, Chuan Xu:
Local Model Privacy-Preserving Study for Federated Learning. 287-307
Applied Cryptography
- Ryan Karl, Jonathan Takeshita, Taeho Jung:

Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Non-interactive Fault Recovery. 311-331 - Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung:

Cryptonomial: A Framework for Private Time-Series Polynomial Calculations. 332-351 - Jonathan Takeshita, Ryan Karl, Alamin Mohammed, Aaron Striegel, Taeho Jung:

Provably Secure Contact Tracing with Conditional Private Set Intersection. 352-373 - Enrico Branca

, Farzaneh Abazari
, Ronald Rivera Carranza, Natalia Stakhanova:
Origin Attribution of RSA Public Keys. 374-396
Network Security
- Lijia Xie, Shuang Zhao, Xiao Zhang, Yiming Shi, Xin Xiao, Zhiming Zheng:

Fine-Grained Intra-domain Bandwidth Allocation Against DDoS Attack. 399-417 - Panpan Zhao, Gaopeng Gou, Chang Liu, Yangyang Guan, Mingxin Cui, Gang Xiong

:
TMT-RF: Tunnel Mixed Traffic Classification Based on Random Forest. 418-437 - Carlos Silva, Bruno Sousa, João P. Vilela:

CROCUS: An Objective Approach for SDN Controllers Security Assessment. 438-455 - Henry Clausen

, Robert Flood, David Aspinall
:
Controlling Network Traffic Microstructures for Machine-Learning Model Probing. 456-475 - Martin Fejrskov

, Jens Myrup Pedersen
, Emmanouil Vasilomanolakis
:
Using NetFlow to Measure the Impact of Deploying DNS-based Blacklists. 476-496
Digital Forensics
- M. A. Hannan Bin Azhar

, German Abadia:
A Forensic Tool to Acquire Radio Signals Using Software Defined Radio. 499-512 - Mohammad Kavousi, Runqing Yang, Shiqing Ma, Yan Chen:

SemFlow: Accurate Semantic Identification from Low-Level System Data. 513-535

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














