ISPEC C

36 papers

YearTitle / Authors
2022A CNN-Based Semi-supervised Learning Approach for the Detection of SS7 Attacks.
Orhan Ermis, Christophe Feltus, Qiang Tang, Hoang Trang, Alexandre de Oliveira, Cu D. Nguyen, Alain Hirtzig
2022A Low-Cost and Cloud Native Solution for Security Orchestration, Automation, and Response.
Juan Christian, Luis Paulino, Alan Oliveira de Sá
2022A New Scalable Mutual Authentication in Fog-Edge Drone Swarm Environment.
Kyusuk Han, Eiman Al Nuaimi, Shamma Al Blooshi, Rafail Psiakis, Chan Yeob Yeun
2022A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios.
Yang Zhao, Zhaozhong Liu, Jingmin An, Guobin Zhu, Saru Kumari
2022Anonymous Authentication Protocols in Vehicular Ad Hoc Network-An Survey.
Guiwen Fu, Yanan Chen, Zhen Wu, Qianlin Ye
2022Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities.
Maharage Nisansala Sevwandi Perera, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai
2022BADPASS: Bots Taking ADvantage of Proxy as a Service.
Elisa Chiapponi, Marc Dacier, Olivier Thonnard, Mohamed Fangar, Vincent Rigal
2022Blockchain-Based Confidential Payment System with Controllable Regulation.
Yu-Chen Liao, Raylin Tso, Zi-Yuan Liu, Yi-Fan Tseng
2022Blockchain-Based Multi-keyword Search on Encrypted COVID-19 Contact Tracing Data.
Zheng Yao Ng, Iftekhar Salam
2022Blockchain-Based Self-Sovereign Identity System with Attribute-Based Issuance.
Yi-Hsiu Lee, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng
2022Continued Fractions Applied to a Family of RSA-like Cryptosystems.
Paul Cotan, George Teseleanu
2022Designing Enhanced Robust 6G Connection Strategy with Blockchain.
August Lykke Thomsen, Bastian Preisel, Victor Rodrigues Andersen, Wei-Yang Chiu, Weizhi Meng
2022Detect Compiler Inserted Run-time Security Checks in Binary Software.
Koyel Pramanick, Prasad A. Kulkarni
2022Detection of Adversarial Examples Based on the Neurons Distribution.
Jiang-Yi Zeng, Chi-Yuan Chen, Hsin-Hung Cho
2022Detection of MSOffice-Embedded Malware: Feature Mining and Short- vs. Long-Term Performance.
Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian
2022Differential Cryptanalysis of Salsa20 Based on Comprehensive Analysis of PNBs.
Nasratullah Ghafoori, Atsuko Miyaji
2022Evaluating the Possibility of Evasion Attacks to Machine Learning-Based Models for Malicious PowerShell Detection.
Yuki Mezawa, Mamoru Mimura
2022Federated Intrusion Detection on Non-IID Data for IIoT Networks Using Generative Adversarial Networks and Reinforcement Learning.
Nguyen Huu Quyen, Phan The Duy, Nguyen Chi Vy, Do Thi Thu Hien, Van-Hau Pham
2022Information Security Practice and Experience - 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23-25, 2022, Proceedings
Chunhua Su, Dimitris Gritzalis, Vincenzo Piuri
2022LMGROUP: A Lightweight Multicast Group Key Management for IoT Networks.
Pegah Nikbakht Bideh
2022M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption.
Jiaming Yuan, Yingjiu Li, Jianting Ning, Robert H. Deng
2022Optimal Generic Attack Against Basic Boneh-Boyen Signatures.
Yen-Kang Fu, Jonathan Chang, David Jao
2022Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems.
George Tasopoulos, Jinhui Li, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld
2022Physical Zero-Knowledge Proof Protocol for Topswops.
Yuichi Komano, Takaaki Mizuki
2022Practical Backdoor Attack Against Speaker Recognition System.
Yuxiao Luo, Jianwei Tai, Xiaoqi Jia, Shengzhi Zhang
2022Preventing Adversarial Attacks Against Deep Learning-Based Intrusion Detection System.
Xuan-Ha Nguyen, Xuan-Duong Nguyen, Kim-Hung Le
2022PriApp-Install: Learning User Privacy Preferences on Mobile Apps' Installation.
Ha Xuan Son, Barbara Carminati, Elena Ferrari
2022Protecting Cyber-Physical System Testbeds from Red-Teaming/Blue-Teaming Experiments Gone Awry.
Md. Rakibul Hasan Talukder, Md. Al Amin, Indrajit Ray
2022Robust Anomaly Detection via Radio Fingerprinting in LoRa-Enabled IIoT.
Subir Halder, Thomas Newe
2022Secure Human Identification Protocol with Human-Computable Passwords.
Slawomir Matelski
2022Sherlock Holmes Zero-Knowledge Protocols.
George Teseleanu
2022Sparse Attack on Skeleton-Based Human Action Recognition for Internet of Video Things Systems.
Yinqin Huang, Cheng Dai, Wei-Che Chien
2022Techniques for Continuous Touch-Based Authentication.
Martin Georgiev, Simon Eberz, Ivan Martinovic
2022Towards Blockchain-Enabled Intrusion Detection for Vehicular Navigation Map System.
Bodi Bodi, Wei-Yang Chiu, Weizhi Meng
2022UCC: Universal and Committee-based Cross-chain Framework.
Yi Zhang, Zhonghui Ge, Yu Long, Dawu Gu
2022Using API Calls for Sequence-Pattern Feature Mining-Based Malware Detection.
Gheorghe Balan, Dragos Teodor Gavrilut, Henri Luchian