SIN C

35 papers

YearTitle / Authors
2020A Subjective Network Approach for Cybersecurity Risk Assessment.
Nasser Al-Hadhrami, Matthew Collinson, Nir Oren
2020A Survey on Malware Detection with Deep Learning.
Muhammet Sahin, Serif Bahtiyar
2020AI-based Security for the Smart Networks.
Maxim O. Kalinin, Peter D. Zegzhda
2020An Approach to Discover and Assess Vulnerability Severity Automatically in Cyber-Physical Systems.
Yuning Jiang, Yacine Atif
2020Characteristics of a two-stage synchronization algorithm in the system of quantum key distribution with dividing a fiber-optic line into sections with decreasing length.
Yakov Mironov, Polina Mironova, Konstantin E. Rumyantsev
2020Creating Graphical Passwords on a Mobile Phone: Graphical Passwords on a Mobile.
Jessica Fong, Ron Poet
2020Credit Card Fraud Detection with NCA Dimensionality Reduction.
Beyazit Bestami Yuksel, Serif Bahtiyar, Ayse Yilmazer
2020CyberSecurity Attack Prediction: A Deep Learning Approach.
Ouissem Ben Fredj, Alaeddine Mihoub, Moez Krichen, Omar Cheikhrouhou, Abdelouahid Derhab
2020Detecting Malicious Signal Manipulation in Smart Grids Using Intelligent Analysis of Contextual Data.
Farzan Majdani, Lynne Batik, Andrei Petrovski, Sergey Petrovski
2020Detection of False Command and Response Injection Attacks for Cyber Physical Systems Security and Resilience.
Hope Nkiruka Eke, Andrei Petrovski, Hatem Ahriz
2020Detection of attacks on the Internet of Things based on intelligent analysis of devices functioning indicators.
Tigran Ovasapyan, Dmitry A. Moskvin, Artem Tsvetkov
2020Development of the mathematic model of disymmetric bigram cryptosystem based on a parametric solution family of multi-degree system of Diophantine equations✱.
Valeriy O. Osipyan, Kirill I. Litvinov
2020Exploiting Race Condition for Wi-Fi Denial of Service Attacks.
Karim Lounis, Mohammad Zulkernine
2020Eye Gaze-Based Human Error Prevention System: Experts vs. Non-Experts.
Oksana Kilik, Abdulaziz Almehmadi, Khalil El-Khatib
2020Hacking Passwords that Satisfy Common Password Policies: Hacking Passwords.
Richard Beno, Ron Poet
2020Intelligent support for network administrator decisions based on combined neural networks.
Igor V. Kotenko, Igor Saenko, Fadey Skorik
2020Malicious URL Detection Using Supervised Machine Learning Techniques.
Vara Vundavalli, Farhat Lamia Barsha, Mohammad Masum, Hossain Shahriar, Hisham Haddad
2020Modeling replay and integrity violations attacks for cryptographic protocols source codes verification of e-voting system based on blind intermediaries.
Liudmila Babenko, Ilya Pisarev
2020Neural network approach to assessing cybersecurity risks in large-scale dynamic networks.
Vasiliy M. Krundyshev
2020Permission Management and User Privacy Based On Android: Permission Management On Android.
Jiyou Wang, Ron Poet
2020PoliceChain: Blockchain-Based Smart Policing System for Smart Cities.
Arnab Mukherjee, Raju Halder
2020Power Analysis Side-Channel Attacks on Symmetric Block Cipher Magma.
Stanislav Zhdanov, Ekaterina Maro
2020RPM: Additive Stream Ciphers for Lightweight Communication Security.
Giovanni Di Crescenzo, Glenn Veach
2020SIN 2020: 13th International Conference on Security of Information and Networks, Virtual Event / Istanbul, Turkey, November 4-6, 2020
Siddika Berna Örs, Atilla Elçi
2020SMART Citizen Cyber Resilience (SC2R) Ontology.
Mamello Thinyane, Debora Irene Christine
2020Secure and Privacy-Aware Gateway for Home Automation Systems.
Sinem Gur, Simge Demir, Sevval Simsek, Albert Levi
2020Social networks bot detection using Benford's law.
Maksim Kalameyets, Dmitry Levshun, Sergei Soloviev, Andrey Chechulin, Igor V. Kotenko
2020SpotCheck: On-Device Anomaly Detection for Android.
Mark Vella, Christian Colombo
2020Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions.
Zeynep Chousein, Haci Yakup Tetik, Rahime Belen Saglam, Abdullah Bülbül, Shujun Li
2020Threat Modeling based Penetration Testing: The Open Energy Monitor Case study.
Giovanni Salzillo, Massimiliano Rak, Felice Moretta
2020Towards a user-centric IAM entitlement shop - Learnings from the e-commerce.
Markus Hornsteiner, Sebastian Groll, Alexander Puchta
2020Towards systematic honeytoken fingerprinting.
Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis
2020Unconventional Mechanisms for Biometric Data Acquisition via Side-Channels.
Jonathan Francis Roscoe, Max Smith-Creasey
2020Visual spoofing in content-based spam detection.
Mark Sokolov, Kehinde Olufowobi, Nic Herndon
2020When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter.
Kubra Aydin, Rahime Belen Saglam, Shujun Li, Abdullah Bulbul