SIN C

61 papers

YearTitle / Authors
202417th International Conference on Security of Information and Networks, SIN 2024, Sydney, Australia, December 2-4, 2024
20245G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning.
Amir Javadpour, Forough Ja'fari, Tarik Taleb, Chafika Benzaïd
2024A Blockchain-Based System for Dynamic Redundancy in IoT Communications.
Liang Liu, Kazumasa Omote
2024A Lightweight Hybrid Signcryption Scheme for Smart Devices.
Lanlan Pan, Ruonan Qiu, Minghui Yang
2024A Novel Biometric-Based Multi-Factor Authentication Protocol for EV Charging Infrastructures.
Akshitha K. Subran, Sriram Sankaran
2024A Novel Framework for Attack Detection and Localization in Smart Cities.
Mehdi Houichi, Faouzi Jaïdi, Adel Bouhoula
2024A Novel Key Management Framework for Secure and Scalable Decentralized Identity Systems.
Mert Yildiz, Serif Bahtiyar
2024A Secure Contact Tracing Method Using Blockchain for Criminal Investigation.
Mizuki Tsuchida, Kazumasa Omote
2024A Token-Level Adversarial Example Attack Method for Machine Learning Based Malicious URL Detectors.
Qisheng Chen, Kazumasa Omote
2024A Zero-Trust Framework Based on Machine Learning for Industrial Internet of Things.
Adel Atieh, Priyadarsi Nanda, Manoranjan Mohanty
2024Adversarial Attack Vectors Against Near-Real-Time AI xApps in the Open RAN.
Azadeh Arnaz, Justin Lipman, Mehran Abolhasan
2024Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework.
Yaser Saei, Jafar Tahmoresnezhad, Sima Jafarikhah, Hossein Siadati
2024BERT-LA: Leveraging BERT and AraBERT With Bi-LSTM for Cross-Lingual Sentiment Analysis of English and Arabic Texts.
Wael Jefry, Firas Al-Doghman, Farookh Khadeer Hussain
2024Building Resilient AI: A Solution to Data and Model Poisoning Prevention.
Ghazaleh Keshavarzkalhori, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí
2024Bushfire Severity Prediction Optimization: Feature Combination Study with XGBoost Regression and Satellite-Derived Data.
Pirunthavi Wijikumar, Shouthiri Partheepan, Jahan Hassan, Farzad Sanati, Biplop Rakshit Ray
2024CDCEF: A Cloud-Based Data Volatility & CSP Reliance Eradication Framework.
Pankaj Hariom Sharma, Priyanka Singh
2024Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based Applications.
Farag El Zegil, Priyadarsi Nanda, Manoranjan Mohanty, Majed Alzahrani
2024Comprehensive Security of SDN Controllers in NFVI-Based 5G Network.
Asad Faraz Khan, Priyadarsi Nanda
2024Contextualized AI for Cyber Defense: An Automated Survey Using LLMs.
Christoforus Yoga Haryanto, Anne Maria Elvira, Trung Duc Nguyen, Minh Hieu Vu, Yoshiano Hartanto, Emily Lomempow, Arathi Arakala
2024Critical Behavior Sequence Monitoring for Early Malware Detection.
Tarun Bisht, Sarath Babu, Virendra Singh
2024Cybersecurity Revolution via Large Language Models and Explainable AI.
Taher M. Ghazal, Jamshaid Iqbal Janjua, Walid Abushiba, Munir Ahmad, Anuam Ihsan, Nidal A. Al-Dmour
2024Demystifying Trajectory Recovery from Ash: An Open-Source Evaluation and Enhancement.
Nicholas D'Silva, Toran Shahi, Øyvind Timian Dokk Husveg, Adith Sanjeeve, Erik Buchholz, Salil S. Kanhere
2024Dilithium-Based Verifiable Timed Signature Scheme.
Erkan Uslu, Oguz Yayla
2024Discoverable Hidden Patterns in Water Quality Through AI, LLMs, and Transparent Remote Sensing.
Abdullah Al Noman, Md Tanvir Rahman Tarafder, S. M. Tamim Hossain Rimon, Asif Ahamed, Shahriar Ahmed, Abdullah Al Sakib
2024Dynamic Network Slicing and Deep Learning Based Intrusion Detection System with Virtual Load Balancing in Edge Enabled SDN/NFV Based 5G Networks.
Asad Faraz Khan, Priyadarsi Nanda
2024ECG- PPS: Privacy Preserving Disease Diagnosis and Monitoring System for Real-Time ECG Signals.
Beyazit Bestami Yuksel, Ayse Yilmazer-Metin
2024EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit.
Kerem Alpdag, Naghmeh Moradpoor, Ny Hasina Andriambelo, Paul Wooderson, Leandros Maglaras
2024Effects of Personal Characteristics on Phishing Awareness, Anti-Phishing Tool Usage, and Phishing Avoidance Behavior: A Structural Equation Modeling Approach.
Saleh Mansor Alqahtani, Priyadarsi Nanda
2024Empirical Analysis of Anomaly Detection Systems for Internet of Things.
Shunmika Chidambaram, Bhagya Sony, Nithya Nedungadi, Sriram Sankaran
2024EncPDS: Encrypted Personal Data Stores via Key-Aggregate ID-Based Proxy Re-Encryption.
Kaisei Kajita, Go Ohtake
2024Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis.
Stuart Weir, Muhammad Shahbaz Khan, Naghmeh Moradpoor, Jawad Ahmad
2024Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks.
Jay Dave, Nikumani Choudhury, Dantu Havishteja, Katuri Revanth
2024Enhancing Phishing Resilience in Academia: The Mediating Role of Anti-Phishing Tools on Student Awareness and Behavior.
Saleh Mansor Alqahtani, Priyadarsi Nanda
2024Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles With Lightweight Blockchain and Binius ZeroKnowledge Proofs.
Ny Hasina Andriambelo, Naghmeh Moradpoor
2024Experimental Study on Impact of Appliance ID-Based Normalization on SimDataset for Anomalous Power Consumption Classification.
Rajesh Nayak, C. D. Jaidhar
2024Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking.
Fei Du, Jinai Ge, Wen Wang, Yuwen Zou, Sang-Yoon Chang, Wenjun Fan
2024FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces.
Xufeng Liu, Quoc Hoan Vu, Priyanka Singh
2024Human-AI Collaboration and Cyber Security Training: Learning Analytics Opportunities and Challenges.
Kaie Maennel, Olaf Manuel Maennel
2024IRIS-SAFE: Privacy-Preserving Biometric Authentication.
Devi Listiyani, Priyanka Singh
2024Implementation of Natural Language UAV Control Using OpenAI's ChatGPT in a Simulated University Environment.
Yulduz Muradova, Jennifer Amachree, Louis Henry, Anu G. Bourgeois
2024Incident Response Adaptive Metrics Framework.
Muntathar Abid, Priyadarsi Nanda, Manoranjan Mohanty
2024Lightweight Blockchain Prototype for Food Supply Chain Management.
Alexey Rusakov, Naghmeh Moradpoor, Aida Akbarzadeh
2024Mathematical Models of Security Information Systems Based on the Generalized Multiplicative Knapsacks.
Valeriy O. Osipyan, E. T. J. Algharib, Arseniy Zhuck, Kirill I. Litvinov
2024Microsegmented Cloud Network Architecture Using Open-Source Tools for a Zero Trust Foundation.
Sunil Arora, John D. Hastings
2024Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends.
Harshit Gupta, Luca D'Agati, Francesco Longo, Antonio Puliafito, Giovanni Merlino
2024PATCH: Problem-Based Learning Approach for Teaching Cybersecurity and Ethical Hacking in Community Colleges.
Sajal Bhatia, Saaid Elhadad, Irfan Ahmed
2024Performance Evaluation of Quantum-Secure Symmetric Key Agreement.
Amin Rois Sinung Nugroho, Muhammad Ikram, Mohamed Ali Kâafar
2024Prompt Engineering Adversarial Attack Against Image Captioning Models.
Hiep Vo, Shui Yu, Xi Zheng
2024Ransomware Insight Analyzer.
Xin Lin Gan, Zhi Ren James Tan, Yu En Bernice Goo, Xin Ling Jocelyn Yeo, Vi Shean Lim, Yan Cong Boo, Huaqun Guo
2024Recommendation System Model Ownership Verification via Non-Influential Watermarking.
Xiaocui Dang, Priyadarsi Nanda, Heng Xu, Haiyu Deng, Manoranjan Mohanty
2024SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems.
Shayesta Naziri, Xu Wang, Guangsheng Yu, Jian Xu, Sudhir Shrestha, Christy Jie Liang
2024Secure Communication for MUM-T: A Blockchain and Lightweight Cryptography Framework.
Halimcan Yasar, Serif Bahtiyar
2024Security Inspection and Enhancement of a Modern Multi-Factor Authentication Protocol.
Swapnoneel Roy, Charlene H. Crawshaw, Debajyoti Mukhopadhyay, Meera Narvekar
2024Security Situation Awareness Platform.
Charisee Zhi Ling Yip, Tee Kiat Chua, Clarabel Jinghui Teo, Jing Rui Goh, Brandon Jia Le Loo, Huaqun Guo, Liming Lu, Kan Chen
2024Simulation of Pre-Ransomware Attacks on Active Directory.
En Jie Tan, Kowit Tan, Royce Yu Feng Chong, Xingxing Chen, Yi Ching Tan, Liming Lu, Huaqun Guo
2024Spatial Prediction of UAV Position Using Deep Learning.
Márton Bertalan Limpek, Géza Szabó, László Hévizi, István Gódor
2024Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWAN.
Indu Parajuli, Biplob Rakshit Ray, Jahan Hassan, Michael Cowling
2024The Bell-LaPadula (BLP) Enterprise Security Architecture Model vs Inference Attacks.
Dominic Ayamga, Priyadarsi Nanda, Manoranjan Mohanty
2024The Recent Trends in Ransomware Detection and Behaviour Analysis.
Büsra Çaliskan, Ibrahim Gulatas, H. Hakan Kilinc, Abdul Halim Zaim
2024Towards Weaknesses and Attack Patterns Prediction for IoT Devices.
Carlos A. Rivera Alvarez, Arash Shaghaghi, Gustavo Batista, Salil S. Kanhere
2024Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach.
Rahat Mehmood, Priyanka Singh, Zoe Jeffery