default search action
3rd SciSec 2021: Virtual Event
- Wenlian Lu, Kun Sun, Moti Yung, Feng Liu:
Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13005, Springer 2021, ISBN 978-3-030-89136-7
Keynote Report
- Shouhuai Xu:
SARR: A Cybersecurity Metrics and Quantification Framework (Keynote). 3-17
Detection for Cybersecurity
- Zhaoteng Yan, Zhi Li, Wenping Bai, Nan Yu, Hongsong Zhu, Limin Sun:
Detecting Internet-Scale Surveillance Devices Using RTSP Recessive Features. 21-35 - Yulin Fan, Yang Li, Huajun Cui, Huiran Yang, Yan Zhang, Weiping Wang:
An Intrusion Detection Framework for IoT Using Partial Domain Adaptation. 36-50 - Zixian Tang, Qiang Wang, Wenhao Li, Huaifeng Bao, Feng Liu, Wen Wang:
Mining Trojan Detection Based on Multi-dimensional Static Features. 51-65 - Hua Cheng, Yinda Shen, Tao Cheng, Yiquan Fang, Jianfan Ling:
Botnet Detection Based on Multilateral Attribute Graph. 66-76 - John Charlton, Pang Du, Shouhuai Xu:
A New Method for Inferring Ground-Truth Labels and Malware Detector Effectiveness Metrics. 77-92
Machine Learning for Cybersecurity
- Chuanyin Wang, Cunqing Ma, Min Li, Neng Gao, Yifei Zhang, Zhuoxiang Shen:
Protecting Data Privacy in Federated Learning Combining Differential Privacy and Weak Encryption. 95-109 - Zhuoxiang Shen, Neng Gao, Zeyi Liu, Min Li, Chuanyin Wang:
Using Chinese Natural Language to Configure Authorization Policies in Attribute-Based Access Control System. 110-125 - Xiaoyu Wang, Tao Bai, Jun Zhao:
A Data-Free Approach for Targeted Universal Adversarial Perturbation. 126-138 - Jiyue Tang, Le Yang, Song Liu, Wenmao Liu, Meng Wang, Chonghua Wang, Bo Jiang, Zhigang Lu:
Caps-LSTM: A Novel Hierarchical Encrypted VPN Network Traffic Identification Using CapsNet and LSTM. 139-153 - Hui Zhang, Gaopeng Gou, Gang Xiong, Chang Liu, Yuewen Tan, Ke Ye:
Multi-granularity Mobile Encrypted Traffic Classification Based on Fusion Features. 154-170 - Isaac Matthews, Sadegh Soudjani, Aad van Moorsel:
Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs. 171-186 - Zhaofeng Liu, Yinchong Wang, Huashan Chen, Wenlian Lu:
Simulations of Event-Based Cyber Dynamics via Adversarial Machine Learning. 187-201
Dynamics, Network and Inference
- Wei Lin, Shuming Zhou, Min Li, Gaolin Chen:
Dismantling Interdependent Networks Based on Supra-Laplacian Energy. 205-213 - Liangcheng Qin, Ling Ma, Xiongjun Fu:
DWT-DQFT-Based Color Image Blind Watermark with QR Decomposition. 214-224 - Caimei Wang, Zijian Zhou, Hong Li, Zhengmao Li, Bowen Huang:
A Multi-level Elastic Encryption Protection Model. 225-235 - Zhaofeng Liu, Wenlian Lu, Yingying Lang:
An Event-Based Parameter Switching Method for Controlling Cybersecurity Dynamics. 236-251 - Rui Mei, Han-Bing Yan, Zhihui Han:
RansomLens: Understanding Ransomware via Causality Analysis on System Provenance Graph. 252-267
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.