E-Book, Englisch, Band 568, 517 Seiten, eBook
19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II
E-Book, Englisch, Band 568, 517 Seiten, eBook
ISBN: 978-3-031-64954-7
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Intrusion and Anomaly Detection.-
A Game Theoretical Analysis of Distributed Denial of Service Defense Incent.- DDoS Mitigation Dilemma Exposed A Two Wave Attack with Collateral Damage of Millions.- Lightweight Intrusion Detection for IoT Systems using Artificial Neural Networks.- MVTBA A Novel Hybrid Deep Learning Model for Encrypted Malicious Traffic Identification.- POP-HIT Partially Order Preserving Hash Induced Transformation for Privacy Protection in Face Recognition Access Control.
IoT Security.-
Enhancing Cross Device Security with Fine Grained Permission Control.- The Security Analysis of ROS2 Communication.- VET Autonomous Vehicular Credential Verification using Trajectory and Motion Vectors.
Network Security.-
A Stable Fine-grained Webpage Fingerprinting Aiming at the Unstable Realistic Network.- Securing Web Inputs using Parallel Session Attachments.- Unsupervised and Adaptive Tor Website Fingerprinting.- Visibility of Scan Traffic Trends in Sparsely Populated Darknets.-
Privacy.-
Do Backdoors Assist Membership Inference Attacks.- Efficient and Scalable Multi Party Privacy Preserving k NN Classification.- Efficient Unbalanced Private Set Intersection Protocol over Large-scale Datasets Based on Bloom Filter.- PPEC Privacy Preserving and Cost Effective Incremental Density Peak Clustering Scheme for Profit Driven Clouds.- Practical Privacy Preserving Community Detection in Decentralized Weighted Networks.- Split Without a Leak Reducing Privacy Leakage in Split Learning.- Street Rep A Privacy Preserving Reputation Aggregation System.-
Program Analysis.-
Analyzing Implementation based SSL TLS Vulnerabilities with Binary Semantics Analysis.- Identifying Library Functions in Stripped Binary Combining Function Similarity and Call Graph Features.- PDFIET PDF Malicious Indicators Extraction Technique through Optimized Symbolic Execution.- Ransomware as a Service Demystifying Android Ransomware Generators.-
Software Security.-
CV2XFuzzer C V2X Parsing Vulnerability Discovery System Based on Fuzzing.- Learning AI coding style for software plagiarism detection.- Understanding and Measuring Inter Process Code Injection in Windows Malware.