


default search action
3rd SciSec 2021: Virtual Event
- Wenlian Lu, Kun Sun, Moti Yung, Feng Liu:

Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13005, Springer 2021, ISBN 978-3-030-89136-7
Keynote Report
- Shouhuai Xu:

SARR: A Cybersecurity Metrics and Quantification Framework (Keynote). 3-17
Detection for Cybersecurity
- Zhaoteng Yan

, Zhi Li
, Wenping Bai
, Nan Yu
, Hongsong Zhu
, Limin Sun:
Detecting Internet-Scale Surveillance Devices Using RTSP Recessive Features. 21-35 - Yulin Fan, Yang Li, Huajun Cui, Huiran Yang, Yan Zhang, Weiping Wang:

An Intrusion Detection Framework for IoT Using Partial Domain Adaptation. 36-50 - Zixian Tang, Qiang Wang

, Wenhao Li, Huaifeng Bao, Feng Liu
, Wen Wang:
Mining Trojan Detection Based on Multi-dimensional Static Features. 51-65 - Hua Cheng

, Yinda Shen
, Tao Cheng
, Yiquan Fang
, Jianfan Ling
:
Botnet Detection Based on Multilateral Attribute Graph. 66-76 - John Charlton, Pang Du, Shouhuai Xu:

A New Method for Inferring Ground-Truth Labels and Malware Detector Effectiveness Metrics. 77-92
Machine Learning for Cybersecurity
- Chuanyin Wang, Cunqing Ma, Min Li, Neng Gao, Yifei Zhang, Zhuoxiang Shen

:
Protecting Data Privacy in Federated Learning Combining Differential Privacy and Weak Encryption. 95-109 - Zhuoxiang Shen

, Neng Gao, Zeyi Liu, Min Li, Chuanyin Wang:
Using Chinese Natural Language to Configure Authorization Policies in Attribute-Based Access Control System. 110-125 - Xiaoyu Wang

, Tao Bai, Jun Zhao:
A Data-Free Approach for Targeted Universal Adversarial Perturbation. 126-138 - Jiyue Tang, Le Yang, Song Liu, Wenmao Liu, Meng Wang, Chonghua Wang, Bo Jiang, Zhigang Lu:

Caps-LSTM: A Novel Hierarchical Encrypted VPN Network Traffic Identification Using CapsNet and LSTM. 139-153 - Hui Zhang, Gaopeng Gou, Gang Xiong

, Chang Liu, Yuewen Tan, Ke Ye:
Multi-granularity Mobile Encrypted Traffic Classification Based on Fusion Features. 154-170 - Isaac Matthews

, Sadegh Soudjani
, Aad van Moorsel
:
Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs. 171-186 - Zhaofeng Liu, Yinchong Wang, Huashan Chen, Wenlian Lu:

Simulations of Event-Based Cyber Dynamics via Adversarial Machine Learning. 187-201
Dynamics, Network and Inference
- Wei Lin, Shuming Zhou, Min Li, Gaolin Chen:

Dismantling Interdependent Networks Based on Supra-Laplacian Energy. 205-213 - Liangcheng Qin, Ling Ma, Xiongjun Fu:

DWT-DQFT-Based Color Image Blind Watermark with QR Decomposition. 214-224 - Caimei Wang, Zijian Zhou, Hong Li, Zhengmao Li, Bowen Huang:

A Multi-level Elastic Encryption Protection Model. 225-235 - Zhaofeng Liu, Wenlian Lu, Yingying Lang:

An Event-Based Parameter Switching Method for Controlling Cybersecurity Dynamics. 236-251 - Rui Mei

, Han-Bing Yan, Zhihui Han:
RansomLens: Understanding Ransomware via Causality Analysis on System Provenance Graph. 252-267

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














