


default search action
6th CSNet 2022: Rio de Janeiro, Brazil
- 6th Cyber Security in Networking Conference, CSNet 2022, Rio de Janeiro, Brazil, October 24-26, 2022. IEEE 2022, ISBN 979-8-3503-9722-2

- Igor Jochem Sanz, Gabriel Antonio Fontes Rebello, Otto Carlos Muniz Bandeira Duarte:

GRAFFITO-IDS: A Graph-based Algorithm for Feature Enrichment on Online Intrusion Detection Systems. 1-7 - Gabriel Antonio F. Rebello, Gustavo Franco Camilo

, Lucas C. B. Guimarães, Lucas Airam C. de Souza, Otto Carlos M. B. Duarte:
Security and Performance Analysis of Quorum-based Blockchain Consensus Protocols. 1-7 - Fábio César Schuartz, Mauro Fonseca, Anelise Munaretto:

A Distributed Platform for Intrusion Detection System Using Data Stream Mining in a Big Data Environment. 1-7 - Vagner Ereno Quincozes

, Silvio E. Quincozes
, Célio Vinicius N. de Albuquerque, Diego G. Passos
, Daniel Mossé:
Feature Extraction for Intrusion Detection in IEC-61850 Communication Networks. 1-7 - Samir Chabbi, Nour El Madhoun, Lazhar Khamer:

Security of NFC Banking Transactions: Overview on Attacks and Solutions. 1-5 - Emil Suleymanov, Erkin Kirdan, Marc-Oliver Pahl

:
Securing CoAP with DTLS and OSCORE. 1-7 - João Pedro De Lima Cassiano, Sérgio Ribeiro, Alana Almeida:

ICpSAF - Integrated Cross-platform Security Assessment Framework. 1-2 - Nouredine Tamani, Saad El Jaouhari:

Blockchain Meets Formal Logic: Semantics Level Cybersecurity Challenges. 1-6 - Wiem Tounsi:

Cyber Deception, the Ultimate Piece of a Defensive Strategy - Proof of Concept. 1-5 - Paulo Assumpção, Carlos Oliveira, Pablo Ortiz, Wilson S. Melo, Luiz Carmo:

A Secure Cloud-based Architecture for monitoring Cyber-Physical Critical Infrastructures. 1-7 - Pascal Urien

:
Estimating Speedup Factor For Personal HSMs Based On Secure Elements. 1-4 - Khan Reaz

, Gerhard Wunder:
ASOP: A Sovereign and Secure Device Onboarding Protocol for Cloud-based IoT Services. 1-3 - Govinda Mohini G. Bezerra, Tadeu N. Ferreira, Diogo M. F. Mattos:

Assessing Software-Defined Radio Security and Performance in Virtualized Environments for Cloud Radio Access Networks. 1-7 - Junye Li

, Aryan Sharma, Deepak Mishra
, Aruna Seneviratne:
Demonstration of Standalone Intelligent WiFi Sensing for Real-Time Occupancy Monitoring. 1-2 - Diego Canizio Lopes, André Luiz Nasserala Pires, Igor Monteiro Moraes:

The Impact of the Interest Flooding Attack on the Pending Interest Table of CCN routers. 1-5 - Javier Jose Diaz Rivera, Talha Ahmed Khan, Waleed Akbar, Muhammad Afaq

, Wang-Cheol Song:
ZT&T: Secure blockchain-based tokens for service session management in Zero Trust Networks. 1-7 - Fernando Dias de Mello Silva

, Abhishek Kumar Mishra, Aline Carneiro Viana
, Nadjib Achir, Anne Fladenmuller, Luís Henrique M. K. Costa:
Performance Analysis of a Privacy-Preserving Frame Sniffer on a Raspberry Pi. 1-7 - Humberto Mendes, Silvio E. Quincozes

, Vagner Ereno Quincozes
:
A Web User Interface Tool for Metaheuristics-Based Feature Selection Assessment for IDSs. 1-5 - Cherifa Hamroun, Ahmed Amamou, Kamel Haddadou, Hayat Haroun, Guy Pujolle:

A Review On Lexical Based Malicious Domain Name Detection Methods. 1-7 - Khaldoun Al Agha, Pauline Loygue, Guy Pujolle:

Horizontal network for a better cybersecurity. 1-4 - Pedro Horchulhack, Eduardo K. Viegas

, Martin Andreoni Lopez
:
A Stream Learning Intrusion Detection System for Concept Drifting Network Traffic. 1-7 - Y A Joarder

, Carol J. Fung:
A Survey on the Security Issues of QUIC. 1-8 - Carol J. Fung, Vivian Motti

, Katie Zhang, Yanjun Qian:
A Study of User Concerns about Smartphone Privacy. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














