


default search action
14th SIN 2021: Edinburgh, United Kingdom
- Naghmeh Moradpoor, Atilla Elçi, Andrei Petrovski:
14th International Conference on Security of Information and Networks, SIN 2021, Edinburgh, United Kingdom, December 15-17, 2021. IEEE 2021, ISBN 978-1-7281-9266-6 - Will Abramson
, William J. Buchanan, Sarwar Sayeed, Nikolaos Pitropakis, Owen Lo:
PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching. 1-8 - Sam Grierson
, Craig Thomson, Pavlos Papadopoulos
, Bill Buchanan:
Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems. 1-8 - Espen Nystad, John Eidar Simensen, Christian Raspotnig:
Investigating operative cybersecurity awareness in air traffic control. 1-8 - Deborah Reid, Ian Harris, Andrei Petrovski
:
Comparative Study of Malware Detection Techniques for Industrial Control Systems. 1-6 - Fahri Anil Yerlikaya
, Serif Bahtiyar
:
A Textual Clean-Label Backdoor Attack Strategy against Spam Detection. 1-8 - Naji Najari, Samuel Berlemont, Grégoire Lefebvre, Stefan Duffner, Christophe Garcia:
RADON: Robust Autoencoder for Unsupervised Anomaly Detection. 1-8 - Ivan Murenin, Elena Doynikova
, Igor V. Kotenko
:
Towards Security Decision Support for large-scale Heterogeneous Distributed Information Systems. 1-8 - Muhammad Imran Khan, Simon N. Foley, Barry O'Sullivan:
Privacy Interpretation of Behaviour-based Anomaly Detection Approaches. 1-7 - Mwrwan Abubakar
, Pádraig McCarron, Zakwan Jaroucheh, Ahmed Yassin Al-Dubai, Bill Buchanan:
Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates. 1-8 - Murshedul Arifeen, Andrei Petrovski, Sergey Petrovski
:
Automated Microsegmentation for Lateral Movement Prevention in Industrial Internet of Things (IIoT). 1-6 - Md. Jobair Hossain Faruk
, Paul Miner, Ryan Coughlan, Mohammad Masum, Hossain Shahriar, Victor Clincy, Coskun Cetinkaya:
Smart Connected Aircraft: Towards Security, Privacy, and Ethical Hacking. 1-5 - Daniel Herzinger, Stefan-Lukas Gazdag
, Daniel Loebenberger:
Real-World Quantum-Resistant IPsec. 1-8 - Esra Günsay
, Cansu Betin Onur, Murat Cenk
:
An Improved Range Proof with Base-3 Construction. 1-6 - Truong-An Tran-Quoc, Chi Huynh-Minh, Anh-Duy Tran
:
Towards OS-Independent Memory Images Analyzing: Using Paging Structures in Memory Forensics. 1-8 - Karim Lounis:
Cut It: Deauthentication Attack on Bluetooth. 1-8 - Erim Aydin, Serif Bahtiyar
:
OCIDS: An Online CNN-Based Network Intrusion Detection System for DDoS Attacks with IoT Botnets. 1-8 - Uneneibotejit Otokwala, Andrei Petrovski, Harsha K. Kalutarage
:
Improving Intrusion Detection Through Training Data Augmentation. 1-8 - Murat Burhan Ilter
, Nese Koçak, Erkan Uslu, Oguz Yayla, Nergiz Yuca:
On the Number of Arithmetic Operations in NTT-based Polynomial Multiplication in Kyber and Dilithium Cryptosystems. 1-7 - Saurabh Kumar
, Debadatta Mishra, Sandeep Kumar Shukla:
Android Malware Family Classification: What Works - API Calls, Permissions or API Packages? 1-8 - Owen Cutajar, Naghmeh Moradpoor, Zakwan Jaroucheh:
Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles. 1-4 - Giovanni Di Crescenzo, Matluba Khodjaeva, Vladimir Shpilrain, Delaram Kahrobaei
, Rajesh Krishnan:
Single-Server Delegation of Ring Multiplications from Quasilinear-time Clients. 1-8 - Nuno Oliveira
, Norberto Sousa
, Jorge Oliveira
, Isabel Praça
:
Anomaly Detection in Cyber-Physical Systems: Reconstruction of a Prediction Error Feature Space. 1-5 - Liudmila Babenko, Alexander Shumilin, Dmitry Alekseev:
Development of the algorithm to ensure the protection of confidential data in cloud medical information system. 1-4 - Narges Pourshahrokhi, Max Smith-Creasey, Mona Ghassemian, Samaneh Kouchaki
:
Generative adversarial attacks on motion-based continuous authentication schemes. 1-6 - Hisham Ali, Pavlos Papadopoulos, Jawad Ahmad, Nikolaos Pitropakis, Zakwan Jaroucheh, William J. Buchanan:
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. 1-6 - Igor V. Kotenko
, Igor Saenko
, Oleg Lauta, Mikhail Karpov:
Situational Control of a Computer Network Security System in Conditions of Cyber Attacks. 1-8 - Andres Robles-Durazno, Naghmeh Moradpoor, James McWhinnie, Jorge Porcel-Bustamante:
VNWTS: A Virtual Water Chlorination Process for Cybersecurity Analysis of Industrial Control Systems. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.