Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 27, Issue 2May 2024
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:2471-2566
EISSN:2471-2574
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN
Reflects downloads up to 26 Dec 2024Bibliometrics
Skip Table Of Content Section
research-article
Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions
Article No.: 14, Pages 1–22https://doi.org/10.1145/3641546

Bitcoin uses blockchain technology to maintain transactions order and provides probabilistic guarantees to prevent double-spending, assuming that an attacker’s computational power does not exceed 50% of the network power. In this article, we design a ...

research-article
AdverSPAM: Adversarial SPam Account Manipulation in Online Social Networks
Article No.: 15, Pages 1–31https://doi.org/10.1145/3643563

In recent years, the widespread adoption of Machine Learning (ML) at the core of complex IT systems has driven researchers to investigate the security and reliability of ML techniques. A very specific kind of threats concerns the adversary mechanisms ...

research-article
Combining Cyber Security Intelligence to Refine Automotive Cyber Threats
Article No.: 16, Pages 1–34https://doi.org/10.1145/3644075

Modern vehicles increasingly rely on electronics, software, and communication technologies (cyber space) to perform their driving task. Over-The-Air (OTA) connectivity further extends the cyber space by creating remote access entry points. Accordingly, ...

research-article
MRAAC: A Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for Android
Article No.: 17, Pages 1–30https://doi.org/10.1145/3648372

Adaptive authentication enables smartphones and enterprise apps to decide when and how to authenticate users based on contextual and behavioral factors. In practice, a system may employ multiple policies to adapt its authentication mechanisms and access ...

research-article
CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain
Article No.: 18, Pages 1–20https://doi.org/10.1145/3652594

The field of cysec is evolving fast. Security professionals are in need of intelligence on past, current and —ideally — upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the ...

research-article
A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation
Article No.: 19, Pages 1–29https://doi.org/10.1145/3652162

Big data has proven to be a very useful tool for companies and users, but companies with larger datasets have ended being more competitive than the others thanks to machine learning or artificial intelligence. Secure multi-party computation (SMPC) allows ...

research-article
Open Access
Toward Robust ASR System against Audio Adversarial Examples using Agitated Logit
Article No.: 20, Pages 1–26https://doi.org/10.1145/3661822

Automatic speech recognition (ASR) systems are vulnerable to audio adversarial examples, which aim at deceiving ASR systems by adding perturbations to benign speech signals. These audio adversarial examples appear indistinguishable from benign audio waves,...

Subjects

Comments