default search action
5th CSNet 2021: Abu Dhabi, United Arab Emirates
- 5th Cyber Security in Networking Conference, CSNet 2021, Abu Dhabi, United Arab Emirates, October 12-14, 2021. IEEE 2021, ISBN 978-1-6654-0722-9
- Raphaël M. J. I. Larsen, Marc-Oliver Pahl, Gouenou Coatrieux:
Authenticating IDS autoencoders using multipath neural networks. 1-9 - Darine Al-Mohtar, Amani Ramzi Daou, Nour El Madhoun, Rachad Maallawi:
A secure blockchain-based architecture for the COVID-19 data network. 1-5 - Zhaosen Shi, Xuyang Ding, Fagen Li, Yingni Chen, Canran Li:
Mitigation of poisoning attack in federated learning by using historical distance detection. 10-17 - Christian Lübben, Marc-Oliver Pahl:
Advances in ML-Based Anomaly Detection for the IoT. 18-22 - Rodrigo Caldas, Carlos Novo, Ricardo Morla, Luis Cruz, António Carvalho, David Campelo:
Inferring Legacy IoT Device Behavior over a Layer 2 TLS Tunnel. 23-30 - Sanaa Kaddoura:
Classification of malicious and benign websites by network features using supervised machine learning algorithms. 36-40 - Gianmarco Baldini:
Intrusion detection systems in in-vehicle networks based on bag-of-words. 41-48 - Pascal Urien:
Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets. 49-54 - AbdElaziz Saad AbdElaziz AbdElaal, Kai Lehniger, Peter Langendörfer:
Incremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devices. 55-62 - Mwrwan Abubakar, Zakwan Jaroucheh, Ahmed Yassin Al-Dubai, William J. Buchanan:
Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. 63-70 - Mathew Nicho, Maitha Alkhateri:
Modeling Evasive Malware Authoring Techniques. 71-75 - Pedro B. Velloso, David Cordova Morales, Thi Mai Trang Nguyen, Guy Pujolle:
State of the art: Cross chain communications. 76-81 - David Cordova Morales, Pedro B. Velloso, Alexandre Laubé, Thi Mai Trang Nguyen, Guy Pujolle:
C4M: A Partition-Robust Consensus Algorithm for Blockgraph in Mesh Network. 82-89 - Zainab Khalid, Farkhund Iqbal, Faouzi Kamoun, Mohammed Hussain, Liaqat Ali Khan:
Forensic Analysis of the Cisco WebEx Application. 90-97 - Eiman Alothali, Hany Alashwal, Motamen Salih, Kadhim Hayawi:
Real Time Detection of Social Bots on Twitter Using Machine Learning and Apache Kafka. 98-102 - Imran Makhdoom, Kadhim Hayawi, Mohammed Kaosar, Sujith Samuel Mathew, Mohammad Mehedy Masud:
Blockchain-based Secure CIDS Operation. 103-106 - Siem Girmay, Faniel Samsom, Asad Masood Khattak:
AI based Login System using Facial Recognition. 107-109
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.