default search action
DSC 2024: Tokyo, Japan
- IEEE Conference on Dependable and Secure Computing, DSC 2024, Tokyo, Japan, November 6-8, 2024. IEEE 2024, ISBN 979-8-3315-4028-9
- Boubakr Nour, Makan Pourzandi, Jesus Alatorre, Jan Willekens, Mourad Debbabi:
Chronohunt: Determining Optimal Pace for Automated Alert Analysis in Threat Hunting Using Reinforcement Learning. 1-8 - Toshiro Sawamoto, Mio Suzuki, Yutaro Osako, Takahiro Kasama, Daisuke Inoue, Koji Nakao:
Inherited Threat Reproduction on Open Source 5G Testbed. 9-16 - Chansu Han, Akira Tanaka, Takeshi Takahashi, Sajjad Dadkhah, Ali A. Ghorbani, Tsung-Nan Lin:
Traceability Measurement Analysis of Sustained Internet-Wide Scanners via Darknet. 17-22 - Pramod Kumar, Ayan Seal, Sraban Kumar Mohanty, Haibo Zhang, Kouichi Sakurai:
One Pixel Adversarial Attack for Fooling Deep Learning-Based Facial Expression Recognition Systems. 23-30 - Essam Al Daoud, Laith Al Daoud, Mahmoud Asassfeh, Ala'a Al-Shaikh, Ala'a Saeb Al-Sherideh, Suha Afaneh:
Enhancing Cybersecurity with Transformers: Preventing Phishing Emails and Social Media Scams. 31-36 - Chun-I Fan, Ming-Feng Tsai, Chun-Pin Hu, Ming-Hung Wang:
Sockpuppets Detection Using Markov-Driven Graph Convolutional Networks with Ensemble Learning. 37-44 - Ortal Lavi, Ofir Manor, Tomer Schwartz, Andrés F. Murillo, Ayoub Messous, Motoyoshi Sekiya, Junichi Suga, Kenji Hikichi, Yuki Unno:
Fine-Tuning Large Language Models for Network Traffic Analysis in Cyber Security. 45-50 - Ryoichi Isawa, Nobuyuki Kanaya, Daisuke Inoue:
Information Flow Tracking for Hardware Trojan Detection: a Feasibility Study. 51-57 - Sinan Yavuz, Edwin Naroska, Kai Daniel:
Vulnerabilities and Challenges in the Development of PUF-Based Authentication Protocols on FPGAs: A Brief Review. 58-65 - Hiroki Kuzuno, Toshihiro Yamauchi:
kdMonitor: Kernel Data Monitor for Detecting Kernel Memory Corruption. 66-73 - Yuta Takabayashi, Masahiro Mambo:
Detection Evasion Using eBPF for Linux Fileless Malware. 74-75 - Zhewei Huang, Yin Minn Pa Pa, Katsunari Yoshioka:
Exploring the Impact of LLM Assisted Malware Variants on Anti-Virus Detection. 76-77 - Minjung Kim, Daejin Park:
Enhancing Microcontroller Security Through Volatile Memory-Resident Encrypted Code. 78-79 - Jheng-Jia Huang, Wei-Hsueh Wang, Wen-Yan Dai, Guan-Yu Chen, Yi-Fan Tseng:
Efficient and Secure Multi-Point Communication Framework Supporting Resource Constraints Environment. 80-81 - Masanori Hirotomo, Atsushi Marui, Yoshiaki Shiraishi:
Systematic Construction of Adaptively Decodable Visual Secret Sharing Scheme on Background Color. 82-87 - Akira Kanaoka, Mamoru Abe:
Enhanced Analysis of Cryptographic Library Usage Patterns and Trends in Android Applications. 88-93 - Mansoor Ali Khan, Muhammad Naveed Aman, Biplab Sikdar:
Quantum Guard: Pioneering Quantum-Based Malware Defense for IoT Devices. 94-99 - Mizuho Hasegawa, Yamato Kawaguchi, Hiroaki Takayama, Yasuhiro Kunimine, Hidekazu Tanaka, Shintaro Kawamura, Akira Fujita, Shingo Yasuda, Daisuke Inoue, Nobuyo Fujiwara, Kazuki Takada, Rui Tanabe, Katsunari Yoshioka:
A Case Study of URL Blocklist Maintenance. 100-101 - Masaya Sato, Ryuki Mandai:
Control Displaying of Web Push Notifications Inducing Users to Phishing Websites. 102-103 - Jingyi Sun, Qi Shi, Guodong Jin, Hao Xu, Weichao Chen:
Blockchain-Enabled IoV: Secure Communication and Trustworthy Decision-Making. 104-105 - Yamato Kawaguchi, Kazuki Takada, Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto:
Investigating Black-Market Jobs on Social Networking Service. 106-107 - Shunsuke Nakatani, Hiroki Kuzuno, Makoto Takita, Masami Mohri, Yoshiaki Shiraishi:
Can We Determine Whether a Set of Ethereum Transaction Data Contains Fraudulent Transactions? 108-114 - Ayumu Yamada, Hiroyuki Ito, Kosuke Kajimoto, Tetsuya Kageyama, Taichi Aoki, Takahiro Kasama:
Threat of Technical Support Scams in Japan. 115-122 - Makoto Shimamura, Shingo Matsugaya, Keisuke Sakai, Kosuke Takeshige, Masaki Hashimoto:
An Analysis of the Relationship Between Black-Hat SEO Malware Families Leveraging Information from Redirected Fake E-Commerce Scam Sites. 123-130 - Yi-Chen Hsieh, Tzu-Chi Yu, Chi-Yu Li, Guan-Hua Tu:
InstaMAuth: Instant Mobile Authentication Service Based on 5G Authenticated Call Sessions. 131-138 - Rui Liu, Yaokai Feng, Kouichi Sakurai:
An Approach to Multi-Class Intrusion Detection Based on Feature Subspaces and Weighted Fusion. 139-146 - Hyunwoo Lee, Taewoong Kwon, Jun Lee, Jungsuk Song:
Enhancing Decision-Making of Network Intrusion Analysis Assisted by Explainable AI for Real-Time Security Monitoring. 147-154 - Oratile Leteane, Yirsaw Ayalew, Tshiamo Motshegwa:
A Multi-Package Trust Model for Improving the Trustworthiness of Traceability Data in Blockchain-Based Beef Supply Chain. 155-162
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.