default search action
13th SIN 2020: Virtual Event / Istanbul, Turkey
- Siddika Berna Örs, Atilla Elçi:
SIN 2020: 13th International Conference on Security of Information and Networks, Virtual Event / Istanbul, Turkey, November 4-6, 2020. ACM 2020, ISBN 978-1-4503-8751-4
Session 1: Network Security and Protocols 1
- Nasser Al-Hadhrami, Matthew Collinson, Nir Oren:
A Subjective Network Approach for Cybersecurity Risk Assessment. 1:1-1:8 - Karim Lounis, Mohammad Zulkernine:
Exploiting Race Condition for Wi-Fi Denial of Service Attacks. 2:1-2:8 - Tigran Ovasapyan, Dmitry A. Moskvin, Artem Tsvetkov:
Detection of attacks on the Internet of Things based on intelligent analysis of devices functioning indicators. 3:1-3:7 - Farzan Majdani, Lynne Batik, Andrei Petrovski, Sergey Petrovski:
Detecting Malicious Signal Manipulation in Smart Grids Using Intelligent Analysis of Contextual Data. 4:1-4:8 - Ouissem Ben Fredj, Alaeddine Mihoub, Moez Krichen, Omar Cheikhrouhou, Abdelouahid Derhab:
CyberSecurity Attack Prediction: A Deep Learning Approach. 5:1-5:6 - Arnab Mukherjee, Raju Halder:
PoliceChain: Blockchain-Based Smart Policing System for Smart Cities. 6:1-6:5
Session 2: Security of Cyber-Physical Systems
- Sinem Gur, Simge Demir, Sevval Simsek, Albert Levi:
Secure and Privacy-Aware Gateway for Home Automation Systems. 7:1-7:10 - Giovanni Salzillo, Massimiliano Rak, Felice Moretta:
Threat Modeling based Penetration Testing: The Open Energy Monitor Case study. 8:1-8:8 - Yuning Jiang, Yacine Atif:
An Approach to Discover and Assess Vulnerability Severity Automatically in Cyber-Physical Systems. 9:1-9:8 - Hope Nkiruka Eke, Andrei Petrovski, Hatem Ahriz:
Detection of False Command and Response Injection Attacks for Cyber Physical Systems Security and Resilience. 10:1-10:8 - Jessica Fong, Ron Poet:
Creating Graphical Passwords on a Mobile Phone: Graphical Passwords on a Mobile. 11:1-11:6 - Jiyou Wang, Ron Poet:
Permission Management and User Privacy Based On Android: Permission Management On Android. 12:1-12:5
Session 3: Network Security and Protocols 2
- Richard Beno, Ron Poet:
Hacking Passwords that Satisfy Common Password Policies: Hacking Passwords. 13:1-13:3 - Mamello Thinyane, Debora Irene Christine:
SMART Citizen Cyber Resilience (SC2R) Ontology. 14:1-14:8 - Markus Hornsteiner, Sebastian Groll, Alexander Puchta:
Towards a user-centric IAM entitlement shop - Learnings from the e-commerce. 15:1-15:4 - Kubra Aydin, Rahime Belen Saglam, Shujun Li, Abdullah Bulbul:
When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter. 16:1-16:8 - Zeynep Chousein, Haci Yakup Tetik, Rahime Belen Saglam, Abdullah Bülbül, Shujun Li:
Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions. 17:1-17:8
Session 4: Intrusion Detection
- Beyazit Bestami Yuksel, Serif Bahtiyar, Ayse Yilmazer:
Credit Card Fraud Detection with NCA Dimensionality Reduction. 18:1-18:7 - Maksim Kalameyets, Dmitry Levshun, Sergei Soloviev, Andrey Chechulin, Igor V. Kotenko:
Social networks bot detection using Benford's law. 19:1-19:8 - Mark Vella, Christian Colombo:
SpotCheck: On-Device Anomaly Detection for Android. 20:1-20:6 - Vara Vundavalli, Farhat Lamia Barsha, Mohammad Masum, Hossain Shahriar, Hisham Haddad:
Malicious URL Detection Using Supervised Machine Learning Techniques. 21:1-21:6 - Maxim O. Kalinin, Peter D. Zegzhda:
AI-based Security for the Smart Networks. 22:1-22:4
Session 5: Cryptographic Techniques and Key Management
- Giovanni Di Crescenzo, Glenn Veach:
RPM: Additive Stream Ciphers for Lightweight Communication Security. 23:1-23:8 - Yakov Mironov, Polina Mironova, Konstantin E. Rumyantsev:
Characteristics of a two-stage synchronization algorithm in the system of quantum key distribution with dividing a fiber-optic line into sections with decreasing length. 24:1-24:5 - Valeriy O. Osipyan, Kirill I. Litvinov:
Development of the mathematic model of disymmetric bigram cryptosystem based on a parametric solution family of multi-degree system of Diophantine equations✱. 25:1-25:7 - Liudmila Babenko, Ilya Pisarev:
Modeling replay and integrity violations attacks for cryptographic protocols source codes verification of e-voting system based on blind intermediaries. 26:1-26:3 - Oksana Kilik, Abdulaziz Almehmadi, Khalil El-Khatib:
Eye Gaze-Based Human Error Prevention System: Experts vs. Non-Experts. 27:1-27:7 - Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
Towards systematic honeytoken fingerprinting. 28:1-28:5
Session 6: Computational Intelligence Techniques in Security
- Jonathan Francis Roscoe, Max Smith-Creasey:
Unconventional Mechanisms for Biometric Data Acquisition via Side-Channels. 29:1-29:4 - Stanislav Zhdanov, Ekaterina Maro:
Power Analysis Side-Channel Attacks on Symmetric Block Cipher Magma. 30:1-30:5 - Igor V. Kotenko, Igor Saenko, Fadey Skorik:
Intelligent support for network administrator decisions based on combined neural networks. 31:1-31:8 - Vasiliy M. Krundyshev:
Neural network approach to assessing cybersecurity risks in large-scale dynamic networks. 32:1-32:8 - Mark Sokolov, Kehinde Olufowobi, Nic Herndon:
Visual spoofing in content-based spam detection. 33:1-33:5 - Muhammet Sahin, Serif Bahtiyar:
A Survey on Malware Detection with Deep Learning. 34:1-34:6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.