default search action
Search dblp for Publications
export results for "stream:conf/desec:"
@inproceedings{DBLP:conf/desec/DaoudDAAAA24, author = {Essam Al Daoud and Laith Al Daoud and Mahmoud Asassfeh and Ala'a Al{-}Shaikh and Ala'a Saeb Al{-}Sherideh and Suha Afaneh}, title = {Enhancing Cybersecurity with Transformers: Preventing Phishing Emails and Social Media Scams}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {31--36}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00017}, doi = {10.1109/DSC63325.2024.00017}, timestamp = {Mon, 16 Dec 2024 18:50:50 +0100}, biburl = {https://dblp.org/rec/conf/desec/DaoudDAAAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/FanTHW24, author = {Chun{-}I Fan and Ming{-}Feng Tsai and Chun{-}Pin Hu and Ming{-}Hung Wang}, title = {Sockpuppets Detection Using Markov-Driven Graph Convolutional Networks with Ensemble Learning}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {37--44}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00018}, doi = {10.1109/DSC63325.2024.00018}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/FanTHW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HanT0D0L24, author = {Chansu Han and Akira Tanaka and Takeshi Takahashi and Sajjad Dadkhah and Ali A. Ghorbani and Tsung{-}Nan Lin}, title = {Traceability Measurement Analysis of Sustained Internet-Wide Scanners via Darknet}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {17--22}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00015}, doi = {10.1109/DSC63325.2024.00015}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HanT0D0L24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HasegawaKTKTKFY24, author = {Mizuho Hasegawa and Yamato Kawaguchi and Hiroaki Takayama and Yasuhiro Kunimine and Hidekazu Tanaka and Shintaro Kawamura and Akira Fujita and Shingo Yasuda and Daisuke Inoue and Nobuyo Fujiwara and Kazuki Takada and Rui Tanabe and Katsunari Yoshioka}, title = {A Case Study of {URL} Blocklist Maintenance}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {100--101}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00033}, doi = {10.1109/DSC63325.2024.00033}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HasegawaKTKTKFY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HirotomoMS24, author = {Masanori Hirotomo and Atsushi Marui and Yoshiaki Shiraishi}, title = {Systematic Construction of Adaptively Decodable Visual Secret Sharing Scheme on Background Color}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {82--87}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00030}, doi = {10.1109/DSC63325.2024.00030}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HirotomoMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HsiehY0T24, author = {Yi{-}Chen Hsieh and Tzu{-}Chi Yu and Chi{-}Yu Li and Guan{-}Hua Tu}, title = {InstaMAuth: Instant Mobile Authentication Service Based on 5G Authenticated Call Sessions}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {131--138}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00037}, doi = {10.1109/DSC63325.2024.00037}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HsiehY0T24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HuangPY24, author = {Zhewei Huang and Yin Minn Pa Pa and Katsunari Yoshioka}, title = {Exploring the Impact of {LLM} Assisted Malware Variants on Anti-Virus Detection}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {76--77}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00027}, doi = {10.1109/DSC63325.2024.00027}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HuangPY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HuangWDCT24, author = {Jheng{-}Jia Huang and Wei{-}Hsueh Wang and Wen{-}Yan Dai and Guan{-}Yu Chen and Yi{-}Fan Tseng}, title = {Efficient and Secure Multi-Point Communication Framework Supporting Resource Constraints Environment}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {80--81}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00029}, doi = {10.1109/DSC63325.2024.00029}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HuangWDCT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/IsawaKI24, author = {Ryoichi Isawa and Nobuyuki Kanaya and Daisuke Inoue}, title = {Information Flow Tracking for Hardware Trojan Detection: a Feasibility Study}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {51--57}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00020}, doi = {10.1109/DSC63325.2024.00020}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/IsawaKI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/KanaokaA24, author = {Akira Kanaoka and Mamoru Abe}, title = {Enhanced Analysis of Cryptographic Library Usage Patterns and Trends in Android Applications}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {88--93}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00031}, doi = {10.1109/DSC63325.2024.00031}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/KanaokaA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/KawaguchiTPTYM24, author = {Yamato Kawaguchi and Kazuki Takada and Yin Minn Pa Pa and Rui Tanabe and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Investigating Black-Market Jobs on Social Networking Service}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {106--107}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00036}, doi = {10.1109/DSC63325.2024.00036}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/KawaguchiTPTYM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/KhanA024, author = {Mansoor Ali Khan and Muhammad Naveed Aman and Biplab Sikdar}, title = {Quantum Guard: Pioneering Quantum-Based Malware Defense for IoT Devices}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {94--99}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00032}, doi = {10.1109/DSC63325.2024.00032}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/KhanA024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/KimP24, author = {Minjung Kim and Daejin Park}, title = {Enhancing Microcontroller Security Through Volatile Memory-Resident Encrypted Code}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {78--79}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00028}, doi = {10.1109/DSC63325.2024.00028}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/KimP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/KumarSM0S24, author = {Pramod Kumar and Ayan Seal and Sraban Kumar Mohanty and Haibo Zhang and Kouichi Sakurai}, title = {One Pixel Adversarial Attack for Fooling Deep Learning-Based Facial Expression Recognition Systems}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {23--30}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00016}, doi = {10.1109/DSC63325.2024.00016}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/KumarSM0S24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/KuzunoY24, author = {Hiroki Kuzuno and Toshihiro Yamauchi}, title = {kdMonitor: Kernel Data Monitor for Detecting Kernel Memory Corruption}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {66--73}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00022}, doi = {10.1109/DSC63325.2024.00022}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/KuzunoY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LaviMSMMSSHU24, author = {Ortal Lavi and Ofir Manor and Tomer Schwartz and Andr{\'{e}}s F. Murillo and Ayoub Messous and Motoyoshi Sekiya and Junichi Suga and Kenji Hikichi and Yuki Unno}, title = {Fine-Tuning Large Language Models for Network Traffic Analysis in Cyber Security}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {45--50}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00019}, doi = {10.1109/DSC63325.2024.00019}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LaviMSMMSSHU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LeeKLS24, author = {Hyunwoo Lee and Taewoong Kwon and Jun Lee and Jungsuk Song}, title = {Enhancing Decision-Making of Network Intrusion Analysis Assisted by Explainable {AI} for Real-Time Security Monitoring}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {147--154}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00039}, doi = {10.1109/DSC63325.2024.00039}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LeeKLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LeteaneAM24, author = {Oratile Leteane and Yirsaw Ayalew and Tshiamo Motshegwa}, title = {A Multi-Package Trust Model for Improving the Trustworthiness of Traceability Data in Blockchain-Based Beef Supply Chain}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {155--162}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00040}, doi = {10.1109/DSC63325.2024.00040}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LeteaneAM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LiuFS24, author = {Rui Liu and Yaokai Feng and Kouichi Sakurai}, title = {An Approach to Multi-Class Intrusion Detection Based on Feature Subspaces and Weighted Fusion}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {139--146}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00038}, doi = {10.1109/DSC63325.2024.00038}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LiuFS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/NakataniKTMS24, author = {Shunsuke Nakatani and Hiroki Kuzuno and Makoto Takita and Masami Mohri and Yoshiaki Shiraishi}, title = {Can We Determine Whether a Set of Ethereum Transaction Data Contains Fraudulent Transactions?}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {108--114}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00023}, doi = {10.1109/DSC63325.2024.00023}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/NakataniKTMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/NourPAWD24, author = {Boubakr Nour and Makan Pourzandi and Jesus Alatorre and Jan Willekens and Mourad Debbabi}, title = {Chronohunt: Determining Optimal Pace for Automated Alert Analysis in Threat Hunting Using Reinforcement Learning}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {1--8}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00013}, doi = {10.1109/DSC63325.2024.00013}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/NourPAWD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/SatoM24, author = {Masaya Sato and Ryuki Mandai}, title = {Control Displaying of Web Push Notifications Inducing Users to Phishing Websites}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {102--103}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00034}, doi = {10.1109/DSC63325.2024.00034}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/SatoM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/SawamotoSOKIN24, author = {Toshiro Sawamoto and Mio Suzuki and Yutaro Osako and Takahiro Kasama and Daisuke Inoue and Koji Nakao}, title = {Inherited Threat Reproduction on Open Source 5G Testbed}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {9--16}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00014}, doi = {10.1109/DSC63325.2024.00014}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/SawamotoSOKIN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ShimamuraMSTH24, author = {Makoto Shimamura and Shingo Matsugaya and Keisuke Sakai and Kosuke Takeshige and Masaki Hashimoto}, title = {An Analysis of the Relationship Between Black-Hat {SEO} Malware Families Leveraging Information from Redirected Fake E-Commerce Scam Sites}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {123--130}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00025}, doi = {10.1109/DSC63325.2024.00025}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ShimamuraMSTH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/SunSJ0C24, author = {Jingyi Sun and Qi Shi and Guodong Jin and Hao Xu and Weichao Chen}, title = {Blockchain-Enabled IoV: Secure Communication and Trustworthy Decision-Making}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {104--105}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00035}, doi = {10.1109/DSC63325.2024.00035}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/SunSJ0C24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/TakabayashiM24, author = {Yuta Takabayashi and Masahiro Mambo}, title = {Detection Evasion Using eBPF for Linux Fileless Malware}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {74--75}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00026}, doi = {10.1109/DSC63325.2024.00026}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/TakabayashiM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/YamadaIKKAK24, author = {Ayumu Yamada and Hiroyuki Ito and Kosuke Kajimoto and Tetsuya Kageyama and Taichi Aoki and Takahiro Kasama}, title = {Threat of Technical Support Scams in Japan}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {115--122}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00024}, doi = {10.1109/DSC63325.2024.00024}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/YamadaIKKAK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/YavuzND24, author = {Sinan Yavuz and Edwin Naroska and Kai Daniel}, title = {Vulnerabilities and Challenges in the Development of PUF-Based Authentication Protocols on FPGAs: {A} Brief Review}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, pages = {58--65}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024.00021}, doi = {10.1109/DSC63325.2024.00021}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/YavuzND24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/desec/2024, title = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2024, Tokyo, Japan, November 6-8, 2024}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSC63325.2024}, doi = {10.1109/DSC63325.2024}, isbn = {979-8-3315-4028-9}, timestamp = {Mon, 16 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AnastasovaKLAK23, author = {Mila Anastasova and Rabih El Khatib and Aimee Laclaustra and Reza Azarderakhsh and Mehran Mozaffari Kermani}, title = {Highly Optimized Curve448 and Ed448 design in wolfSSL and Side-Channel Evaluation on Cortex-M4}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354154}, doi = {10.1109/DSC61021.2023.10354154}, timestamp = {Tue, 23 Jan 2024 20:30:56 +0100}, biburl = {https://dblp.org/rec/conf/desec/AnastasovaKLAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/BaigA23, author = {Mirza Athar Baig and Muhammad Naveed Aman}, title = {Exploiting Hardware Imperfections for {GPS} Spoofing Detection using Clock Variations}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354086}, doi = {10.1109/DSC61021.2023.10354086}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/BaigA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/BonabHS23, author = {Parisa Ansari Bonab and James Holland and Arman Sargolzaei}, title = {An Observer-Based Control for a Networked Control of Permanent Magnet Linear Motors under a False-Data-Injection Attack}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354110}, doi = {10.1109/DSC61021.2023.10354110}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/BonabHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/CardonaLopezCGF23, author = {Manuel Alejandro Cardona{-}L{\'{o}}pez and Juan Carlos Chimal{-}Egu{\'{\i}}a and V{\'{\i}}ctor Manuel Silva Garc{\'{\i}}a and Rolando Flores{-}Carapia}, title = {The Substitution-Boxes Incompatibility in {JPEG} Image Encryption}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354118}, doi = {10.1109/DSC61021.2023.10354118}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/CardonaLopezCGF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChenZRABL23, author = {Jingdi Chen and Lei Zhang and Joseph Riem and Gina C. Adam and Nathaniel D. Bastian and Tian Lan}, title = {{RIDE:} Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware Architecture}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354120}, doi = {10.1109/DSC61021.2023.10354120}, timestamp = {Thu, 05 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChenZRABL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/CooperWFLS23, author = {Eric Cooper and Eric Weese and Alex Fortson and Dan Lo and Yong Shi}, title = {Cyber Security in Blockchain}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--11}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354161}, doi = {10.1109/DSC61021.2023.10354161}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/CooperWFLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/CunninghamRushHNS23, author = {Jonas Cunningham{-}Rush and James Holland and Shirin Noei and Arman Sargolzaei}, title = {Designing and Testing {A} Secure Cooperative Adaptive Cruise Control under False Data Injection Attack}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354170}, doi = {10.1109/DSC61021.2023.10354170}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/CunninghamRushHNS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/DavariZ23, author = {Maryam Davari and Mohammad Zulkernine}, title = {Automatic Conversion of {ABAC} Policies for {RBAC} Systems}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354157}, doi = {10.1109/DSC61021.2023.10354157}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/DavariZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/DoshiY23, author = {Keval Doshi and Yasin Yilmaz}, title = {Privacy-Preserving Video Understanding via Transformer-based Federated Learning}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354099}, doi = {10.1109/DSC61021.2023.10354099}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/DoshiY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/DoshiY23a, author = {Keval Doshi and Yasin Yilmaz}, title = {Semantic Video Transformer for Robust Action Recognition}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354225}, doi = {10.1109/DSC61021.2023.10354225}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/DoshiY23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/EkleU23, author = {Ocheme Anthony Ekle and Denis A. Ulybyshev}, title = {Cyber Risk Evaluation for Android-based Devices}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354217}, doi = {10.1109/DSC61021.2023.10354217}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/EkleU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Guan23, author = {Albert Guan}, title = {Secure Outsourcing of Boolean Formulas Truth Assignment Problem}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354147}, doi = {10.1109/DSC61021.2023.10354147}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Guan23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HaghshenasN23, author = {Seyed Hamed Haghshenas and Mia Naeini}, title = {Impact of Topology Noise on Power Systems State Estimation Using a Temporal {GCN} Framework}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354228}, doi = {10.1109/DSC61021.2023.10354228}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HaghshenasN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HoreNXSBL23, author = {Soumyadeep Hore and Quoc H. Nguyen and Yulun Xu and Ankit Shah and Nathaniel D. Bastian and Trung Le}, title = {Empirical Evaluation of Autoencoder Models for Anomaly Detection in Packet-based {NIDS}}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354098}, doi = {10.1109/DSC61021.2023.10354098}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HoreNXSBL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HossainIZSTA23, author = {Md. Zarif Hossain and Ahmed Imteaj and Saika Zaman and Abdur R. Shahid and Sajedul Talukder and M. Hadi Amini}, title = {{FLID:} Intrusion Attack and Defense Mechanism for Federated Learning Empowered Connected Autonomous Vehicles (CAVs) Application}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354149}, doi = {10.1109/DSC61021.2023.10354149}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HossainIZSTA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/JemalL23, author = {Muna Jemal and Dan Chia{-}Tien Lo}, title = {Detection of Ransomware Attack Using Deep Learning}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354186}, doi = {10.1109/DSC61021.2023.10354186}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/JemalL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/KhaterKASBS23, author = {Heba M. Khater and Mohamad Khayat and Saed Alrabaee and Mohamed Adel Serhani and Ezedin Barka and Farag M. Sallabi}, title = {{AI} Techniques for Software Vulnerability Detection and Mitigation}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354233}, doi = {10.1109/DSC61021.2023.10354233}, timestamp = {Sat, 24 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/KhaterKASBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/KohliAS23, author = {Varun Kohli and Muhammad Naveed Aman and Biplab Sikdar}, title = {{SRAM} and Generative Network-based Physical Fingerprinting for Trust Management in the Internet of Things}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354210}, doi = {10.1109/DSC61021.2023.10354210}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/KohliAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LeeCS23, author = {Shanhsin Lee and Yung{-}Shiu Chen and Shiuhpyng Winston Shieh}, title = {CoDex: Cross-Tactic Correlation System for Data Exfiltration Detection}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354203}, doi = {10.1109/DSC61021.2023.10354203}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LeeCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/MallisseryW23, author = {Sanoop Mallissery and Yu{-}Sung Wu}, title = {Enriching the Semantics of Information Flow Tracking with Source-Level Memory Allocation Event Logging}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354156}, doi = {10.1109/DSC61021.2023.10354156}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/MallisseryW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/MaryamH23, author = {Urva Maryam and Mehdi Hussain}, title = {A Study on the Forensic Analysis of Airlines Applications on Android Operating System}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354207}, doi = {10.1109/DSC61021.2023.10354207}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/MaryamH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/McCollumBR23, author = {Kelson J. McCollum and Nathaniel D. Bastian and Johannes O. Royset}, title = {Towards Robust Learning using Diametrical Risk Minimization for Network Intrusion Detection}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354173}, doi = {10.1109/DSC61021.2023.10354173}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/McCollumBR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/MonkamLB23, author = {Galamo Monkam and Michael J. De Lucia and Nathaniel D. Bastian}, title = {Preprocessing Network Traffic using Topological Data Analysis for Data Poisoning Detection}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354143}, doi = {10.1109/DSC61021.2023.10354143}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/MonkamLB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/MyersBABHJJKSYP23, author = {Audun Myers and Alyson Bittner and Sinan Aksoy and Daniel M. Best and Gregory Henselman{-}Petrusek and Helen Jenne and Cliff A. Joslyn and Bill Kay and Garret Seppala and Stephen J. Young and Emilie Purvine}, title = {Malicious Cyber Activity Detection using Zigzag Persistence}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354204}, doi = {10.1109/DSC61021.2023.10354204}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/MyersBABHJJKSYP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/NoumaY23, author = {Saif E. Nouma and Attila A. Yavuz}, title = {Lightweight Digital Signatures for Internet of Things: Current and Post-Quantum Trends and Visions}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--2}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354177}, doi = {10.1109/DSC61021.2023.10354177}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/NoumaY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/OmarGG23, author = {Tamer Omar and Barret Griffin and Jose Garcia}, title = {{ML} based Detection and Mitigation Scheme for DoS attacks on {SDN} Controllers}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354117}, doi = {10.1109/DSC61021.2023.10354117}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/OmarGG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Pu23, author = {Cong Pu}, title = {Privacy-Preserving and Fault-Tolerant Data Aggregation Protocol for Internet of Drones}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354242}, doi = {10.1109/DSC61021.2023.10354242}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Pu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/SachidanandaPSLL23, author = {Vinay Sachidananda and Rajendra Patil and Akshay Sachdeva and Kwok{-}Yan Lam and Yang Liu}, title = {APTer: Towards the Investigation of {APT} Attribution}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354155}, doi = {10.1109/DSC61021.2023.10354155}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/SachidanandaPSLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ShahrivarMS23, author = {Pojan Shahrivar and Stuart Millar and Ezzeldin Shereen}, title = {Detecting Web Application {DAST} Attacks with Machine Learning}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354106}, doi = {10.1109/DSC61021.2023.10354106}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ShahrivarMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/TsaiW23, author = {Tung{-}Lin Tsai and Pei{-}Yuan Wu}, title = {SepMM: {A} General Matrix Multiplication Optimization Approach for Privacy-Preserving Machine Learning}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354193}, doi = {10.1109/DSC61021.2023.10354193}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/TsaiW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/TurhanTO23, author = {Tuncer Turhan and Hakan Tekgul and Ozcan Ozturk}, title = {Compiler-Supported Selective Software Fault Tolerance}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354221}, doi = {10.1109/DSC61021.2023.10354221}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/TurhanTO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/YehJH23, author = {Lo{-}Yao Yeh and Jun{-}Qian Jian and Jen{-}Wei Hu}, title = {Decentralized and Incentivized Voting System with Web3 Technology Ensuring Anonymity and Preventing Double Voting}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354239}, doi = {10.1109/DSC61021.2023.10354239}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/YehJH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/desec/2023, title = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023}, doi = {10.1109/DSC61021.2023}, isbn = {979-8-3503-8211-2}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AljabriMS22, author = {Jawhara Aljabri and Anna Lito Michala and Jeremy Singer}, title = {{ELSA:} Edge Lightweight Searchable Attribute-based encryption Multi-keyword Scalability}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--4}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888846}, doi = {10.1109/DSC54232.2022.9888846}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/AljabriMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AlsalemiAMD22, author = {Abdullah Alsalemi and Abbes Amira and Hossein Malekmohamadi and Kegong Diao}, title = {Facilitating Deep Learning for Edge Computing: {A} Case Study on Data Classification}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--4}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888939}, doi = {10.1109/DSC54232.2022.9888939}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/AlsalemiAMD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/BartwalMNS22, author = {Upendra Bartwal and Subhasis Mukhopadhyay and Rohit Negi and Sandeep K. Shukla}, title = {Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888808}, doi = {10.1109/DSC54232.2022.9888808}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/BartwalMNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Breuer22, author = {Peter T. Breuer}, title = {High Speed Encrypted Computing: Stochastic Confusion and Lies in a Secret Computer}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888892}, doi = {10.1109/DSC54232.2022.9888892}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/Breuer22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/CabralSV22, author = {Warren Z. Cabral and Leslie F. Sikos and Craig Valli}, title = {Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888911}, doi = {10.1109/DSC54232.2022.9888911}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/CabralSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChenW22, author = {Shao{-}Fu Chen and Yu{-}Sung Wu}, title = {Linux Kernel Module Development with Rust}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--2}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888822}, doi = {10.1109/DSC54232.2022.9888822}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/ChenW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChowdhuryB22, author = {Ipshita Roy Chowdhury and Deepayan Bhowmik}, title = {Capturing Malware Behaviour with Ontology-based Knowledge Graphs}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888860}, doi = {10.1109/DSC54232.2022.9888860}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/ChowdhuryB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/CodyRRHCKKPBB22, author = {Tyler Cody and Abdul Rahman and Christopher Redino and Lanxiao Huang and Ryan Clark and Akshay Kakkar and Deepak Kushwaha and Paul Park and Peter A. Beling and Edward Bowen}, title = {Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888919}, doi = {10.1109/DSC54232.2022.9888919}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/CodyRRHCKKPBB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/DejesusC22, author = {Jason Dejesus and John A. Chandy}, title = {Cache Locking and Encryption to Prevent Memory Snooping in Embedded Systems}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888802}, doi = {10.1109/DSC54232.2022.9888802}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/DejesusC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/FanLS22, author = {Chun{-}I Fan and Yen{-}Lin Lai and Cheng{-}Han Shie}, title = {Clustering-Based Network Intrusion Detection System}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888886}, doi = {10.1109/DSC54232.2022.9888886}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/FanLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/FanSHBMT22, author = {Chun{-}I Fan and Cheng{-}Han Shie and Che{-}Ming Hsu and Tao Ban and Tomohiro Morikawa and Takeshi Takahashi}, title = {IoT Botnet Detection Based on the Behaviors of {DNS} Queries}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888913}, doi = {10.1109/DSC54232.2022.9888913}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/FanSHBMT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/FraunholzSKZ22, author = {Daniel Fraunholz and Richard Sch{\"{o}}rghofer{-}Vrinssen and Hartmut K{\"{o}}nig and Richard M. Zahoransky}, title = {Show Me Your Attach Request and I'll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile Networks}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888899}, doi = {10.1109/DSC54232.2022.9888899}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/FraunholzSKZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/FreasAH22, author = {Robert L. Freas and Heather F. Adair and Eman M. Hammad}, title = {An Engineering Process Framework for Cybersecurity Incident Response Assessment}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888795}, doi = {10.1109/DSC54232.2022.9888795}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/FreasAH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HalabiCAZ22, author = {Talal Halabi and Aawista Chaudhry and Sarra M. Alqahtani and Mohammad Zulkernine}, title = {A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888873}, doi = {10.1109/DSC54232.2022.9888873}, timestamp = {Sat, 23 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HalabiCAZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HuangW22, author = {Zijie Huang and Yulei Wu}, title = {A Survey on Explainable Anomaly Detection for Industrial Internet of Things}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888874}, doi = {10.1109/DSC54232.2022.9888874}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/HuangW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/KassimSLA22, author = {Sharifah Roziah Binti Mohd Kassim and Solahuddin Bin Shamsuddin and Shujun Li and Budi Arief}, title = {How National CSIRTs Operate: Personal Observations and Opinions from MyCERT}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--2}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888803}, doi = {10.1109/DSC54232.2022.9888803}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/KassimSLA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/KhareLIMCK22, author = {Yash Khare and Kumud Lakara and Maruthi Seshidhar Inukonda and Sparsh Mittal and Mahesh Chandra and Arvind Kaushik}, title = {Design and Analysis of Novel Bit-flip Attacks and Defense Strategies for DNNs}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888943}, doi = {10.1109/DSC54232.2022.9888943}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/KhareLIMCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/KoberlBS22, author = {Alexander K{\"{o}}berl and Holger Bock and Christian Steger}, title = {A Novel Approach for Providing Client-Verifiable and Efficient Access to Private Smart Contracts}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888820}, doi = {10.1109/DSC54232.2022.9888820}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/KoberlBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LaingMRSW22, author = {Thalia Laing and Eduard Marin and Mark D. Ryan and Joshua Schiffman and Ga{\"{e}}tan Wattiau}, title = {Symbolon: Enabling Flexible Multi-device-based User Authentication}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--12}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888854}, doi = {10.1109/DSC54232.2022.9888854}, timestamp = {Mon, 31 Oct 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LaingMRSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LiYLSZ22, author = {Mingchu Li and Linlin Yang and Kun Lu and Syed Bilal Hussain Shah and Xiao Zheng}, title = {Device-to-Device Task Offloading in a Stochastic Invalid-Device Scenario with Social Awareness}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888905}, doi = {10.1109/DSC54232.2022.9888905}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/LiYLSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LoLSGP22, author = {Wai Weng Lo and Siamak Layeghy and Mohanad Sarhan and Marcus Gallagher and Marius Portmann}, title = {Graph Neural Network-based Android Malware Classification with Jumping Knowledge}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888878}, doi = {10.1109/DSC54232.2022.9888878}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/LoLSGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/MowHH22, author = {Wei{-}Loon Mow and Shih{-}Kun Huang and Hsu{-}Chun Hsiao}, title = {{LAEG:} Leak-based {AEG} using Dynamic Binary Analysis to Defeat {ASLR}}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888796}, doi = {10.1109/DSC54232.2022.9888796}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/MowHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/PapadogiannakiT22, author = {Eva Papadogiannaki and Giorgos Tsirantonakis and Sotiris Ioannidis}, title = {Network Intrusion Detection in Encrypted Traffic}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888942}, doi = {10.1109/DSC54232.2022.9888942}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/PapadogiannakiT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/RabheruHM22, author = {Rishi Rabheru and Hazim Hanif and Sergio Maffeis}, title = {A Hybrid Graph Neural Network Approach for Detecting {PHP} Vulnerabilities}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888816}, doi = {10.1109/DSC54232.2022.9888816}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/RabheruHM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/RaiMM22, author = {Sudhir Kumar Rai and Ashish Mittal and Sparsh Mittal}, title = {A Node-Embedding Features Based Machine Learning Technique for Dynamic Malware Detection}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888836}, doi = {10.1109/DSC54232.2022.9888836}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/RaiMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/RiveraWAT22, author = {Abel O. Gomez Rivera and Evan M. White and Jaime C. Acosta and Deepak K. Tosh}, title = {Enabling Device Trustworthiness for SDN-Enabled Internet -of- Battlefield Things}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888903}, doi = {10.1109/DSC54232.2022.9888903}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/RiveraWAT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ScholeyZ22, author = {Andrew Scholey and Pooneh Bagheri Zadeh}, title = {A Digital Forensics Live Suspicious Activity Toolkit To Assist Investigators With Sexual Harm Prevention Order Monitoring}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888937}, doi = {10.1109/DSC54232.2022.9888937}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/ScholeyZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ScottPLP22, author = {Emma Scott and Sakshyam Panda and George Loukas and Emmanouil Panaousis}, title = {Optimising user security recommendations for AI-powered smart-homes}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888829}, doi = {10.1109/DSC54232.2022.9888829}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ScottPLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ShahAAAGBDHDRH22, author = {Awais Aziz Shah and Ahsan Adeel and Jawad Ahmad and Ahmed Yassin Al{-}Dubai and Mandar Gogate and Abhijeet Bishnu and Muhammad Diyan and Tassadaq Hussain and Kia Dashtipour and Tharm Ratnarajah and Amir Hussain}, title = {A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888823}, doi = {10.1109/DSC54232.2022.9888823}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/ShahAAAGBDHDRH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ShahidAPZ22, author = {Muhammad Omer Shahid and Chuadhry Mujeeb Ahmed and Venkata Reddy Palleti and Jianying Zhou}, title = {Curse of System Complexity and Virtue of Operational Invariants: Machine Learning based System Modeling and Attack Detection in {CPS}}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888940}, doi = {10.1109/DSC54232.2022.9888940}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ShahidAPZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/StreiffND22, author = {Joshua Streiff and Naheem Noah and Sanchari Das}, title = {A Call for a New Privacy {\&} Security Regime for IoT Smart Toys}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888910}, doi = {10.1109/DSC54232.2022.9888910}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/StreiffND22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/TamemiRRKA22, author = {Heba Takruri Tamemi and Manar Rabayah and Kareem Abu Raad and Mai Kanaan and Ahmed Awad}, title = {A Low Cost Blockchain-Based Framework for Preserving Critical Data in Health-Care IoT Systems Using Classification}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888800}, doi = {10.1109/DSC54232.2022.9888800}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/TamemiRRKA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/TanSZ22, author = {Teik Guan Tan and Pawel Szalachowski and Jianying Zhou}, title = {Securing Password Authentication for Web-based Applications}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--10}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888923}, doi = {10.1109/DSC54232.2022.9888923}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/TanSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/TurnbullTB22, author = {Leigh Turnbull and Zhiyuan Tan and Kehinde O. Babaagba}, title = {A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888906}, doi = {10.1109/DSC54232.2022.9888906}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/TurnbullTB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/VarkeyJS22, author = {Mariam Varkey and Jacob John and Umadevi K. S.}, title = {Automated Anomaly Detection Tool for Industrial Control System}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888891}, doi = {10.1109/DSC54232.2022.9888891}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/VarkeyJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/VecileLGS22, author = {Spencer Vecile and Kyle Lacroix and Katarina Grolinger and Jagath Samarabandu}, title = {Malicious and Benign {URL} Dataset Generation Using Character-Level {LSTM} Models}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888835}, doi = {10.1109/DSC54232.2022.9888835}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/VecileLGS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WangLLWB22, author = {Fangwei Wang and Yuanyuan Lu and Qingru Li and Changguang Wang and Yonglei Bai}, title = {A Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation Method}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888884}, doi = {10.1109/DSC54232.2022.9888884}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/WangLLWB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WenM22, author = {Qiang Wen and Fumio Machida}, title = {Reliability Models and Analysis for Triple-model with Triple-input Machine Learning Systems}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888825}, doi = {10.1109/DSC54232.2022.9888825}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/WenM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/XieGTWW22, author = {Nanjiang Xie and Zheng Gong and Yufeng Tang and Lei Wang and Yamin Wen}, title = {Protecting White-Box Block Ciphers with Galois/Counter Mode}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888845}, doi = {10.1109/DSC54232.2022.9888845}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/XieGTWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/XieLLSZ22, author = {Yufeng Xie and Mingchu Li and Kun Lu and Syed Bilal Hussain Shah and Xiao Zheng}, title = {Multi-task Learning Model based on Multiple Characteristics and Multiple Interests for {CTR} prediction}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888898}, doi = {10.1109/DSC54232.2022.9888898}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/XieLLSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/YuanL22, author = {Haiyue Yuan and Shujun Li}, title = {Cyber Security Risks of Net Zero Technologies}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--11}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888883}, doi = {10.1109/DSC54232.2022.9888883}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/YuanL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ZengCCCCY22, author = {Jiang{-}Yi Zeng and Li{-}En Chang and Hsin{-}Hung Cho and Chi{-}Yuan Chen and Han{-}Chieh Chao and Kuo{-}Hui Yeh}, title = {Using Poisson Distribution to Enhance CNN-based NB-IoT LDoS Attack Detection}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888864}, doi = {10.1109/DSC54232.2022.9888864}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/ZengCCCCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ZhangCG22, author = {Lu Zhang and Reginald Cushing and Paola Grosso}, title = {Defending {OC-SVM} based {IDS} from poisoning attacks}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888908}, doi = {10.1109/DSC54232.2022.9888908}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ZhangCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ZhaoLLPD22, author = {Bowen Zhao and Yingjiu Li and Ximeng Liu and HweeHwa Pang and Robert H. Deng}, title = {{FREED:} An Efficient Privacy-Preserving Solution for Person Re-IDentification}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888863}, doi = {10.1109/DSC54232.2022.9888863}, timestamp = {Mon, 16 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/ZhaoLLPD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ZhengZXY22, author = {Changgang Zheng and Chen Zhen and Haiyong Xie and Shufan Yang}, title = {Towards Secure Multi-Agent Deep Reinforcement Learning: Adversarial Attacks and Countermeasures}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888828}, doi = {10.1109/DSC54232.2022.9888828}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/ZhengZXY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/desec/2022, title = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022}, doi = {10.1109/DSC54232.2022}, isbn = {978-1-6654-2141-6}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/00010PC21, author = {Wenjuan Li and Weizhi Meng and Javier Parra{-}Arnau and Kim{-}Kwang Raymond Choo}, title = {Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346232}, doi = {10.1109/DSC49826.2021.9346232}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/00010PC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/0001TWYGI21, author = {Chien{-}Ming Chen and Zhuoyu Tie and Eric Ke Wang and Kuo{-}Hui Yeh and Wensheng Gan and SK Hafizul Islam}, title = {A Reinforced Dynamic Multi-keyword Ranked Search with Forward Privacy}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346267}, doi = {10.1109/DSC49826.2021.9346267}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/0001TWYGI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AnC21, author = {Haoyang An and Jiageng Chen}, title = {ExamChain: {A} Privacy-Preserving Onscreen Marking System based on Consortium Blockchain}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346262}, doi = {10.1109/DSC49826.2021.9346262}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/AnC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/BandiTA21, author = {Nahid Bandi and Hesam Tajbakhsh and Morteza Analoui}, title = {FastMove: Fast {IP} switching Moving Target Defense to mitigate {DDOS} Attacks}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346278}, doi = {10.1109/DSC49826.2021.9346278}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/BandiTA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChaoCC21, author = {Wei{-}Chieh Chao and Chung{-}Kuan Chen and Chen{-}Mou Cheng}, title = {Cryfind: Using Static Analysis to Identify Cryptographic Algorithms in Binary Executables}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--2}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346229}, doi = {10.1109/DSC49826.2021.9346229}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChaoCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChaudhuryDS21, author = {Shion Samadder Chaudhury and Sabyasachi Dutta and Kouichi Sakurai}, title = {Perpetual Secret Sharing from Dynamic Data Structures}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346272}, doi = {10.1109/DSC49826.2021.9346272}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/ChaudhuryDS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChenGH021, author = {Jiahui Chen and Wensheng Gan and Muchuang Hu and Chien{-}Ming Chen}, title = {On the Construction of a Post-Quantum Blockchain}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346253}, doi = {10.1109/DSC49826.2021.9346253}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChenGH021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChenYC21, author = {Yi{-}Ming Chen and Chun{-}Hsien Yang and Guo{-}Chung Chen}, title = {Using Generative Adversarial Networks for Data Augmentation in Android Malware Detection}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346277}, doi = {10.1109/DSC49826.2021.9346277}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/ChenYC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Chien21, author = {Hung{-}Yu Chien}, title = {Highly Efficient Anonymous IoT Authentication using Composite Hashing}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346263}, doi = {10.1109/DSC49826.2021.9346263}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Chien21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChiuMJ21, author = {Wei{-}Yang Chiu and Weizhi Meng and Christian Damsgaard Jensen}, title = {ChainPKI - Towards Ethash-based Decentralized {PKI} with Privacy Enhancement}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346273}, doi = {10.1109/DSC49826.2021.9346273}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/ChiuMJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/DebnathSDK21, author = {Sumit Kumar Debnath and Kouichi Sakurai and Kunal Dey and Nibedita Kundu}, title = {Secure Outsourced Private Set Intersection with Linear Complexity}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346230}, doi = {10.1109/DSC49826.2021.9346230}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/DebnathSDK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/DinhP21, author = {Phuc Trinh Dinh and Minho Park}, title = {{BDF-SDN:} {A} Big Data Framework for DDoS Attack Detection in Large-Scale SDN-Based Cloud}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346269}, doi = {10.1109/DSC49826.2021.9346269}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/DinhP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/DuttaPORS21, author = {Sabyasachi Dutta and Arinjita Paul and Rocki H. Ozaki and C. Pandu Rangan and Kouichi Sakurai}, title = {A Distributed Ledger Management Mechanism for Storing and Selling Private Data}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346258}, doi = {10.1109/DSC49826.2021.9346258}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/DuttaPORS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/FanTF21, author = {Chun{-}I Fan and Yi{-}Fan Tseng and Cheng{-}Chun Feng}, title = {CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346247}, doi = {10.1109/DSC49826.2021.9346247}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/FanTF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/FischerRLV21, author = {Marc Fischer and Oliver Riedel and Armin Lechler and Alexander Verl}, title = {Arithmetic Coding for Floating-Point Numbers}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346236}, doi = {10.1109/DSC49826.2021.9346236}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/FischerRLV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/FukudaO21, author = {Tatsuhiro Fukuda and Kazumasa Omote}, title = {Efficient Blockchain-based IoT Firmware Update Considering Distribution Incentives}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346265}, doi = {10.1109/DSC49826.2021.9346265}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/FukudaO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/GengNH21, author = {Tieming Geng and Laurent Njilla and Chin{-}Tser Huang}, title = {Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346270}, doi = {10.1109/DSC49826.2021.9346270}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/GengNH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/GuanC21, author = {Albert Guan and Chia{-}Mei Chen}, title = {A Novel Verification scheme for Resisting Password Guessing Attacks}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--2}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346234}, doi = {10.1109/DSC49826.2021.9346234}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/GuanC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HiranoKK21, author = {Takato Hirano and Yutaka Kawai and Yoshihiro Koseki}, title = {DBMS-Friendly Searchable Symmetric Encryption: Constructing Index Generation Suitable for Database Management Systems}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346255}, doi = {10.1109/DSC49826.2021.9346255}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HiranoKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HsuFW21, author = {Ruei{-}Hau Hsu and Hsiang{-}Shian Fan and Lu{-}Chin Wang}, title = {SGD\({}^{\mbox{2}}\): Secure Group-based Device-to-Device Communications with Fine-grained Access Control for IoT in 5G}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346250}, doi = {10.1109/DSC49826.2021.9346250}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HsuFW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HsuM21, author = {Po{-}Chu Hsu and Atsuko Miyaji}, title = {Verifiable M+lst-Price Auction without Manager}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346242}, doi = {10.1109/DSC49826.2021.9346242}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/HsuM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HuangLT21, author = {Hongxun Huang and Zi{-}Yuan Liu and Raylin Tso}, title = {Partially Blind {ECDSA} Scheme and Its Application to Bitcoin}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346233}, doi = {10.1109/DSC49826.2021.9346233}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HuangLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HungJLLMW21, author = {Yu{-}Hsin Hung and Bing{-}Jhong Jheng and Hong{-}Wei Li and Wen{-}Yang Lai and Sanoop Mallissery and Yu{-}Sung Wu}, title = {Mixed-mode Information Flow Tracking with Compile-time Taint Semantics Extraction and Offline Replay}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346239}, doi = {10.1109/DSC49826.2021.9346239}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/HungJLLMW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/KikuchiEWM21, author = {Hiroaki Kikuchi and Kazuki Eto and Kazushi Waki and Takafumi Mori}, title = {Vulnerability of Privacy Visor Used to Disrupt Unauthorized Face Recognition}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346246}, doi = {10.1109/DSC49826.2021.9346246}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/KikuchiEWM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LeeLHHCS21, author = {Shan{-}Hsin Lee and Shen{-}Chieh Lan and Hsiu{-}Chuan Huang and Chia{-}Wei Hsu and Yung{-}Shiu Chen and Shiuhpyng Shieh}, title = {EC-Model: An Evolvable Malware Classification Model}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346248}, doi = {10.1109/DSC49826.2021.9346248}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LeeLHHCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LiRT21, author = {Lyue Li and Amir Rezapour and Wen{-}Guey Tzeng}, title = {A Black-Box Adversarial Attack via Deep Reinforcement Learning on the Feature Space}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346264}, doi = {10.1109/DSC49826.2021.9346264}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LiRT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LiWWD21, author = {Yuan Li and Haiyan Wang and Shulan Wang and Yong Ding}, title = {Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346237}, doi = {10.1109/DSC49826.2021.9346237}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/LiWWD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LinWCC21, author = {Jian{-}Feng Lin and Jun{-}Rui Wang and Che{-}Chia Chang and Yu{-}Chi Chen}, title = {Designated Verifier Signature Transformation: {A} New Framework for One-Time Delegating Verifiability}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--2}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346244}, doi = {10.1109/DSC49826.2021.9346244}, timestamp = {Sat, 09 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LinWCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LiuCD21, author = {Yan{-}Ting Liu and Rung{-}Ching Chen and Christine Dewi}, title = {Generate Realistic Traffic Sign Image using Deep Convolutional Generative Adversarial Networks}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346266}, doi = {10.1109/DSC49826.2021.9346266}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LiuCD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LuQS21, author = {Junqing Lu and Rongxin Qi and Jian Shen}, title = {A Novel Dynamic Group Signature with Membership Privacy}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346238}, doi = {10.1109/DSC49826.2021.9346238}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/LuQS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/MeiXZY21, author = {Qian Mei and Hu Xiong and Yanan Zhao and Kuo{-}Hui Yeh}, title = {Toward Blockchain-Enabled IoV with Edge Computing: Efficient and Privacy-Preserving Vehicular Communication and Dynamic Updating}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346240}, doi = {10.1109/DSC49826.2021.9346240}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/MeiXZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/QianXS21, author = {Yalian Qian and Xueya Xia and Jian Shen}, title = {A Profile Matching Scheme based on Private Set Intersection for Cyber-Physical-Social Systems}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346252}, doi = {10.1109/DSC49826.2021.9346252}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/QianXS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/SuGTT21, author = {Shenghao Su and Cheng Guo and Pengxu Tian and Xinyu Tang}, title = {Privacy-Preserving Range Query for High-Dimensional Uncertain Data in a Two-Party Scenario}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346235}, doi = {10.1109/DSC49826.2021.9346235}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/SuGTT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/TanakaM0K21, author = {Shoma Tanaka and Takashi Matsunaka and Akira Yamada and Ayumu Kubota}, title = {Phishing Site Detection Using Similarity of Website Structure}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346256}, doi = {10.1109/DSC49826.2021.9346256}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/TanakaM0K21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/TeoTCZ21, author = {Kai Ren Teo and Balamurali B. T. and Jer{-}Ming Chen and Jianying Zhou}, title = {Retrieving Input from Touch Interfaces via Acoustic Emanations}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346271}, doi = {10.1109/DSC49826.2021.9346271}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/TeoTCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/TsengG21, author = {Yi{-}Fan Tseng and Shih{-}Jie Gao}, title = {Efficient Subset Predicate Encryption for Internet of Things}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--2}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346245}, doi = {10.1109/DSC49826.2021.9346245}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/TsengG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WangG021, author = {Hao Wang and Chunpeng Ge and Zhe Liu}, title = {On the Security of Permissionless Blockchain Systems: Challenges and Research Perspective}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346243}, doi = {10.1109/DSC49826.2021.9346243}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/WangG021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WuJW21, author = {Ruisi Wu and Wen{-}Kang Jia and Xufang Wang}, title = {Header-Translation based Flow Aggregation for Scattered Address Allocating SDNs}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346231}, doi = {10.1109/DSC49826.2021.9346231}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/WuJW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/XiaJ21, author = {Xueya Xia and Sai Ji}, title = {An Efficient Anonymous Authentication Scheme for Privacy-preserving in Smart Grid}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--2}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346257}, doi = {10.1109/DSC49826.2021.9346257}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/XiaJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/XieC21, author = {Xin Xie and Yu{-}Chi Chen}, title = {Decentralized Data Aggregation: {A} New Secure Framework based on Lightweight Cryptographic Algorithms}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--2}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346260}, doi = {10.1109/DSC49826.2021.9346260}, timestamp = {Mon, 16 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/XieC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/XuXMZJR21, author = {Jing Xu and Fei Xu and Fanshu Ma and Lei Zhou and Shuanglin Jiang and Zhibo Rao}, title = {Mining Web Usage Profiles from Proxy Logs: User Identification}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346276}, doi = {10.1109/DSC49826.2021.9346276}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/XuXMZJR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/YangWG21, author = {Shiyi Yang and Peilun Wu and Hui Guo}, title = {DualNet: Locate Then Detect Effective Payload with Deep Attention Network}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346261}, doi = {10.1109/DSC49826.2021.9346261}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/YangWG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/YinYWD21, author = {Feihong Yin and Li Yang and Yuchen Wang and Jiahao Dai}, title = {IoT {ETEI:} End-to-End IoT Device Identification Method}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346251}, doi = {10.1109/DSC49826.2021.9346251}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/YinYWD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ZhangFQL21, author = {Dong Zhang and Qing Fan and Hongyi Qiao and Min Luo}, title = {A Public-key Encryption with Multi-keyword Search Scheme for Cloud-based Smart Grids}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346254}, doi = {10.1109/DSC49826.2021.9346254}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ZhangFQL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Zhao0S21, author = {Zhixin Zhao and Lu Zhou and Chunhua Su}, title = {Systematic Research on Technology and Challenges of Lightning Network}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346275}, doi = {10.1109/DSC49826.2021.9346275}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Zhao0S21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ZhaoDRHX21, author = {Yang Zhao and Guohang Dan and Ankang Ruan and Jicheng Huang and Hu Xiong}, title = {A Certificateless and Privacy-Preserving Authentication with Fault-Tolerance for Vehicular Sensor Networks}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346268}, doi = {10.1109/DSC49826.2021.9346268}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ZhaoDRHX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ZhaoRDH021, author = {Yang Zhao and Ankang Ruan and Guohang Dan and Jicheng Huang and Yi Ding}, title = {Efficient Multi-Authority Attribute-based Signcryption with Constant-Size Ciphertext}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346249}, doi = {10.1109/DSC49826.2021.9346249}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ZhaoRDH021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ZhuC21, author = {Ting{-}Le Zhu and Tzung{-}Her Chen}, title = {A Patient-Centric Key Management Protocol for Healthcare Information System based on Blockchain}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346259}, doi = {10.1109/DSC49826.2021.9346259}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ZhuC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ZhuJL21, author = {Qingfeng Zhu and Sai Ji and Qi Liu}, title = {Privacy-Preserving Smart Road Pricing System in Smart Cities}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--2}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346274}, doi = {10.1109/DSC49826.2021.9346274}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ZhuJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ZhuRZ21, author = {Kui Zhu and Yongjun Ren and Qingfeng Zhu}, title = {A Provable Data Possession Protocol in Cloud Storage Systems with Fault Tolerance}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346241}, doi = {10.1109/DSC49826.2021.9346241}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ZhuRZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/desec/2021, title = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021}, doi = {10.1109/DSC49826.2021}, isbn = {978-1-7281-7534-8}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AbusnainaKNYM19, author = {Ahmed Abusnaina and Aminollah Khormali and DaeHun Nyang and Murat Yuksel and Aziz Mohaisen}, title = {Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937669}, doi = {10.1109/DSC47296.2019.8937669}, timestamp = {Mon, 16 Mar 2020 18:03:41 +0100}, biburl = {https://dblp.org/rec/conf/desec/AbusnainaKNYM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AlagilL19, author = {Ahmad Alagil and Yao Liu}, title = {Randomized Positioning {DSSS} with Message Shuffling for Anti-Jamming Wireless Communications}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937697}, doi = {10.1109/DSC47296.2019.8937697}, timestamp = {Mon, 16 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/AlagilL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AlasmariWQ019, author = {Sultan Alasmari and Weichao Wang and Tuanfa Qin and Yu Wang}, title = {Proof of Encryption: Enforcement of Security Service Level Agreement for Encryption Outsourcing}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937713}, doi = {10.1109/DSC47296.2019.8937713}, timestamp = {Mon, 16 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/AlasmariWQ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AlsalamiZ19, author = {Nasser Alsalami and Bingsheng Zhang}, title = {Utilizing Public Blockchains for Censorship-Circumvention and IoT Communication}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937637}, doi = {10.1109/DSC47296.2019.8937637}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/AlsalamiZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AlsalamiZ19a, author = {Nasser Alsalami and Bingsheng Zhang}, title = {SoK: {A} Systematic Study of Anonymity in Cryptocurrencies}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937681}, doi = {10.1109/DSC47296.2019.8937681}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/AlsalamiZ19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/BagH19, author = {Samiran Bag and Feng Hao}, title = {{E2E} Verifiable Electronic Voting System for Shareholders}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937711}, doi = {10.1109/DSC47296.2019.8937711}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/BagH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/BaoZLCWL19, author = {Xuhua Bao and Xiaokun Zhang and Jingqiang Lin and Dawei Chu and Qiongxiao Wang and Fengjun Li}, title = {Towards the Trust-Enhancements of Single Sign-On Services}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937676}, doi = {10.1109/DSC47296.2019.8937676}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/BaoZLCWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChenCX0JX19, author = {Baicheng Chen and Kun Woo Cho and Chenhan Xu and Feng Lin and Zhanpeng Jin and Wenyao Xu}, title = {Exploiting Mallows Distance to Quantify {EEG} Distribution for Personal Identification}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937586}, doi = {10.1109/DSC47296.2019.8937586}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChenCX0JX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChenLZZ19, author = {Guoxing Chen and Mengyuan Li and Fengwei Zhang and Yinqian Zhang}, title = {Defeating Speculative-Execution Attacks on {SGX} with HyperRace}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937682}, doi = {10.1109/DSC47296.2019.8937682}, timestamp = {Mon, 16 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChenLZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChoiAA0CNM19, author = {Jinchun Choi and Ahmed Abusnaina and Afsah Anwar and An Wang and Songqing Chen and DaeHun Nyang and Aziz Mohaisen}, title = {Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937574}, doi = {10.1109/DSC47296.2019.8937574}, timestamp = {Mon, 16 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChoiAA0CNM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChoiSS19, author = {Isabelle Choi and Qiyang Song and Kun Sun}, title = {Federated-Cloud Based Deep Neural Networks with Privacy Preserving Image Filtering Techniques}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937635}, doi = {10.1109/DSC47296.2019.8937635}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChoiSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/GengAHF19, author = {Tieming Geng and Hatim Alsuwat and Chin{-}Tser Huang and Csilla Farkas}, title = {Securing Relational Database Storage with Attribute Association Aware Shuffling}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937694}, doi = {10.1109/DSC47296.2019.8937694}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/GengAHF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/JiangY19, author = {Tao Jiang and Xu Yuan}, title = {Traceable Private Set Intersection in Cloud Computing}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937666}, doi = {10.1109/DSC47296.2019.8937666}, timestamp = {Mon, 16 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/JiangY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LeSKBD19, author = {Huy Quoc Le and Willy Susilo and Thanh Xuan Khuc and Minh Kim Bui and Dung Hoang Duong}, title = {A Blind Signature from Module Latices}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937613}, doi = {10.1109/DSC47296.2019.8937613}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/LeSKBD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LiZ019, author = {Jiasheng Li and Zijian Zhang and Meng Li}, title = {BanFEL: {A} Blockchain Based Smart Contract for Fair and Efficient Lottery Scheme}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937559}, doi = {10.1109/DSC47296.2019.8937559}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LiZ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LinLHWHS19, author = {Chun{-}Han Lin and Shan{-}Hsin Lee and Hsiu{-}Chuan Huang and Chi{-}Wei Wang and Chia{-}Wei Hsu and Shiuh{-}Pyng Shieh}, title = {DT-Track: Using DNS-Timing Side Channel for Mobile User Tracking}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937592}, doi = {10.1109/DSC47296.2019.8937592}, timestamp = {Mon, 16 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LinLHWHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LiuN19, author = {Xiuming Liu and Edith Cheuk{-}Han Ngai}, title = {Gaussian Process Learning for Distributed Sensor Networks under False Data Injection Attacks}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937642}, doi = {10.1109/DSC47296.2019.8937642}, timestamp = {Wed, 23 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LiuN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/MajumdarTMOJP0D19, author = {Suryadipta Majumdar and Azadeh Tabiban and Meisam Mohammady and Alaa Oqaily and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Multi-Level Proactive Security Auditing for Clouds}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937641}, doi = {10.1109/DSC47296.2019.8937641}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/MajumdarTMOJP0D19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Salehi0C19, author = {Majid Salehi and Danny Hughes and Bruno Crispo}, title = {MicroGuard: Securing Bare-Metal Microcontrollers against Code-Reuse Attacks}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937667}, doi = {10.1109/DSC47296.2019.8937667}, timestamp = {Mon, 16 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Salehi0C19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/SunXD0LC19, author = {Jianfei Sun and Hu Xiong and Robert H. Deng and Yinghui Zhang and Ximeng Liu and Mingsheng Cao}, title = {Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937708}, doi = {10.1109/DSC47296.2019.8937708}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/SunXD0LC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Tong0Z19, author = {Le Tong and Jia Yu and Hanlin Zhang}, title = {Secure Outsourcing Algorithm for Bilinear Pairings without Pre-Computation}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937567}, doi = {10.1109/DSC47296.2019.8937567}, timestamp = {Sat, 31 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/Tong0Z19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WeiYCJ19, author = {Baole Wei and Min Yu and Kai Chen and Jianguo Jiang}, title = {Deep-BIF: Blind Image Forensics Based on Deep Learning}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937712}, doi = {10.1109/DSC47296.2019.8937712}, timestamp = {Fri, 30 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/WeiYCJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WuQTSXZ19, author = {Hao Wu and Zheng Qin and Xuejin Tian and Edward Sun and Fengyuan Xu and Sheng Zhong}, title = {Broken Relationship of Mobile User Intentions and Permission Control of Shared System Resources}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937600}, doi = {10.1109/DSC47296.2019.8937600}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/WuQTSXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WuWQWQD19, author = {Yongdong Wu and Jian Weng and Bo Qiu and Zhuo Wei and Fan Qian and Robert H. Deng}, title = {Random Delay Attack and Its Applications on Load Frequency Control of Power Systems}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937611}, doi = {10.1109/DSC47296.2019.8937611}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/WuWQWQD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WuY19, author = {Mingli Wu and Tsz Hon Yuen}, title = {Securely Perturb Big Data by using Inner Product}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937602}, doi = {10.1109/DSC47296.2019.8937602}, timestamp = {Mon, 16 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/WuY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/XiaoHY19, author = {Ya Xiao and Qingying Hao and Danfeng Daphne Yao}, title = {Neural Cryptanalysis: Metrics, Methodology, and Applications in {CPS} Ciphers}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937659}, doi = {10.1109/DSC47296.2019.8937659}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/XiaoHY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/XuYLL019, author = {Shengmin Xu and Jiaming Yuan and Yingjiu Li and Ximeng Liu and Yinghui Zhang}, title = {Super Payment Channel for Decentralized Cryptocurrencies}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937619}, doi = {10.1109/DSC47296.2019.8937619}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/XuYLL019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Yang19, author = {Ziqi Yang}, title = {Fidelity: Towards Measuring the Trustworthiness of Neural Network Classification}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937572}, doi = {10.1109/DSC47296.2019.8937572}, timestamp = {Mon, 16 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Yang19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/YaoCG19, author = {Jing Yao and Helei Cui and Xiaolin Gui}, title = {Secure Boolean Queries over Encrypted Data from Indistinguishability Obfuscation}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937632}, doi = {10.1109/DSC47296.2019.8937632}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/YaoCG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/YuanCW019, author = {Xingliang Yuan and Chengjun Cai and Qian Wang and Qi Li}, title = {Towards a Ledger-Assisted Architecture for Secure Query Processing over Distributed IoT Data}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937714}, doi = {10.1109/DSC47296.2019.8937714}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/YuanCW019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Zhang0YXSZ019, author = {Yiran Zhang and Fan Zhang and Bolin Yang and Guorui Xu and Bin Shao and Xinjie Zhao and Kui Ren}, title = {Persistent Fault Injection in {FPGA} via {BRAM} Modification}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937558}, doi = {10.1109/DSC47296.2019.8937558}, timestamp = {Tue, 17 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Zhang0YXSZ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ZhangHH19, author = {Jingyi Zhang and Qiao Hu and Gerhard Petrus Hancke}, title = {Correlation-Based Search against Friendly Jamming Data Exchange Schemes}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937560}, doi = {10.1109/DSC47296.2019.8937560}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ZhangHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ZhangKLQ19, author = {Jixin Zhang and Mohammad Faham Khan and Xiaodong Lin and Zheng Qin}, title = {An Optimized Positive-Unlabeled Learning Method for Detecting a Large Scale of Malware Variants}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937650}, doi = {10.1109/DSC47296.2019.8937650}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/ZhangKLQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/desec/2019, title = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8930388/proceeding}, isbn = {978-1-7281-2319-6}, timestamp = {Mon, 16 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AljaediCAT18, author = {Amer Aljaedi and C. Edward Chow and Ehab Ashary and Francisco Torres{-}Reyes}, title = {{OTMEN:} Offloading Traffic Monitoring to Edge Nodes in Software-Defined Datacenter Networks}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625138}, doi = {10.1109/DESEC.2018.8625138}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/AljaediCAT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Amemiya18, author = {Koichiro Amemiya}, title = {DSC{\#}7}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {204}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625107}, doi = {10.1109/DESEC.2018.8625107}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Amemiya18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AmmarWRC18, author = {Mahmoud Ammar and Mahdi Washha and Gowri Sankar Ramachandran and Bruno Crispo}, title = {SlimIoT: Scalable Lightweight Attestation Protocol for the Internet of Things}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625142}, doi = {10.1109/DESEC.2018.8625142}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/AmmarWRC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChangLCL18, author = {Tien{-}Ho Chang and Jiunn{-}Wu Lin and Chia{-}Mei Chen and Gu Hsin Lai}, title = {The Method of Capturing the Encrypted Password Packets of {WPA} {\&} WPA2, Automatic, Semi-Automatic or Manual?}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--4}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625156}, doi = {10.1109/DESEC.2018.8625156}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChangLCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChaoLCTH18, author = {Wei{-}Chieh Chao and Si{-}Chen Lin and Yi{-}Hsien Chen and Chin{-}Wei Tien and Chun{-}Ying Huang}, title = {Design and Implement Binary Fuzzing Based on Libfuzzer}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625172}, doi = {10.1109/DESEC.2018.8625172}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/ChaoLCTH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChenCS18, author = {Chung{-}Kuan Chen and Shang{-}Kuei Chen and Shiuhpyng Winston Shieh}, title = {Mitigating Over-Permissible Transfer for Control Flow Integrity}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625104}, doi = {10.1109/DESEC.2018.8625104}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChenCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChenCWHH18, author = {Ying{-}Shen Chen and Wei{-}Ning Chen and Che{-}Yu Wu and Hsu{-}Chun Hsiao and Shih{-}Kun Huang}, title = {Dynamic Path Pruning in Symbolic Execution}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625128}, doi = {10.1109/DESEC.2018.8625128}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChenCWHH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChenFT18, author = {Wei{-}Hao Chen and Chun{-}I Fan and Yi{-}Fan Tseng}, title = {Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--4}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625149}, doi = {10.1109/DESEC.2018.8625149}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/ChenFT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChenHS18, author = {Chung{-}Kuan Chen and E.{-}Lin Ho and Shiuhpyng Winston Shieh}, title = {DeepMemIntrospect: Recognizing Data Structures in Memory with Neural Networks}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625160}, doi = {10.1109/DESEC.2018.8625160}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChenHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChiW18, author = {Po{-}Wen Chi and Ming{-}Hung Wang}, title = {A Lightweight Compound Defense Framework Against Injection Attacks in IIoT}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625150}, doi = {10.1109/DESEC.2018.8625150}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/ChiW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChiuCMW18, author = {Chi{-}Kuan Chiu and Hsiao{-}Hsien Chang and Ching{-}Hao Mao and Te{-}En Wei}, title = {Counterfeit Fingerprint Detection of Outbound {HTTP} Traffic with Graph Edit Distance}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625111}, doi = {10.1109/DESEC.2018.8625111}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChiuCMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChungWUS18, author = {Wei{-}Ho Chung and Mu{-}En Wu and Yeong{-}Luh Ueng and Yi{-}Hsuan Su}, title = {Forged Seal Imprint Identification Based on Regression Analysis on Imprint Borders and Metrics Comparisons}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625152}, doi = {10.1109/DESEC.2018.8625152}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/ChungWUS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/CuiW0DY18, author = {Helei Cui and Cong Wang and Yu Hua and Yuefeng Du and Xingliang Yuan}, title = {A Bandwidth-Efficient Middleware for Encrypted Deduplication}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625127}, doi = {10.1109/DESEC.2018.8625127}, timestamp = {Thu, 23 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/CuiW0DY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/DhaliwalL18, author = {Harpreet Kaur Dhaliwal and Chung{-}Horng Lung}, title = {Load Balancing Using {ECMP} in Multi-Stage Clos Topology in a Datacenter}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625147}, doi = {10.1109/DESEC.2018.8625147}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/DhaliwalL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/DuarteN18, author = {Rui Policarpo Duarte and Hor{\'{a}}cio C. Neto}, title = {Stochastic Processors on FPGAs to Compute Sensor Data Towards Fault-Tolerant IoT Systems}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625153}, doi = {10.1109/DESEC.2018.8625153}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/DuarteN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Elsabagh0S18, author = {Mohamed Elsabagh and Ryan Johnson and Angelos Stavrou}, title = {Resilient and Scalable Cloned App Detection Using Forced Execution and Compression Trees}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625133}, doi = {10.1109/DESEC.2018.8625133}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/Elsabagh0S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/FanTSHK18, author = {Chun{-}I Fan and Yi{-}Fan Tseng and Hui{-}Po Su and Ruei{-}Hau Hsu and Hiroaki Kikuchi}, title = {Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625151}, doi = {10.1109/DESEC.2018.8625151}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/FanTSHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/FleckSKNSK18, author = {Daniel Fleck and Angelos Stavrou and George Kesidis and Neda Nasiriani and Yuquan Shan and Takis Konstantopoulos}, title = {Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625162}, doi = {10.1109/DESEC.2018.8625162}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/FleckSKNSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/FunayaBSS18, author = {Koichi Funaya and Samir Bajaj and Kumar Sharad and Alok Srivastava}, title = {Optimizing the Sequence of Vulnerability Scanning Injections}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625098}, doi = {10.1109/DESEC.2018.8625098}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/FunayaBSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/GuanL18, author = {Albert Guan and Chin{-}Laung Lei}, title = {Efficient Key Agreement Protocol for Smart Sensors}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625110}, doi = {10.1109/DESEC.2018.8625110}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/GuanL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/GuriSE18, author = {Mordechai Guri and Yosef A. Solewicz and Yuval Elovici}, title = {{MOSQUITO:} Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker Communication}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625124}, doi = {10.1109/DESEC.2018.8625124}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/GuriSE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HaganSSKM18, author = {Matthew Hagan and Fahad Siddiqui and Sakir Sezer and BooJoong Kang and Kieran McLaughlin}, title = {Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625140}, doi = {10.1109/DESEC.2018.8625140}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/HaganSSKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HsuFQL18, author = {Ruei{-}Hau Hsu and Chun{-}I Fan and Tony Q. S. Quek and Jemin Lee}, title = {{CORE:} Cooperative Encryption with its Applications to Controllable Security Services}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625168}, doi = {10.1109/DESEC.2018.8625168}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HsuFQL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HsuWS18, author = {Chia{-}Wei Hsu and Sheng{-}Ru Wei and Shiuhpyng Shieh}, title = {Finder: Automatic {ICC} Data Reconstruction for Long-Term Runtime Semantics}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625155}, doi = {10.1109/DESEC.2018.8625155}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HsuWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HyderL18, author = {Henan Kottayil Hyder and Chung{-}Horng Lung}, title = {Closed-Loop DDoS Mitigation System in Software Defined Networks}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625125}, doi = {10.1109/DESEC.2018.8625125}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HyderL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/JengCCHC18, author = {Tzung{-}Han Jeng and Yi{-}Ming Chen and Chien{-}Chih Chen and Chuan{-}Chiang Huang and Kuo{-}Sen Chou}, title = {CC-Tracker: Interaction Profiling Bipartite Graph Mining for Malicious Network Activity Detection}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625170}, doi = {10.1109/DESEC.2018.8625170}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/JengCCHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/KimCP18, author = {Jihun Kim and Jeonghun Cho and Daejin Park}, title = {Low-Power Command Protection Using {SHA-CRC} Inversion-Based Scrambling Technique for CAN-Integrated Automotive Controllers}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625099}, doi = {10.1109/DESEC.2018.8625099}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/KimCP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Kuwakado18, author = {Hidenori Kuwakado}, title = {Secret Sharing Schemes Using Modulo-{\textdollar}2\{m\}{\textdollar} Arithmetic Operations}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625126}, doi = {10.1109/DESEC.2018.8625126}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Kuwakado18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LaiHHML18, author = {Chia{-}Min Lai and Bo{-}Ching Huang and Shin{-}Ying Huang and Ching{-}Hao Mao and Hahn{-}Ming Lee}, title = {Detection of {DNS} Tunneling by Feature-Free Mechanism}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625166}, doi = {10.1109/DESEC.2018.8625166}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LaiHHML18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LauYY18, author = {Chi Ho Lau and Alan Kai{-}Hau Yeung and Fan Yan}, title = {Blockchain-Based Authentication in IoT Networks}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625141}, doi = {10.1109/DESEC.2018.8625141}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/LauYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LinC18, author = {Kuo{-}Sui Lin and Chih{-}Chung Chiu}, title = {Vague Set Based {FMEA} Method for Risk Evaluation of Safety-Related Systems}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625165}, doi = {10.1109/DESEC.2018.8625165}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LinC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LinLW18, author = {Cheng{-}Hsu Lin and Chi{-}Yu Li and Kuochen Wang}, title = {Setting Malicious Flow Entries Against {SDN} Operations: Attacks and Countermeasures}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625101}, doi = {10.1109/DESEC.2018.8625101}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/LinLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LinWYWTS18, author = {Hsiao{-}Ying Lin and Zhuo Wei and Yanjiang Yang and Yadong Wei and Kang Tang and Qingdi Sha}, title = {AnchorCAN: Anchor-Based Secure {CAN} Communications System}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625173}, doi = {10.1109/DESEC.2018.8625173}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LinWYWTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LuoY18, author = {Jia{-}Ning Luo and Ming{-}Hour Yang}, title = {Offline Transferable E-Cash Mechanism}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625136}, doi = {10.1109/DESEC.2018.8625136}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LuoY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/NagataKF18, author = {Kodai Nagata and Hiroaki Kikuchi and Chun{-}I Fan}, title = {Risk of Bitcoin Addresses to be Identified from Features of Output Addresses}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625106}, doi = {10.1109/DESEC.2018.8625106}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/NagataKF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Nakao18, author = {Koji Nakao}, title = {Keynote Talk {\#}2}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {14}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625112}, doi = {10.1109/DESEC.2018.8625112}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Nakao18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/NongTZ18, author = {Caiqin Nong and Shaohua Tang and Yuanyuan Zhang}, title = {A Privacy-Preserving Metro Passenger Flow Acquisition and Query System Based on Crowd-Sensing}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625121}, doi = {10.1109/DESEC.2018.8625121}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/NongTZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/OsamudiamenL18, author = {Ose Osamudiamen and Chung{-}Horng Lung}, title = {Segment Routing Green Spine Switch Management Systems for Data Center Networks}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625144}, doi = {10.1109/DESEC.2018.8625144}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/OsamudiamenL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Oyama18, author = {Yoshihiro Oyama}, title = {Skipping Sleeps in Dynamic Analysis of Multithreaded Malware}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625167}, doi = {10.1109/DESEC.2018.8625167}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Oyama18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ParkML18, author = {Jonghyeon Park and Hyunsu Mun and Youngseok Lee}, title = {Improving Tor Hidden Service Crawler Performance}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625103}, doi = {10.1109/DESEC.2018.8625103}, timestamp = {Sun, 19 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/ParkML18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/PerryLSSCYO18, author = {Ian Perry and Lutzu Li and Christopher Sweet and Shao{-}Hsuan Su and Fu{-}Yuan Cheng and Shanchieh Jay Yang and Ahmet Okutan}, title = {Differentiating and Predicting Cyberattack Behaviors Using {LSTM}}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625145}, doi = {10.1109/DESEC.2018.8625145}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/PerryLSSCYO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/QianPL18, author = {Kai Qian and Reza M. Parizi and Dan Chia{-}Tien Lo}, title = {{OWASP} Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625114}, doi = {10.1109/DESEC.2018.8625114}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/QianPL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/RulloBS18, author = {Antonino Rullo and Elisa Bertino and Domenico Sacc{\`{a}}}, title = {{PAST:} Protocol-Adaptable Security Tool for Heterogeneous IoT Ecosystems}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625143}, doi = {10.1109/DESEC.2018.8625143}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/RulloBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/SambandamHSL18, author = {Narmadha Sambandam and Mourad Hussein and Noor Siddiqi and Chung{-}Horng Lung}, title = {Network Security for IoT Using {SDN:} Timely DDoS Detection}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625119}, doi = {10.1109/DESEC.2018.8625119}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/SambandamHSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/SasaK18, author = {Kota Sasa and Hiroaki Kikuchi}, title = {Impact Assessment of Password Reset PRMitM Attack with Two-Factor Authentication}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625132}, doi = {10.1109/DESEC.2018.8625132}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/SasaK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/TianLLDS18, author = {Yangguang Tian and Yingjiu Li and Ximeng Liu and Robert H. Deng and Binanda Sengupta}, title = {PriBioAuth: Privacy-Preserving Biometric-Based Remote User Authentication}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625169}, doi = {10.1109/DESEC.2018.8625169}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/TianLLDS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/TsaihHLH18, author = {Rua{-}Huan Tsaih and Shin{-}Ying Huang and Mao{-}Ci Lian and Yennun Huang}, title = {{ANN} Mechanism for Network Traffic Anomaly Detection in the Concept Drifting Environment}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625108}, doi = {10.1109/DESEC.2018.8625108}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/TsaihHLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Voas18, author = {Jeffrey M. Voas}, title = {Keynote Talk {\#}1}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {13}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625120}, doi = {10.1109/DESEC.2018.8625120}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Voas18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Wang18, author = {Chih{-}Hung Wang}, title = {An Identity-Based Fair Contract Signing Protocol Constructed by the Confirmation Signature}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625116}, doi = {10.1109/DESEC.2018.8625116}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Wang18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WangC18, author = {Sen Wang and J. Morris Chang}, title = {Differentially Private Principal Component Analysis Over Horizontally Partitioned Data}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625131}, doi = {10.1109/DESEC.2018.8625131}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/WangC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WuTY18, author = {Chen Wu and Shaohua Tang and Xingfu Yan}, title = {A Homomorphic LWE-Based Verifiable Electronic Voting System}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625100}, doi = {10.1109/DESEC.2018.8625100}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/WuTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/YamauchiAYNH18, author = {Toshihiro Yamauchi and Yohei Akao and Ryota Yoshitani and Yuichi Nakamura and Masaki Hashimoto}, title = {Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625137}, doi = {10.1109/DESEC.2018.8625137}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/YamauchiAYNH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/YangTK18, author = {Wu{-}Chuan Yang and Lien{-}Yuan Ting and Tzu{-}Chun Kuo}, title = {On the Authentication of Certificateless {RSA} Public Key}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625102}, doi = {10.1109/DESEC.2018.8625102}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/YangTK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/YingTT18, author = {Jen{-}Cheng Ying and Wang{-}Dauh Tseng and Wen{-}Jiin Tsai}, title = {Bipolar Dual-LFSR Reseeding for Low-Power Testing}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625105}, doi = {10.1109/DESEC.2018.8625105}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/YingTT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/YohanL18, author = {Alexander Yohan and Nai{-}Wei Lo}, title = {An Over-the-Blockchain Firmware Update Framework for IoT Devices}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625164}, doi = {10.1109/DESEC.2018.8625164}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/YohanL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ZhangZ18, author = {Mingbo Zhang and Saman A. Zonouz}, title = {Use-After-Free Mitigation via Protected Heap Allocation}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625135}, doi = {10.1109/DESEC.2018.8625135}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ZhangZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/desec/2018, title = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8614461/proceeding}, isbn = {978-1-5386-5790-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Al-RubaieWCK17, author = {Mohammad Al{-}Rubaie and Pei Yuan Wu and J. Morris Chang and Sun{-}Yuan Kung}, title = {Privacy-preserving {PCA} on horizontally-partitioned data}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {280--287}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073817}, doi = {10.1109/DESEC.2017.8073817}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/Al-RubaieWCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AlamsyahBA17, author = {Alamsyah and Agus Bejo and Teguh Bharata Adji}, title = {{AES} S-box construction using different irreducible polynomial and constant 8-bit vector}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {366--369}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073857}, doi = {10.1109/DESEC.2017.8073857}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/AlamsyahBA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AlcornMC17, author = {Joshua A. Alcorn and Scott Melton and C. Edward Chow}, title = {{SDN} On-The-Go {(OTG)} physical testbed}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {202--208}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073808}, doi = {10.1109/DESEC.2017.8073808}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/AlcornMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AlcornMC17a, author = {Joshua A. Alcorn and Scott Melton and C. Edward Chow}, title = {{SDN} data path confidence analysis}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {209--216}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073809}, doi = {10.1109/DESEC.2017.8073809}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/AlcornMC17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AlkatheiriZ17, author = {Mohammed Saeed Alkatheiri and Yu Zhuang}, title = {Towards fast and accurate machine learning attacks of feed-forward arbiter PUFs}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {181--187}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073845}, doi = {10.1109/DESEC.2017.8073845}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/AlkatheiriZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AlkatheiriZKS17, author = {Mohammed Saeed Alkatheiri and Yu Zhuang and Mikhail Korobkov and Abdur Rashid Sangi}, title = {An experimental study of the state-of-the-art PUFs implemented on FPGAs}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {174--180}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073844}, doi = {10.1109/DESEC.2017.8073844}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/AlkatheiriZKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AlturkistaniAB17, author = {Fatimah M. Alturkistani and Saad S. Alaboodi and Sarfraz Nawaz Brohi}, title = {An analytical model for reliability evaluation of cloud service provisioning systems}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {340--347}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073821}, doi = {10.1109/DESEC.2017.8073821}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/AlturkistaniAB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AmanCS17, author = {Muhammad Naveed Aman and Kee Chaing Chua and Biplab Sikdar}, title = {Physically secure mutual authentication for IoT}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {310--317}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073853}, doi = {10.1109/DESEC.2017.8073853}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/AmanCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AnandanC17, author = {Balamurugan Anandan and Chris Clifton}, title = {Secure minimum weighted bipartite matching}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {60--67}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073798}, doi = {10.1109/DESEC.2017.8073798}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/AnandanC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AsharyCKT17, author = {Ehab Ashary and C. Edward Chow and Ashish Korpe and Donovan Thorpe}, title = {{R2D2:} Right place, right path data delivery}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {273--279}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073816}, doi = {10.1109/DESEC.2017.8073816}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/AsharyCKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/BralySB17, author = {Michael Braly and Aaron Stillmaker and Bevan M. Baas}, title = {A configurable H.265-compatible motion estimation accelerator architecture for realtime 4K video encoding in 65 nm {CMOS}}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {79--85}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073837}, doi = {10.1109/DESEC.2017.8073837}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/BralySB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChanY17, author = {Neil Wong Hon Chan and Shanchieh Jay Yang}, title = {{SCANNER:} Sequence clustering of android resource accesses}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {259--266}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073814}, doi = {10.1109/DESEC.2017.8073814}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChanY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChangHLK17, author = {Cheng{-}Hao Chang and I{-}Chang Huang and Mu{-}Fan Lin and Shiann{-}Rong Kuang}, title = {Design and implementation of a low-cost guided image filter for underwater image enhancement}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {296--299}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073850}, doi = {10.1109/DESEC.2017.8073850}, timestamp = {Sun, 07 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChangHLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChangW17, author = {Wan{-}Chi Chang and Pi{-}Chung Wang}, title = {A write-operation-adaptable replication system for multiplayer cloud gaming}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {334--339}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073820}, doi = {10.1109/DESEC.2017.8073820}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/ChangW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChenCLTY17, author = {Chih{-}Chieh Chen and Yi{-}Ren Chen and Wei{-}Chih Lu and Shi{-}Chun Tsai and Ming{-}Chuan Yang}, title = {Detecting amplification attacks with Software Defined Networking}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {195--201}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073807}, doi = {10.1109/DESEC.2017.8073807}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChenCLTY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChenCTL17, author = {Jinlin Chen and Yi{-}Ren Chen and Shi{-}Chun Tsai and Yi{-}Bing Lin}, title = {Implementing {NFV} system with OpenStack}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {188--194}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073806}, doi = {10.1109/DESEC.2017.8073806}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChenCTL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChenH17, author = {Shi{-}Feng Chen and Pao{-}Ann Hsiung}, title = {Landslide prediction with model switching}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {232--236}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073846}, doi = {10.1109/DESEC.2017.8073846}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChenH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChenLS17, author = {Chong Kuan Chen and Shen{-}Chieh Lan and Shiuhpyng Winston Shieh}, title = {Shellcode detector for malicious document hunting}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {527--528}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073875}, doi = {10.1109/DESEC.2017.8073875}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChenLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChengH17, author = {Yu{-}Wei Cheng and Yin{-}Tsung Hwang}, title = {Development of a high throughput image compression system for optical remote sensing}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {539--540}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073887}, doi = {10.1109/DESEC.2017.8073887}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChengH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChengWC17, author = {Shin{-}Ming Cheng and Yu{-}Jyun Wang and Ying{-}Cheng Chen}, title = {Secure location tracking of femtocells in heterogeneous cellular networks}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {267--272}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073815}, doi = {10.1109/DESEC.2017.8073815}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChengWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChoiHC17, author = {SeokHwan Choi and Doo{-}Hee Hwang and Yoon{-}Ho Choi}, title = {Wireless intrusion prevention system using dynamic random forest against wireless {MAC} spoofing attack}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {131--137}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073804}, doi = {10.1109/DESEC.2017.8073804}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChoiHC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChoiP17, author = {Ka{-}Cheng Choi and Chi{-}Man Pun}, title = {Adaptive image encryption for high capacity reversible data hiding}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {429--432}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073862}, doi = {10.1109/DESEC.2017.8073862}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/ChoiP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChuLHH17, author = {Jian{-}Ya Chu and Yuan{-}Te Liao and Chun{-}Yi Hung and Terng{-}Yin Hsu}, title = {Implementation of digital self-interference cancellation in LTE-based {CCFD} transmission}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {475--476}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073868}, doi = {10.1109/DESEC.2017.8073868}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChuLHH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChuangHMJL17, author = {Tzu{-}Hsien Chuang and Shin{-}Ying Huang and Ching{-}Hao Mao and Albert B. Jeng and Hahn{-}Ming Lee}, title = {Ziffersystem: {A} novel malware distribution detection system}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {509--515}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073834}, doi = {10.1109/DESEC.2017.8073834}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChuangHMJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/DengCLCL17, author = {Juinn{-}Horng Deng and Pin{-}Nien Chen and Chia{-}Fang Lee and Yuan{-}Feng Chan and Yen{-}Chung Lin}, title = {{SDR} measurement platform design for {FMCW} {RADAR} performance verification}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {477--478}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073869}, doi = {10.1109/DESEC.2017.8073869}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/DengCLCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ElgzilCAA17, author = {Abdelhamid Elgzil and C. Edward Chow and Amer Aljaedi and Naif Alamri}, title = {Cyber anonymity based on software-defined networking and Onion Routing {(SOR)}}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {358--365}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073856}, doi = {10.1109/DESEC.2017.8073856}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ElgzilCAA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/FeldeGHK17, author = {Nils gentschen Felde and Tobias Guggemos and Tobias Heider and Dieter Kranzlm{\"{u}}ller}, title = {Secure group key distribution in constrained environments with IKEv2}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {384--391}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073823}, doi = {10.1109/DESEC.2017.8073823}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/FeldeGHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/FuHKTT17, author = {Shan{-}Jung Fu and Huai{-}Wen Hsu and Yi{-}Chih Kao and Shi{-}Chun Tsai and Chien{-}Chao Tseng}, title = {An autoblocking mechanism for firewall service}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {531--532}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073877}, doi = {10.1109/DESEC.2017.8073877}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/FuHKTT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Garcia17, author = {Randy Garcia}, title = {Federated identity hybrid cloud security considerations supporting first responders}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {326--333}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073819}, doi = {10.1109/DESEC.2017.8073819}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Garcia17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/GaurBLR17, author = {Amit Singh Gaur and Jyoti Budakoti and Chung{-}Horng Lung and Alan Redmond}, title = {IoT-equipped {UAV} communications with seamless vertical handover}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {459--465}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073829}, doi = {10.1109/DESEC.2017.8073829}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/GaurBLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/GirmalS17, author = {Rashmi Girmal and Arun K. Somani}, title = {LowLEAC: Low Leakage Energy Architecture for Caches}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {288--295}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073849}, doi = {10.1109/DESEC.2017.8073849}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/GirmalS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/GuH17, author = {Jun Gu and Tzonelih Hwang}, title = {Comment on 'improving the security of protocols of quantum key agreement solely using bell states and bell measurement'}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {520--521}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073872}, doi = {10.1109/DESEC.2017.8073872}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/GuH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/GuanZLC17, author = {D. J. Guan and Er{-}Shuo Zhuang and Yu{-}Shen Lin and I. C. Chung}, title = {Detecting invalid digital signatures in batches}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {68--72}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073799}, doi = {10.1109/DESEC.2017.8073799}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/GuanZLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HebbalLM17, author = {Yacine Hebbal and Sylvie Laniepce and Jean{-}Marc Menaud}, title = {K-binID: Kernel binary code identification for Virtual Machine Introspection}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {107--114}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073801}, doi = {10.1109/DESEC.2017.8073801}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HebbalLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HebbalLM17a, author = {Yacine Hebbal and Sylvie Laniepce and Jean{-}Marc Menaud}, title = {Hidden process detection using kernel functions instrumentation}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {138--145}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073805}, doi = {10.1109/DESEC.2017.8073805}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HebbalLM17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HuZWLYG17, author = {Zhenghao Hu and Yuanyuan Zhang and Hui Wang and Juanru Li and Wenbo Yang and Dawu Gu}, title = {{MIRAGE:} Randomizing large chunk allocation via dynamic binary instrumentation}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {98--106}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073800}, doi = {10.1109/DESEC.2017.8073800}, timestamp = {Thu, 23 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/HuZWLYG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HuangHC17, author = {Junying Huang and Zhengyu Huang and KuanHung Chen}, title = {Combining low-cost Inertial Measurement Unit {(IMU)} and deep learning algorithm for predicting vehicle attitude}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {237--239}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073847}, doi = {10.1109/DESEC.2017.8073847}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HuangHC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HuangYPLH17, author = {Yu{-}Chuan Huang and Chih{-}Wei Yi and Wen{-}Chih Peng and Hsing{-}Chen Lin and Ching{-}Yu Huang}, title = {A study on multiple wearable sensors for activity recognition}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {449--452}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073827}, doi = {10.1109/DESEC.2017.8073827}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/HuangYPLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/KatoK17, author = {Keisuke Kato and Vitaly Klyuev}, title = {Development of a network intrusion detection system using Apache Hadoop and Spark}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {416--423}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073860}, doi = {10.1109/DESEC.2017.8073860}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/KatoK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LaiCWC17, author = {Chun{-}Hsiang Lai and Yu{-}Cheng Cheng and Tung{-}Chi Wu and Yen{-}Jen Chang}, title = {Radix-4 adder design with refined carry}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {300--304}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073851}, doi = {10.1109/DESEC.2017.8073851}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LaiCWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LaiH17, author = {Jung{-}Chin Lai and Frank Hsiao}, title = {The calibration of gain error for time amplifier embedded in time-to-digital converter}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {1--4}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073854}, doi = {10.1109/DESEC.2017.8073854}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LaiH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LairdDD17, author = {Paul Laird and Sarah Jane Delany and Pierpaolo Dondio}, title = {Multiparty computations in varying contexts}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {400--407}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073825}, doi = {10.1109/DESEC.2017.8073825}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LairdDD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LeeCP17, author = {Dongkyu Lee and Jeonghun Cho and Daejin Park}, title = {Interactive simulation platform using processing-based visualization for safe collision-free autonomous driving development}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {537--538}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073886}, doi = {10.1109/DESEC.2017.8073886}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LeeCP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LeeCT17, author = {Chih{-}Ning Lee and Yi{-}Ruei Chen and Wen{-}Guey Tzeng}, title = {An online subject-based spam filter using natural language features}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {479--487}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073830}, doi = {10.1109/DESEC.2017.8073830}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LeeCT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LeeKL17, author = {Trong{-}Yen Lee and Chia{-}Wei Kuo and I{-}An Lin}, title = {High performance CAN/FlexRay gateway design for in-vehicle network}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {240--242}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073848}, doi = {10.1109/DESEC.2017.8073848}, timestamp = {Sun, 07 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LeeKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LeeLW17, author = {Yung{-}Ting Lee and Chunn{-}Yenn Lin and Ming{-}Jhou Wang}, title = {A novel {UL} power control scheme for a digital cellular repeater}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {471--472}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073866}, doi = {10.1109/DESEC.2017.8073866}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LeeLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LeeT17, author = {Yu{-}Wei Lee and Nur A. Touba}, title = {Computing with obfuscated data in arbitrary logic circuits via noise insertion and cancellation}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {146--152}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073840}, doi = {10.1109/DESEC.2017.8073840}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LeeT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Leventi-PeetzP17, author = {Anastasia{-}Maria Leventi{-}Peetz and J.{-}V. Peetz}, title = {Generating and exploring S-box multivariate quadratic equation systems with SageMath}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {377--383}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073822}, doi = {10.1109/DESEC.2017.8073822}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Leventi-PeetzP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LiewTLY17, author = {Wei Tim Liew and Kuo{-}Yu Tsai and Jia{-}Ning Luo and Ming{-}Hour Yang}, title = {Novel designated ownership transfer with grouping proof}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {433--440}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073863}, doi = {10.1109/DESEC.2017.8073863}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LiewTLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LinTK17, author = {Chih{-}Ta Lin and Cheng{-}Yu Tsai and Chuan{-}Kai Kao}, title = {Lower power data transport protection for Internet of Things (IoT)}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {468--470}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073865}, doi = {10.1109/DESEC.2017.8073865}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LinTK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LinWCL17, author = {Jia{-}Jhun Lin and Kai{-}Ching Wang and Shin{-}Ming Cheng and Yen{-}Chun Liu}, title = {On exploiting {SDN} to facilitate IPv4/IPv6 coexistence and transition}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {473--474}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073867}, doi = {10.1109/DESEC.2017.8073867}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LinWCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LinWL17, author = {Chih{-}Ta Lin and Sung{-}Lin Wu and Mei{-}Lin Lee}, title = {Cyber attack and defense on industry control systems}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {524--526}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073874}, doi = {10.1109/DESEC.2017.8073874}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LinWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LiuP17, author = {Bo Liu and Chi{-}Man Pun}, title = {Multi-object splicing forgery detection using noise level difference}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {533--534}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073884}, doi = {10.1109/DESEC.2017.8073884}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LiuP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/MaoCL17, author = {Jian Mao and Zheng Leong Chua and Zhenkai Liang}, title = {Enabling practical experimentation in cyber-security training}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {516--517}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073870}, doi = {10.1109/DESEC.2017.8073870}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/MaoCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Montoya17, author = {Michael Montoya}, title = {Keynote Talk {\#}2: Increase your security effectiveness by automating and machine learning}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {35}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073881}, doi = {10.1109/DESEC.2017.8073881}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Montoya17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/MuzaffarWAE17, author = {Shahzad Muzaffar and Owais Talaat Waheed and Zeyar Aung and Ibrahim Abe M. Elfadel}, title = {Single-clock-cycle, multilayer encryption algorithm for single-channel IoT communications}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {153--158}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073841}, doi = {10.1109/DESEC.2017.8073841}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/MuzaffarWAE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/MzahMA17, author = {Abir M'zah and Bruno Monsuez and Hycham Aboutaleb}, title = {Deterministic microcode machine generation}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {370--376}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073858}, doi = {10.1109/DESEC.2017.8073858}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/MzahMA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/PyoLL17, author = {Youngbin Pyo and Choong In Lee and Heejo Lee}, title = {Visual analysis of corrupted video data in video event data recorders}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {453--458}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073828}, doi = {10.1109/DESEC.2017.8073828}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/PyoLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/RavindranH17, author = {Kaliappa Ravindran and Chin{-}Tser Huang}, title = {Probabilistic treatment of service assurance in distributed information systems}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {318--325}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073818}, doi = {10.1109/DESEC.2017.8073818}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/RavindranH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/RavindranWKIAD17, author = {Kaliappa Ravindran and Yassine Wardei and A. Kodia and Michael Iannelli and Arun Adiththan and Steven Drager}, title = {Assessment of QoS adaptation and cyber-defense mechanisms in networked systems}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {501--508}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073833}, doi = {10.1109/DESEC.2017.8073833}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/RavindranWKIAD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/RengarajuRL17, author = {Perumalraja Rengaraju and V. Raja Ramanan and Chung{-}Horng Lung}, title = {Detection and prevention of DoS attacks in Software-Defined Cloud networks}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {217--223}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073810}, doi = {10.1109/DESEC.2017.8073810}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/RengarajuRL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/RichardsonLP17, author = {Daniel P. Richardson and Alan C. Lin and John M. Pecarina}, title = {Hosting distributed databases on internet of things-scale devices}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {352--357}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073855}, doi = {10.1109/DESEC.2017.8073855}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/RichardsonLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Sandhu17, author = {Ravi S. Sandhu}, title = {Keynote talk {\#}1: Attribute-based access control: Insights and challenges}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {34}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073880}, doi = {10.1109/DESEC.2017.8073880}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Sandhu17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ShihC17, author = {Ming{-}Hung Shih and J. Morris Chang}, title = {Design and analysis of high performance crypt-NoSQL}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {52--59}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073797}, doi = {10.1109/DESEC.2017.8073797}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ShihC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/SiaoSW17, author = {Siang{-}Min Siao and Ming{-}Hwa Sheu and Shao{-}Yu Wang}, title = {High-performance reverse converter design for the new four-moduli Set \{2\({}^{\mbox{2n}}\), 2\({}^{\mbox{n}}\)+1, 2\({}^{\mbox{n/2}}\)+1, 2\({}^{\mbox{n/2}}\)-1\}}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {1--2}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073888}, doi = {10.1109/DESEC.2017.8073888}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/SiaoSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/SuRT17, author = {Yuan{-}Hsiang Su and Amir Rezapour and Wen{-}Guey Tzeng}, title = {The forward-backward string: {A} new robust feature for botnet detection}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {485--492}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073831}, doi = {10.1109/DESEC.2017.8073831}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/SuRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/SunYLBPLGO17, author = {Ruimin Sun and Xiaoyong Yuan and Andrew Lee and Matt Bishop and Donald E. Porter and Xiaolin Li and Andr{\'{e}} Gr{\'{e}}gio and Daniela Oliveira}, title = {The dose makes the poison - Leveraging uncertainty for effective malware detection}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {123--130}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073803}, doi = {10.1109/DESEC.2017.8073803}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/SunYLBPLGO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/SungH17, author = {Kuohua Sung and Terng{-}Yin Hsu}, title = {{FPGA} implementation of {OFDM} baseband processor}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {466--467}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073864}, doi = {10.1109/DESEC.2017.8073864}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/SungH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/SwinkelsCXS17, author = {Wout Swinkels and Luc Claesen and Feng Xiao and Haibin Shen}, title = {{SVM} point-based real-time emotion detection}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {86--92}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073838}, doi = {10.1109/DESEC.2017.8073838}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/SwinkelsCXS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/TaheriY17, author = {Shayan Taheri and Jiann{-}Shiun Yuan}, title = {Security analysis of computing systems from circuit-architectural perspective}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {166--173}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073843}, doi = {10.1109/DESEC.2017.8073843}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/TaheriY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/TienLCK17, author = {Chin{-}Wei Tien and Jian{-}Wei Liao and Shun{-}Chieh Chang and Sy{-}Yen Kuo}, title = {Memory forensics using virtual machine introspection for Malware analysis}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {518--519}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073871}, doi = {10.1109/DESEC.2017.8073871}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/TienLCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/TsaiH17, author = {Tsung{-}Yen Tsai and Jiun{-}Lang Huang}, title = {Source code transformation for software-based on-line error detection}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {305--309}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073852}, doi = {10.1109/DESEC.2017.8073852}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/TsaiH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/TsaiKHL17, author = {Cheng{-}Yu Tsai and Chuan{-}Kai Kao and Chuan{-}Yuan Huang and Zhi{-}Wei Lin}, title = {Resisting attacks from rogue HeNB}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {522--523}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073873}, doi = {10.1109/DESEC.2017.8073873}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/TsaiKHL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/TsengWCW17, author = {Tien{-}Hung Tseng and Shu{-}Sheng Wang and Jian{-}You Chen and Kai{-}Chiang Wu}, title = {Workload-aware lifetime Trojan based on statistical aging manipulation}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {159--165}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073842}, doi = {10.1109/DESEC.2017.8073842}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/TsengWCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WangC17, author = {Jhen{-}Li Wang and Yen{-}Chung Chen}, title = {An SDN-based defensive solution against {DHCP} attacks in the virtualization environment}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {529--530}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073876}, doi = {10.1109/DESEC.2017.8073876}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/WangC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WangS17, author = {Chia{-}Wei Wang and Shiuhpyng Shieh}, title = {VMCloak: Toward a stealthy in-VM agent execution}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {115--122}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073802}, doi = {10.1109/DESEC.2017.8073802}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/WangS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WangWC17, author = {Chieh{-}Min Wang and Yu{-}Sung Wu and Hsing{-}Hsuan Chung}, title = {{FUSION:} {A} unified application model for virtual mobile infrastructure}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {224--231}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073811}, doi = {10.1109/DESEC.2017.8073811}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/WangWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WuCHTC17, author = {Chang{-}Han Wu and Ti{-}Jui Chen and Terng{-}Yin Hsu and Shang{-}Ho Tsai and Hsung{-}Pin Chang}, title = {Design of applying FlexRay-bus to federated archiectecture for triple redundant reliable {UAV} flight control system}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {73--78}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073836}, doi = {10.1109/DESEC.2017.8073836}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/WuCHTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WuOF17, author = {Jia{-}Hao Wu and Wei{-}Liang Ou and Chih{-}Peng Fan}, title = {NIR-based gaze tracking with fast pupil ellipse fitting for real-time wearable eye trackers}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {93--97}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073839}, doi = {10.1109/DESEC.2017.8073839}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/WuOF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WuYL17, author = {Jingzheng Wu and Mutian Yang and Tianyue Luo}, title = {{PACS:} Pemission abuse checking system for android applictions based on review mining}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {251--258}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073813}, doi = {10.1109/DESEC.2017.8073813}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/WuYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/YanY17, author = {Bin Yan and Lin You}, title = {A novel public key encryption model based on transformed biometrics}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {424--428}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073861}, doi = {10.1109/DESEC.2017.8073861}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/YanY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/YehLLCH17, author = {Chao{-}Chun Yeh and Han{-}Lin Lu and Yi{-}Hsuan Lee and Wei{-}Sheng Chou and Shih{-}Kun Huang}, title = {CRAXTriage: {A} coverage based triage system}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {408--415}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073859}, doi = {10.1109/DESEC.2017.8073859}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/YehLLCH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/YingN17, author = {Bidi Ying and Amiya Nayak}, title = {Location privacy-protection based on p-destination in mobile social networks: {A} game theory analysis}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {243--250}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073812}, doi = {10.1109/DESEC.2017.8073812}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/YingN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/Yu17, author = {James T. Yu}, title = {A practical and effective approach to implementing High Availability Seamless Redundancy {(HSR)}}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {392--399}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073824}, doi = {10.1109/DESEC.2017.8073824}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/Yu17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/YuSLD17, author = {Xingjie Yu and Michael Thang Shiwen and Yingjiu Li and Robert Huijie Deng}, title = {Fair deposits against double-spending for Bitcoin transactions}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {44--51}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073796}, doi = {10.1109/DESEC.2017.8073796}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/YuSLD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ZhangCYWLL17, author = {Xinyin Zhang and Yuanye Cao and Mutian Yang and Jingzheng Wu and Tianyue Luo and Yueqin Liu}, title = {Droidrevealer: Automatically detecting Mysterious Codes in Android applications}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {535--536}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073885}, doi = {10.1109/DESEC.2017.8073885}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ZhangCYWLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ZhuangC17, author = {Di Zhuang and J. Morris Chang}, title = {PeerHunter: Detecting peer-to-peer botnets through community behavior analysis}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {493--500}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073832}, doi = {10.1109/DESEC.2017.8073832}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ZhuangC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ZhuangWC17, author = {Di Zhuang and Sen Wang and J. Morris Chang}, title = {FRiPAL: Face recognition in privacy abstraction layer}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {441--448}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073826}, doi = {10.1109/DESEC.2017.8073826}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ZhuangWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/desec/2017, title = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, publisher = {{IEEE}}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8053489/proceeding}, isbn = {978-1-5090-5569-2}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.