- 2024
- Essam Al Daoud, Laith Al Daoud, Mahmoud Asassfeh, Ala'a Al-Shaikh, Ala'a Saeb Al-Sherideh, Suha Afaneh:
Enhancing Cybersecurity with Transformers: Preventing Phishing Emails and Social Media Scams. DSC 2024: 31-36 - Chun-I Fan, Ming-Feng Tsai, Chun-Pin Hu, Ming-Hung Wang:
Sockpuppets Detection Using Markov-Driven Graph Convolutional Networks with Ensemble Learning. DSC 2024: 37-44 - Chansu Han, Akira Tanaka, Takeshi Takahashi, Sajjad Dadkhah, Ali A. Ghorbani, Tsung-Nan Lin:
Traceability Measurement Analysis of Sustained Internet-Wide Scanners via Darknet. DSC 2024: 17-22 - Mizuho Hasegawa, Yamato Kawaguchi, Hiroaki Takayama, Yasuhiro Kunimine, Hidekazu Tanaka, Shintaro Kawamura, Akira Fujita, Shingo Yasuda, Daisuke Inoue, Nobuyo Fujiwara, Kazuki Takada, Rui Tanabe, Katsunari Yoshioka:
A Case Study of URL Blocklist Maintenance. DSC 2024: 100-101 - Masanori Hirotomo, Atsushi Marui, Yoshiaki Shiraishi:
Systematic Construction of Adaptively Decodable Visual Secret Sharing Scheme on Background Color. DSC 2024: 82-87 - Yi-Chen Hsieh, Tzu-Chi Yu, Chi-Yu Li, Guan-Hua Tu:
InstaMAuth: Instant Mobile Authentication Service Based on 5G Authenticated Call Sessions. DSC 2024: 131-138 - Zhewei Huang, Yin Minn Pa Pa, Katsunari Yoshioka:
Exploring the Impact of LLM Assisted Malware Variants on Anti-Virus Detection. DSC 2024: 76-77 - Jheng-Jia Huang, Wei-Hsueh Wang, Wen-Yan Dai, Guan-Yu Chen, Yi-Fan Tseng:
Efficient and Secure Multi-Point Communication Framework Supporting Resource Constraints Environment. DSC 2024: 80-81 - Ryoichi Isawa, Nobuyuki Kanaya, Daisuke Inoue:
Information Flow Tracking for Hardware Trojan Detection: a Feasibility Study. DSC 2024: 51-57 - Akira Kanaoka, Mamoru Abe:
Enhanced Analysis of Cryptographic Library Usage Patterns and Trends in Android Applications. DSC 2024: 88-93 - Yamato Kawaguchi, Kazuki Takada, Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto:
Investigating Black-Market Jobs on Social Networking Service. DSC 2024: 106-107 - Mansoor Ali Khan, Muhammad Naveed Aman, Biplab Sikdar:
Quantum Guard: Pioneering Quantum-Based Malware Defense for IoT Devices. DSC 2024: 94-99 - Minjung Kim, Daejin Park:
Enhancing Microcontroller Security Through Volatile Memory-Resident Encrypted Code. DSC 2024: 78-79 - Pramod Kumar, Ayan Seal, Sraban Kumar Mohanty, Haibo Zhang, Kouichi Sakurai:
One Pixel Adversarial Attack for Fooling Deep Learning-Based Facial Expression Recognition Systems. DSC 2024: 23-30 - Hiroki Kuzuno, Toshihiro Yamauchi:
kdMonitor: Kernel Data Monitor for Detecting Kernel Memory Corruption. DSC 2024: 66-73 - Ortal Lavi, Ofir Manor, Tomer Schwartz, Andrés F. Murillo, Ayoub Messous, Motoyoshi Sekiya, Junichi Suga, Kenji Hikichi, Yuki Unno:
Fine-Tuning Large Language Models for Network Traffic Analysis in Cyber Security. DSC 2024: 45-50 - Hyunwoo Lee, Taewoong Kwon, Jun Lee, Jungsuk Song:
Enhancing Decision-Making of Network Intrusion Analysis Assisted by Explainable AI for Real-Time Security Monitoring. DSC 2024: 147-154 - Oratile Leteane, Yirsaw Ayalew, Tshiamo Motshegwa:
A Multi-Package Trust Model for Improving the Trustworthiness of Traceability Data in Blockchain-Based Beef Supply Chain. DSC 2024: 155-162 - Rui Liu, Yaokai Feng, Kouichi Sakurai:
An Approach to Multi-Class Intrusion Detection Based on Feature Subspaces and Weighted Fusion. DSC 2024: 139-146 - Shunsuke Nakatani, Hiroki Kuzuno, Makoto Takita, Masami Mohri, Yoshiaki Shiraishi:
Can We Determine Whether a Set of Ethereum Transaction Data Contains Fraudulent Transactions? DSC 2024: 108-114 - Boubakr Nour, Makan Pourzandi, Jesus Alatorre, Jan Willekens, Mourad Debbabi:
Chronohunt: Determining Optimal Pace for Automated Alert Analysis in Threat Hunting Using Reinforcement Learning. DSC 2024: 1-8 - Masaya Sato, Ryuki Mandai:
Control Displaying of Web Push Notifications Inducing Users to Phishing Websites. DSC 2024: 102-103 - Toshiro Sawamoto, Mio Suzuki, Yutaro Osako, Takahiro Kasama, Daisuke Inoue, Koji Nakao:
Inherited Threat Reproduction on Open Source 5G Testbed. DSC 2024: 9-16 - Makoto Shimamura, Shingo Matsugaya, Keisuke Sakai, Kosuke Takeshige, Masaki Hashimoto:
An Analysis of the Relationship Between Black-Hat SEO Malware Families Leveraging Information from Redirected Fake E-Commerce Scam Sites. DSC 2024: 123-130 - Jingyi Sun, Qi Shi, Guodong Jin, Hao Xu, Weichao Chen:
Blockchain-Enabled IoV: Secure Communication and Trustworthy Decision-Making. DSC 2024: 104-105 - Yuta Takabayashi, Masahiro Mambo:
Detection Evasion Using eBPF for Linux Fileless Malware. DSC 2024: 74-75 - Ayumu Yamada, Hiroyuki Ito, Kosuke Kajimoto, Tetsuya Kageyama, Taichi Aoki, Takahiro Kasama:
Threat of Technical Support Scams in Japan. DSC 2024: 115-122 - Sinan Yavuz, Edwin Naroska, Kai Daniel:
Vulnerabilities and Challenges in the Development of PUF-Based Authentication Protocols on FPGAs: A Brief Review. DSC 2024: 58-65 - IEEE Conference on Dependable and Secure Computing, DSC 2024, Tokyo, Japan, November 6-8, 2024. IEEE 2024, ISBN 979-8-3315-4028-9 [contents]
- 2023
- Mila Anastasova, Rabih El Khatib, Aimee Laclaustra, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Highly Optimized Curve448 and Ed448 design in wolfSSL and Side-Channel Evaluation on Cortex-M4. DSC 2023: 1-8