dblp: SciSec 2022 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


4th SciSec 2022: Matsue, Japan

jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Chunhua Su
, Kouichi Sakurai, Feng Liu:
Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13580, Springer 2022, ISBN 978-3-031-17550-3
Blockchain and Applications

Jorge Castillo
, Kevin Barba
, Qian Chen
:
ChainSCAN: A Blockchain-Based Supply Chain Alerting Framework for Food Safety. 3-20

Yanze Kang, Xiaobo Yu, Weizhi Meng
, Yining Liu
:
BlockRAT: An Enhanced Remote Access Trojan Framework via Blockchain. 21-35

Ling Yang, Huawei Huang:
Adapted PBFT Consensus Protocol for Sharded Blockchain. 36-50

Wictor Lang Jensen, Sille Jessing, Wei-Yang Chiu
, Weizhi Meng
:
A Practical Blockchain-Based Maintenance Record System for Better Aircraft Security. 51-67

Chunying Peng, Haixia Xu:
Redactable Blockchain with Fine-Grained Autonomy and Transaction Rollback. 68-84
Cryptography and Applications

Chuyi Yan, Haixia Xu, Yongheng Mu, Jiong Ding:
Pitch in: A Secure Extension Signature Based on SM9. 87-104

Amirreza Hamidi, Hossein Ghodosi:
Verifiable DOPE from Somewhat Homomorphic Encryption, and the Extension to DOT. 105-120

Po-Chu Hsu
, Atsuko Miyaji
:
Scalable M+1st-Price Auction with Infinite Bidding Price. 121-136

Chen Li, Bibo Tu, Yanchang Feng:
The Shared Memory Based Cryptographic Card Virtualization. 137-151
Network Security

Kun Jia
, Jiazhi Liu, Wen Wang, Feng Liu
:
Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN. 170-185

Wenjie Qin, Chengwei Peng, Tao Yin, Changbo Tian, Guangze Zhao:
AtNet: A Novel Anti-tracking Network with Multi-Party Judgement Capability Based on Cross-Domain Small-World Topology. 186-200

Bingxu Wang, Gang Xiong
, Peipei Fu, Gaopeng Gou, Yingchao Qin, Zhen Li:
A Two-Stage Method for Fine-Grained DNS Covert Tunnel Behavior Detection. 201-216

Jiang Xie, Shuhao Li, Peishuai Sun:
Analysis and Detection Against Overlapping Phenomenon of Behavioral Attribute in Network Attacks. 217-232

Hassan Noun, Florian Rehm, Guillaume Zeller, G. Rajesh, Roland Lachmayer:
Integration of Cybersecurity Related Development Processes by Using a Quantification Method. 233-242
Cyber-Physical System

Thomas Gleerup, Wenjuan Li, Jiao Tan, Yu Wang:
ZoomPass: A Zoom-Based Android Unlock Scheme on Smart Devices. 245-259

Sulav Lal Shrestha
, Taylor Lee
, Sebastian Fischmeister
:
Metasploit for Cyber-Physical Security Testing with Real-Time Constraints. 260-275

Guozhu Zhao, Pinchang Zhang, Yulong Shen, Xiaohong Jiang:
Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems. 276-284
Malware

Yu Ding, Xiaoyu Zhang, Binbin Li, Jian Xing, Qian Qiang, Zisen Qi, Menghan Guo, Siyu Jia, Haiping Wang:
Malware Classification Based on Semi-Supervised Learning. 287-301

Xiao Chen, Zhengwei Jiang, Shuwei Wang, Rongqi Jing, Chen Ling, Qiuyun Wang:
Malware Detected and Tell Me Why: An Verifiable Malware Detection Model with Graph Metric Learning. 302-314
Mobile System Security

Khalid Alkhattabi, Davita Bird, Kai Miller, Chuan Yue:
Question Answering Models for Privacy Policies of Mobile Apps: Are We There Yet? 333-352

Hung-Yu Chien
:
Design of End-To-End Security for MQTT 5.0. 353-363

Xinyu Liu, Wu Zhao, Langping Chen, Qixu Liu:
DroidFP: A Zero-Permission Detection Framework for Android Devices Based on Gated Recurrent Unit. 364-374
System and Web Security

Othmane Belarbi
, Aftab Khan
, Pietro Edoardo Carnelli
, Theodoros Spyridopoulos
:
An Intrusion Detection System Based on Deep Belief Networks. 377-392

Jiawei Sun, Guangjun Wu, Junnan Yin, Qiang Qian, Junjiao Liu, Jun Li, Yong Wang:
HINCDG: Multi-Meta-Path Graph Auto-Encoders for Mining of Weak Association Malicious Domains. 393-406

Xiangyu Du, Zhengwei Jiang, Jun Jiang, Kai Zhang, Zijing Fan, Fangming Dong, Ning Li, Baoxu Liu:
BASNEA: Threat Hunting for Ethereum Smart Contract Based on Backtrackless Aligned-Spatial Network Entity Alignment. 421-436

Qian Zou, Ning Zhang, Feng Guo, Qingshan Kong, Zhiqiang Lv:
Multi-region SRAM-Based TCAM for Longest Prefix. 437-452
Security in Financial Industry
Social Engineering and Personalized Security

Rosana Montanez Rodriguez, Shouhuai Xu:
Cyber Social Engineering Kill Chain. 487-504

Leilei Qu
, Ruojin Xiao, Wenchang Shi:
Towards Practical Personalized Security Nudge Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge Effects. 505-521

Zhiting Ling, Huamin Feng, Xiong Ding, Xuren Wang, Chang Gao, Peian Yang:
Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement. 522-538
Privacy and Anonymity

Huajun Cui, Guozhu Meng, Yan Zhang, Weiping Wang, Dali Zhu, Ting Su, Xiaodong Zhang, Yuejun Li:
TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps. 541-556

Jing Yu
, Shuguang Yuan, Yulin Yuan, Yafan Li, Chi Chen
:
A k-Anonymity-Based Robust Watermarking Scheme for Relational Database. 557-573

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






