


default search action
8th CSNet 2024: Paris, France
- 8th Cyber Security in Networking Conference, CSNet 2024, Paris, France, December 4-6, 2024. IEEE 2024, ISBN 979-8-3315-3410-3
- Sana Ullah, Shanshan Tu, Akhtar Badshah, Muhammad Waqas:
A Robust Anonymous Authentication Scheme for Securing IoT-Enabled Healthcare Services. 1-6 - Henry Chima Ukwuoma
, Gilles Dusserre, Gouenou Coatrieux, Johanne Vincent, Nasir Baba Ahmed:
Optimising Intrusion Detection in Cyber-Physical Systems. 7-14 - Zaid Allal, Hassan Noura, Ola Salman, Ali Chehab:
Advanced Anomaly Detection in Energy Control Systems Using Machine Learning and Feature Engineering. 15-21 - Walid El Gadal, Sudhakar Ganti:
Dynamic Defense Framework: A Unified Approach for Intrusion Detection and Mitigation in SDN. 22-27 - Betül Güvenç Paltun, Ramin Fuladi:
Introspective Intrusion Detection System Through Explainable AI. 28-32 - Zakaria Alomari, Zhida Li, Adetokunbo Makanju:
Lightweight Machine Learning-Based IDS for IoT Environments. 33-37 - Saeid Sheikhi, Panos Kostakos, Susanna Pirttikangas:
Effective Anomaly Detection in 5G Networks via Transformer-Based Models and Contrastive Learning. 38-43 - Fatemeh Stodt
, Philipp Ruf, Christoph Reich
:
Blockchain-Enabled Digital Product Passports for Enhancing Security and Lifecycle Management in Healthcare Devices. 44-51 - Adrián Guayasamín, Walter Fuertes, Nahir Carrera, Luis Tello-Oquendo, Valeria Suango:
Blockchain-Enhanced E-Ticket Distribution System to Effective Transactions, Validation, and Audits. 52-59 - Ali Jalooli, Huzaif Khan, Lokesh Purohit:
Blockchain-Enabled Collaborative Forged Message Detection in RSU-Based VANETs. 60-67 - Majd Latah, Kübra Kalkan:
SDN-API-Sec: A Conflict-Free BC-Based Authorization for Cross-Domain SDNs. 68-75 - Halvor Nybø Risto, Steven Bos, Olaf Hallan Graven:
Keystroke Dynamics Authentication with MLP, CNN, and LSTM on a Fixed-Text Data Set. 76-82 - Stefan Machmeier, Vincent Heuveline:
Detecting DNS Tunnelling and Data Exfiltration Using Dynamic Time Warping. 83-91 - Yuan-Chen Chang, Esma Aïmeur:
Chat or Trap? Detecting Scams in Messaging Applications with Large Language Models. 92-99 - Ioannis Arakas, Nikolaos Myrtakis, Thomas Marchioro, Evangelos P. Markatos:
Ransomwise: A Transaction-Based Dataset for Ransomware Bitcoin Wallet Detection. 100-107 - Zi Heng Phang, Wei Ming Tan, Joshua Sheng Xiong Choo, Zhi Kang Ong, Weng Hong Isaac Tan, Huaqun Guo:
VishGuard: Defending Against Vishing. 108-115 - Robin Chataut, Aadesh Upadhyay, Yusuf Usman, Mary Nankya, Prashnna K. Gyawali:
Spam No More: A Cross-Model Analysis of Machine Learning Techniques and Large Language Model Efficacies. 116-122 - Rizwan Ahmed Kango, Mehak Fatima Qureshi, Wai-Yiu Keung, Umair Mujtaba Qureshi, Zuneera Umair, Ho Chuen Kam:
Predicting User Activities and Device Interactions Using Adversarial Sensor Data: A Machine Learning Approach. 123-127 - Dhia Ben Ali, Mohamed Belaoued, Samir Dawaliby:
Anticipating Cyber Threats: Deep Learning Approaches for DDoS Attacks Forecasting. 128-132 - Ornella Lucresse Soh, Issa Traoré, Isaac Woungang, Wei Lu, Marcelo L. Brocardo:
Identifying APT Attack Stages Using Anomaly Score Calibration. 133-137 - Roberto O. Andrade, Jenny Torres, Pamela Flores, Erick Cabezas, Jorge Segovia:
Convergence of AI for Secure Software Development. 138-142 - Believe Ayodele
, Victor Buttigieg:
A Multi-Level Network Traffic Classification in Combating Cyberattacks Using Stack Deep Learning Models. 143-146 - Binh Le Thanh Thai, Tsubasa Takii, Hidema Tanaka:
Password Classification Using Machine Learning and Natural Language Processing Techniques: Methods and Evaluations. 147-150 - Jun Peng, Derick Kwok, Huaqun Guo:
Detecting Spam Emails Using Machine Learning and Lemmatization vs Traditional Methods. 151-152 - Anika Maisha Tasnim, Amrin Hassan Heya, Md Maraj Rashid, Nafis Shahriar, Raqeebir Rab, Abderrahmane Leshob:
A Machine Learning Approach of Predicting Ransomware Addresses in BlockChain Networks. 153-156 - Bilel Saghrouchni, Frédéric Le Mouël, Bogdan Szanto:
Towards an Unsupervised Reward Function for a Deep Reinforcement Learning Based Intrusion Detection System. 157-160 - Guy Pujolle, Pascal Urien:
A New Generation of Security for the 6G. 161-164 - Thomas Rosenstatter, Christian Schäfer, Olaf Saßnick, Stefan Huber:
AsIf: Asset Interface Analysis of Industrial Automation Devices. 165-172 - Beny Nugraha, Abhishek Venkatesh Jnanashree, Thomas Bauschert:
An Efficient Explainable Artificial Intelligence (XAI)-Based Framework for a Robust and Explainable IDS. 173-181 - Ferhat Karakoç, Betül Güvenç Paltun, Leyli Karaçay, Ömer Faruk Tuna, Ramin Fuladi, Utku Gülen:
FASIL: A Challenge-Based Framework for Secure and Privacy-Preserving Federated Learning. 182-189 - Jayanthi Ramamoorthy, Cihan Varol, Narasimha K. Shashidhar:
APT Warfare: Technical Arsenal and Target Profiles of Linux Malware in Advanced Persistent Threats. 190-196 - Fatema El Husseini, Hassan Noura, Flavien Vernier:
Security and Privacy-Preserving for Machine Learning Models: Attacks, Countermeasures, and Future Directions. 197-204 - Antonin Verdier
, Romain Laborde, Abir Laraba, Abdelmalek Benzekri:
DID U Misbehave? A New Dataset for In-Depth Understanding of Inconspicuous Software. 205-212 - Ivana Burgetova, Ondrej Rysavý, Petr Matousek:
Towards Identification of Network Applications in Encrypted Traffic. 213-221 - Andrew Bengtson, Christopher Rouff, Ali Tekeoglu:
An Autonomic Chess Bot Detection & Defeat System. 222-227 - Prathibha Keshavamurthy, Sarvesh Kulkarni:
A Hybrid Machine Learning - Fuzzy Cognitive Map Approach for Fast, Reliable DDoS Attack Detection. 228-235 - Tushar Gupta:
Kubernetes-Driven Network Security for Distributed ACL Management. 236-242 - David A. Cordova Morales, Ahmad Samer Wazan, Romain Laborde, Muhammad Imran Taj, Adib Habbal, Gina Gallegos-García:
Towards the Removal of Identification and Authentication Authority from IM Systems. 243-247 - Wael Alsabbagh, Samuel Amogbonjaye, Chaerin Kim, Peter Langendörfer:
Pirates of the MQTT: Raiding IIoT Systems with a Rogue Client. 248-253 - Salah Dine Maham, Guy Pujolle, Atiq Ahmed, Dominique Gaïti:
A New Similarity-Based Classification Scheme of Drone Network Attacks. 254-258 - Ilham Laabab, Abdellatif Ezzouhairi, Nour El Madhoun, Muhammad Haris Khan:
Blockchain and Biometric Systems Integration for IoMT Security. 259-262 - Massimo Morello, Petri Sainio, Mohammed Alshawki:
Regulatory Compliance Verification: A Privacy Preserving Approach. 263-267 - Thijs Van Ede, Trix Mulder, Evgeni Moyakine
:
Interdisciplinary Research Project 'AI Shield'. 268-271 - Jörn Bodenhausen, Laurenz Grote, Michael Rademacher, Martin Henze:
Adaptive Optimization of TLS Overhead for Wireless Communication in Critical Infrastructure. 272-275 - Enes Begecarslan, Burcu Ozbay:
A Situational Assessment Module for CCAM Applications. 276-277 - Patricio Zambrano, Jenny Torres, Carlos E. Anchundia, Johan Illicachi:
Mobbing: AI-Powered Cyberthreat Behavior Analysis and Modeling. 278-281 - Emmanuel Song Shombot
, Gilles Dusserre, Robert Bestak, Nasir Baba Ahmed:
Cross ML for Io(H)T Network Traffic Classification: A New Approach Towards Standardization. 282-288 - Fatemeh Erfan, Mohammad Yahyatabar, Martine Bellaïche, Talal Halabi:
Advanced Smart Contract Vulnerability Detection Using Large Language Models. 289-296 - Fatema El Husseini, Hassan Noura, Ola Salman, Ali Chehab:
Advanced Machine Learning Approaches for Zero-Day Attack Detection: A Review. 297-304 - Kamal Singh, Rohit Saxena
, Brijesh Kumar:
AI Security: Cyber Threats and Threat-Informed Defense. 305-312

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.