


default search action
DSC 2023: Tampa, FL, USA
- IEEE Conference on Dependable and Secure Computing, DSC 2023, Tampa, FL, USA, November 7-9, 2023. IEEE 2023, ISBN 979-8-3503-8211-2

- Mirza Athar Baig, Muhammad Naveed Aman:

Exploiting Hardware Imperfections for GPS Spoofing Detection using Clock Variations. 1-7 - Soumyadeep Hore, Quoc H. Nguyen, Yulun Xu, Ankit Shah, Nathaniel D. Bastian, Trung Q. Le:

Empirical Evaluation of Autoencoder Models for Anomaly Detection in Packet-based NIDS. 1-8 - Keval Doshi, Yasin Yilmaz:

Privacy-Preserving Video Understanding via Transformer-based Federated Learning. 1-8 - Pojan Shahrivar, Stuart Millar, Ezzeldin Shereen:

Detecting Web Application DAST Attacks with Machine Learning. 1-8 - Parisa Ansari Bonab, James Holland, Arman Sargolzaei

:
An Observer-Based Control for a Networked Control of Permanent Magnet Linear Motors under a False-Data-Injection Attack. 1-8 - Tamer Omar

, Barret Griffin, Jose Garcia:
ML based Detection and Mitigation Scheme for DoS attacks on SDN Controllers. 1-6 - Manuel Alejandro Cardona-López

, Juan Carlos Chimal-Eguía, Víctor Manuel Silva García, Rolando Flores-Carapia:
The Substitution-Boxes Incompatibility in JPEG Image Encryption. 1-7 - Jingdi Chen

, Lei Zhang, Joseph Riem, Gina C. Adam, Nathaniel D. Bastian, Tian Lan:
RIDE: Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware Architecture. 1-8 - Galamo Monkam, Michael J. De Lucia, Nathaniel D. Bastian:

Preprocessing Network Traffic using Topological Data Analysis for Data Poisoning Detection. 1-8 - Albert Guan:

Secure Outsourcing of Boolean Formulas Truth Assignment Problem. 1-5 - Md. Zarif Hossain, Ahmed Imteaj

, Saika Zaman, Abdur Rahman Bin Shahid, Sajedul Talukder, M. Hadi Amini
:
FLID: Intrusion Attack and Defense Mechanism for Federated Learning Empowered Connected Autonomous Vehicles (CAVs) Application. 1-8 - Mila Anastasova, Rabih El Khatib, Aimee Laclaustra, Reza Azarderakhsh, Mehran Mozaffari Kermani:

Highly Optimized Curve448 and Ed448 design in wolfSSL and Side-Channel Evaluation on Cortex-M4. 1-8 - Vinay Sachidananda, Rajendra Patil, Akshay Sachdeva, Kwok-Yan Lam, Yang Liu

:
APTer: Towards the Investigation of APT Attribution. 1-10 - Sanoop Mallissery

, Yu-Sung Wu:
Enriching the Semantics of Information Flow Tracking with Source-Level Memory Allocation Event Logging. 1-10 - Maryam Davari, Mohammad Zulkernine:

Automatic Conversion of ABAC Policies for RBAC Systems. 1-7 - Eric Cooper, Eric Weese, Alex Fortson, Dan Lo, Yong Shi:

Cyber Security in Blockchain. 1-11 - Jonas Cunningham-Rush, James Holland, Shirin Noei, Arman Sargolzaei

:
Designing and Testing A Secure Cooperative Adaptive Cruise Control under False Data Injection Attack. 1-8 - Kelson J. McCollum, Nathaniel D. Bastian, Johannes O. Royset:

Towards Robust Learning using Diametrical Risk Minimization for Network Intrusion Detection. 1-8 - Saif E. Nouma, Attila A. Yavuz:

Lightweight Digital Signatures for Internet of Things: Current and Post-Quantum Trends and Visions. 1-2 - Muna Jemal, Dan Chia-Tien Lo:

Detection of Ransomware Attack Using Deep Learning. 1-9 - Tung-Lin Tsai, Pei-Yuan Wu:

SepMM: A General Matrix Multiplication Optimization Approach for Privacy-Preserving Machine Learning. 1-10 - Shanhsin Lee, Yung-Shiu Chen, Shiuhpyng Winston Shieh:

CoDex: Cross-Tactic Correlation System for Data Exfiltration Detection. 1-8 - Audun Myers, Alyson Bittner, Sinan Aksoy, Daniel M. Best, Gregory Henselman-Petrusek

, Helen Jenne, Cliff A. Joslyn, Bill Kay
, Garret Seppala, Stephen J. Young, Emilie Purvine:
Malicious Cyber Activity Detection using Zigzag Persistence. 1-8 - Urva Maryam, Mehdi Hussain:

A Study on the Forensic Analysis of Airlines Applications on Android Operating System. 1-9 - Varun Kohli

, Muhammad Naveed Aman, Biplab Sikdar:
SRAM and Generative Network-based Physical Fingerprinting for Trust Management in the Internet of Things. 1-8 - Ocheme Anthony Ekle

, Denis A. Ulybyshev:
Cyber Risk Evaluation for Android-based Devices. 1-8 - Tuncer Turhan, Hakan Tekgul, Ozcan Ozturk:

Compiler-Supported Selective Software Fault Tolerance. 1-6 - Keval Doshi, Yasin Yilmaz:

Semantic Video Transformer for Robust Action Recognition. 1-5 - Seyed Hamed Haghshenas, Mia Naeini:

Impact of Topology Noise on Power Systems State Estimation Using a Temporal GCN Framework. 1-5 - Heba M. Khater, Mohamad Khayat

, Saed Alrabaee, Mohamed Adel Serhani, Ezedin Barka, Farag M. Sallabi:
AI Techniques for Software Vulnerability Detection and Mitigation. 1-10 - Lo-Yao Yeh, Jun-Qian Jian, Jen-Wei Hu:

Decentralized and Incentivized Voting System with Web3 Technology Ensuring Anonymity and Preventing Double Voting. 1-8 - Cong Pu:

Privacy-Preserving and Fault-Tolerant Data Aggregation Protocol for Internet of Drones. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














