researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2017
2018
2019
2020
2021
2022
2024
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Abdelmalek Benzekri
Abed Ellatif Samhat
Ahmad Fadlallah
Ahmed Serhrouchni
Ali Tekeoglu
Emmanuel Bertin
François Barrère
Guy Pujolle
Hassan Noura 0001
Igor Jochem Sanz
Marc-Oliver Pahl
Maroun Chamoun
Martin Andreoni Lopez
Nour El Madhoun
Pascal Urien
Rida Khatoun
Romain Laborde
Talal Halabi
Thi Mai Trang Nguyen
Walter Fuertes
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
approach
attack
attacks
blockchain
cyber
detection
intrusion
iot
learning
machine
network
networks
privacy
secure
security
system
systems
traffic
using
CSNet (csnet)
Editions
Publications
Viewing Publication 1 - 100 from 182
2024
8th Cyber Security in Networking Conference, CSNet 2024, Paris, France, December 4-6, 2024
IEEE,
2024.
[doi]
Anticipating Cyber Threats: Deep Learning Approaches for DDoS Attacks Forecasting
Dhia Ben Ali
,
Mohamed Belaoued
,
Samir Dawaliby
.
csnet 2024
:
128-132
[doi]
Advanced Anomaly Detection in Energy Control Systems Using Machine Learning and Feature Engineering
Zaid Allal
,
Hassan Noura 0001
,
Ola Salman
,
Ali Chehab
.
csnet 2024
:
15-21
[doi]
Lightweight Machine Learning-Based IDS for IoT Environments
Zakaria Alomari
,
Zhida Li
,
Adetokunbo Makanju
.
csnet 2024
:
33-37
[doi]
Pirates of the MQTT: Raiding IIoT Systems with a Rogue Client
Wael Alsabbagh
,
Samuel Amogbonjaye
,
Chaerin Kim
,
Peter Langendörfer
.
csnet 2024
:
248-253
[doi]
Convergence of AI for Secure Software Development
Roberto O. Andrade
,
Jenny Torres 0001
,
Pamela Flores
,
Erick Cabezas
,
Jorge Segovia
.
csnet 2024
:
138-142
[doi]
Ransomwise: A Transaction-Based Dataset for Ransomware Bitcoin Wallet Detection
Ioannis Arakas
,
Nikolaos Myrtakis
,
Thomas Marchioro
,
Evangelos P. Markatos
.
csnet 2024
:
100-107
[doi]
A Multi-Level Network Traffic Classification in Combating Cyberattacks Using Stack Deep Learning Models
Believe Ayodele
,
Victor Buttigieg
.
csnet 2024
:
143-146
[doi]
A Situational Assessment Module for CCAM Applications
Enes Begecarslan
,
Burcu Ozbay
.
csnet 2024
:
276-277
[doi]
An Autonomic Chess Bot Detection & Defeat System
Andrew Bengtson
,
Christopher Rouff
,
Ali Tekeoglu
.
csnet 2024
:
222-227
[doi]
Adaptive Optimization of TLS Overhead for Wireless Communication in Critical Infrastructure
Jörn Bodenhausen
,
Laurenz Grote
,
Michael Rademacher
,
Martin Henze
.
csnet 2024
:
272-275
[doi]
Towards Identification of Network Applications in Encrypted Traffic
Ivana Burgetova
,
Ondrej Rysavý
,
Petr Matousek
.
csnet 2024
:
213-221
[doi]
Chat or Trap? Detecting Scams in Messaging Applications with Large Language Models
Yuan-Chen Chang
,
Esma Aïmeur
.
csnet 2024
:
92-99
[doi]
Spam No More: A Cross-Model Analysis of Machine Learning Techniques and Large Language Model Efficacies
Robin Chataut
,
Aadesh Upadhyay
,
Yusuf Usman
,
Mary Nankya
,
Prashnna K. Gyawali
.
csnet 2024
:
116-122
[doi]
Advanced Smart Contract Vulnerability Detection Using Large Language Models
Fatemeh Erfan
,
Mohammad Yahyatabar
,
Martine Bellaïche
,
Talal Halabi
.
csnet 2024
:
289-296
[doi]
Dynamic Defense Framework: A Unified Approach for Intrusion Detection and Mitigation in SDN
Walid El Gadal
,
Sudhakar Ganti
.
csnet 2024
:
22-27
[doi]
Blockchain-Enhanced E-Ticket Distribution System to Effective Transactions, Validation, and Audits
Adrián Guayasamín
,
Walter Fuertes
,
Nahir Carrera
,
Luis Tello-Oquendo
,
Valeria Suango
.
csnet 2024
:
52-59
[doi]
Kubernetes-Driven Network Security for Distributed ACL Management
Tushar Gupta
.
csnet 2024
:
236-242
[doi]
Security and Privacy-Preserving for Machine Learning Models: Attacks, Countermeasures, and Future Directions
Fatema El Husseini
,
Hassan Noura 0001
,
Flavien Vernier
.
csnet 2024
:
197-204
[doi]
Advanced Machine Learning Approaches for Zero-Day Attack Detection: A Review
Fatema El Husseini
,
Hassan Noura 0001
,
Ola Salman
,
Ali Chehab
.
csnet 2024
:
297-304
[doi]
Blockchain-Enabled Collaborative Forged Message Detection in RSU-Based VANETs
Ali Jalooli
,
Huzaif Khan
,
Lokesh Purohit
.
csnet 2024
:
60-67
[doi]
Predicting User Activities and Device Interactions Using Adversarial Sensor Data: A Machine Learning Approach
Rizwan Ahmed Kango
,
Mehak Fatima Qureshi
,
Wai-Yiu Keung
,
Umair Mujtaba Qureshi
,
Zuneera Umair
,
Ho Chuen Kam
.
csnet 2024
:
123-127
[doi]
FASIL: A Challenge-Based Framework for Secure and Privacy-Preserving Federated Learning
Ferhat Karakoç
,
Betül Güvenç Paltun
,
Leyli Karaçay
,
Ömer Faruk Tuna
,
Ramin Fuladi
,
Utku Gülen
.
csnet 2024
:
182-189
[doi]
A Hybrid Machine Learning - Fuzzy Cognitive Map Approach for Fast, Reliable DDoS Attack Detection
Prathibha Keshavamurthy
,
Sarvesh Kulkarni
.
csnet 2024
:
228-235
[doi]
Blockchain and Biometric Systems Integration for IoMT Security
Ilham Laabab
,
Abdellatif Ezzouhairi
,
Nour El Madhoun
,
Muhammad Haris Khan
.
csnet 2024
:
259-262
[doi]
SDN-API-Sec: A Conflict-Free BC-Based Authorization for Cross-Domain SDNs
Majd Latah
,
Kübra Kalkan
.
csnet 2024
:
68-75
[doi]
Detecting DNS Tunnelling and Data Exfiltration Using Dynamic Time Warping
Stefan Machmeier
,
Vincent Heuveline
.
csnet 2024
:
83-91
[doi]
A New Similarity-Based Classification Scheme of Drone Network Attacks
Salah Dine Maham
,
Guy Pujolle
,
Atiq Ahmed
,
Dominique Gaïti
.
csnet 2024
:
254-258
[doi]
Towards the Removal of Identification and Authentication Authority from IM Systems
David A. Cordova Morales
,
Ahmad Samer Wazan
,
Romain Laborde
,
Muhammad Imran Taj 0001
,
Adib Habbal
,
Gina Gallegos-García
.
csnet 2024
:
243-247
[doi]
Regulatory Compliance Verification: A Privacy Preserving Approach
Massimo Morello
,
Petri Sainio
,
Mohammed Alshawki
.
csnet 2024
:
263-267
[doi]
An Efficient Explainable Artificial Intelligence (XAI)-Based Framework for a Robust and Explainable IDS
Beny Nugraha
,
Abhishek Venkatesh Jnanashree
,
Thomas Bauschert
.
csnet 2024
:
173-181
[doi]
Introspective Intrusion Detection System Through Explainable AI
Betül Güvenç Paltun
,
Ramin Fuladi
.
csnet 2024
:
28-32
[doi]
Detecting Spam Emails Using Machine Learning and Lemmatization vs Traditional Methods
Jun Peng
,
Derick Kwok
,
Huaqun Guo
.
csnet 2024
:
151-152
[doi]
VishGuard: Defending Against Vishing
Zi Heng Phang
,
Wei Ming Tan
,
Joshua Sheng Xiong Choo
,
Zhi Kang Ong
,
Weng Hong Isaac Tan
,
Huaqun Guo
.
csnet 2024
:
108-115
[doi]
A New Generation of Security for the 6G
Guy Pujolle
,
Pascal Urien
.
csnet 2024
:
161-164
[doi]
APT Warfare: Technical Arsenal and Target Profiles of Linux Malware in Advanced Persistent Threats
Jayanthi Ramamoorthy
,
Cihan Varol
,
Narasimha K. Shashidhar
.
csnet 2024
:
190-196
[doi]
Keystroke Dynamics Authentication with MLP, CNN, and LSTM on a Fixed-Text Data Set
Halvor Nybø Risto
,
Steven Bos
,
Olaf Hallan Graven
.
csnet 2024
:
76-82
[doi]
AsIf: Asset Interface Analysis of Industrial Automation Devices
Thomas Rosenstatter
,
Christian Schäfer
,
Olaf Saßnick
,
Stefan Huber 0001
.
csnet 2024
:
165-172
[doi]
Towards an Unsupervised Reward Function for a Deep Reinforcement Learning Based Intrusion Detection System
Bilel Saghrouchni
,
Frédéric Le Mouël
,
Bogdan Szanto
.
csnet 2024
:
157-160
[doi]
Effective Anomaly Detection in 5G Networks via Transformer-Based Models and Contrastive Learning
Saeid Sheikhi
,
Panos Kostakos 0001
,
Susanna Pirttikangas
.
csnet 2024
:
38-43
[doi]
Cross ML for Io(H)T Network Traffic Classification: A New Approach Towards Standardization
Emmanuel Song Shombot
,
Gilles Dusserre
,
Robert Bestak
,
Nasir Baba Ahmed
.
csnet 2024
:
282-288
[doi]
AI Security: Cyber Threats and Threat-Informed Defense
Kamal Singh
,
Rohit Saxena
,
Brijesh Kumar 0002
.
csnet 2024
:
305-312
[doi]
Identifying APT Attack Stages Using Anomaly Score Calibration
Ornella Lucresse Soh
,
Issa Traoré
,
Isaac Woungang
,
Wei Lu
,
Marcelo L. Brocardo
.
csnet 2024
:
133-137
[doi]
Blockchain-Enabled Digital Product Passports for Enhancing Security and Lifecycle Management in Healthcare Devices
Fatemeh Stodt
,
Philipp Ruf
,
Christoph Reich
.
csnet 2024
:
44-51
[doi]
A Machine Learning Approach of Predicting Ransomware Addresses in BlockChain Networks
Anika Maisha Tasnim
,
Amrin Hassan Heya
,
Md Maraj Rashid
,
Nafis Shahriar
,
Raqeebir Rab
,
Abderrahmane Leshob
.
csnet 2024
:
153-156
[doi]
Password Classification Using Machine Learning and Natural Language Processing Techniques: Methods and Evaluations
Binh Le Thanh Thai
,
Tsubasa Takii
,
Hidema Tanaka
.
csnet 2024
:
147-150
[doi]
Optimising Intrusion Detection in Cyber-Physical Systems
Henry Chima Ukwuoma
,
Gilles Dusserre
,
Gouenou Coatrieux
,
Johanne Vincent
,
Nasir Baba Ahmed
.
csnet 2024
:
7-14
[doi]
A Robust Anonymous Authentication Scheme for Securing IoT-Enabled Healthcare Services
Sana Ullah
,
Shanshan Tu
,
Akhtar Badshah
,
Muhammad Waqas 0001
.
csnet 2024
:
1-6
[doi]
Interdisciplinary Research Project 'AI Shield'
Thijs van Ede
,
Trix Mulder
,
Evgeni Moyakine
.
csnet 2024
:
268-271
[doi]
DID U Misbehave? A New Dataset for In-Depth Understanding of Inconspicuous Software
Antonin Verdier
,
Romain Laborde
,
Abir Laraba
,
Abdelmalek Benzekri
.
csnet 2024
:
205-212
[doi]
Mobbing: AI-Powered Cyberthreat Behavior Analysis and Modeling
Patricio Zambrano
,
Jenny Torres 0001
,
Carlos E. Anchundia
,
Johan Illicachi
.
csnet 2024
:
278-281
[doi]
2022
Demonstration of Standalone Intelligent WiFi Sensing for Real-Time Occupancy Monitoring
Junye Li 0003
,
Aryan Sharma
,
Deepak Mishra 0001
,
Aruna Seneviratne
.
csnet 2022
:
1-2
[doi]
6th Cyber Security in Networking Conference, CSNet 2022, Rio de Janeiro, Brazil, October 24-26, 2022
IEEE,
2022.
[doi]
Horizontal network for a better cybersecurity
Khaldoun Al Agha
,
Pauline Loygue
,
Guy Pujolle
.
csnet 2022
:
1-4
[doi]
A Secure Cloud-based Architecture for monitoring Cyber-Physical Critical Infrastructures
Paulo Assumpção
,
Carlos Oliveira
,
Pablo Ortiz
,
Wilson S. Melo
,
Luiz Carmo
.
csnet 2022
:
1-7
[doi]
Assessing Software-Defined Radio Security and Performance in Virtualized Environments for Cloud Radio Access Networks
Govinda Mohini G. Bezerra
,
Tadeu N. Ferreira
,
Diogo M. F. Mattos
.
csnet 2022
:
1-7
[doi]
ICpSAF - Integrated Cross-platform Security Assessment Framework
João Pedro De Lima Cassiano
,
Sérgio Ribeiro
,
Alana Almeida
.
csnet 2022
:
1-2
[doi]
Security of NFC Banking Transactions: Overview on Attacks and Solutions
Samir Chabbi
,
Nour El Madhoun
,
Lazhar Khamer
.
csnet 2022
:
1-5
[doi]
Performance Analysis of a Privacy-Preserving Frame Sniffer on a Raspberry Pi
Fernando Dias de Mello Silva
,
Abhishek Kumar Mishra
,
Aline Carneiro Viana
,
Nadjib Achir
,
Anne Fladenmuller
,
Luís Henrique M. K. Costa
.
csnet 2022
:
1-7
[doi]
A Study of User Concerns about Smartphone Privacy
Carol J. Fung
,
Vivian Motti 0001
,
Katie Zhang
,
Yanjun Qian
.
csnet 2022
:
1-8
[doi]
A Review On Lexical Based Malicious Domain Name Detection Methods
Cherifa Hamroun
,
Ahmed Amamou
,
Kamel Haddadou
,
Hayat Haroun
,
Guy Pujolle
.
csnet 2022
:
1-7
[doi]
A Stream Learning Intrusion Detection System for Concept Drifting Network Traffic
Pedro Horchulhack
,
Eduardo K. Viegas
,
Martin Andreoni Lopez
.
csnet 2022
:
1-7
[doi]
A Survey on the Security Issues of QUIC
Y. A. Joarder
,
Carol Fung
.
csnet 2022
:
1-8
[doi]
The Impact of the Interest Flooding Attack on the Pending Interest Table of CCN routers
Diego Canizio Lopes
,
André Luiz Nasserala Pires
,
Igor Monteiro Moraes
.
csnet 2022
:
1-5
[doi]
A Web User Interface Tool for Metaheuristics-Based Feature Selection Assessment for IDSs
Humberto Mendes
,
Silvio E. Quincozes
,
Vagner E. Quincozes
.
csnet 2022
:
1-5
[doi]
Feature Extraction for Intrusion Detection in IEC-61850 Communication Networks
Vagner E. Quincozes
,
Silvio E. Quincozes
,
Célio Vinicius N. de Albuquerque
,
Diego G. Passos 0001
,
Daniel Mossé
.
csnet 2022
:
1-7
[doi]
ASOP: A Sovereign and Secure Device Onboarding Protocol for Cloud-based IoT Services
Khan Reaz
,
Gerhard Wunder
.
csnet 2022
:
1-3
[doi]
Security and Performance Analysis of Quorum-based Blockchain Consensus Protocols
Gabriel Antonio F. Rebello
,
Gustavo Franco Camilo
,
Lucas C. B. Guimarães
,
Lucas Airam C. de Souza
,
Otto Carlos M. B. Duarte
.
csnet 2022
:
1-7
[doi]
ZT&T: Secure blockchain-based tokens for service session management in Zero Trust Networks
Javier Jose Diaz Rivera
,
Talha Ahmed Khan
,
Waleed Akbar
,
Muhammad Afaq
,
Wang-Cheol Song
.
csnet 2022
:
1-7
[doi]
GRAFFITO-IDS: A Graph-based Algorithm for Feature Enrichment on Online Intrusion Detection Systems
Igor Jochem Sanz
,
Gabriel Antonio Fontes Rebello
,
Otto Carlos Muniz Bandeira Duarte
.
csnet 2022
:
1-7
[doi]
A Distributed Platform for Intrusion Detection System Using Data Stream Mining in a Big Data Environment
Fábio César Schuartz
,
Mauro Fonseca
,
Anelise Munaretto
.
csnet 2022
:
1-7
[doi]
Securing CoAP with DTLS and OSCORE
Emil Suleymanov
,
Erkin Kirdan
,
Marc-Oliver Pahl
.
csnet 2022
:
1-7
[doi]
Blockchain Meets Formal Logic: Semantics Level Cybersecurity Challenges
Nouredine Tamani
,
Saad El Jaouhari
.
csnet 2022
:
1-6
[doi]
Cyber Deception, the Ultimate Piece of a Defensive Strategy - Proof of Concept
Wiem Tounsi
.
csnet 2022
:
1-5
[doi]
Estimating Speedup Factor For Personal HSMs Based On Secure Elements
Pascal Urien
.
csnet 2022
:
1-4
[doi]
2021
5th Cyber Security in Networking Conference, CSNet 2021, Abu Dhabi, United Arab Emirates, October 12-14, 2021
IEEE,
2021.
[doi]
Incremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devices
AbdElaziz Saad AbdElaziz AbdElaal
,
Kai Lehniger
,
Peter Langendörfer
.
csnet 2021
:
55-62
[doi]
Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems
Mwrwan Abubakar
,
Zakwan Jaroucheh
,
Ahmed Yassin Al-Dubai
,
William J. Buchanan
.
csnet 2021
:
63-70
[doi]
A secure blockchain-based architecture for the COVID-19 data network
Darine Al-Mohtar
,
Amani Ramzi Daou
,
Nour El Madhoun
,
Rachad Maallawi
.
csnet 2021
:
1-5
[doi]
Real Time Detection of Social Bots on Twitter Using Machine Learning and Apache Kafka
Eiman Alothali
,
Hany Alashwal
,
Motamen Salih
,
Kadhim Hayawi
.
csnet 2021
:
98-102
[doi]
Intrusion detection systems in in-vehicle networks based on bag-of-words
Gianmarco Baldini
.
csnet 2021
:
41-48
[doi]
Inferring Legacy IoT Device Behavior over a Layer 2 TLS Tunnel
Rodrigo Caldas
,
Carlos Novo
,
Ricardo Morla
,
Luis Cruz 0007
,
António Carvalho
,
David Campelo
.
csnet 2021
:
23-30
[doi]
AI based Login System using Facial Recognition
Siem Girmay
,
Faniel Samsom
,
Asad Masood Khattak
.
csnet 2021
:
107-109
[doi]
Classification of malicious and benign websites by network features using supervised machine learning algorithms
Sanaa Kaddoura
.
csnet 2021
:
36-40
[doi]
Forensic Analysis of the Cisco WebEx Application
Zainab Khalid
,
Farkhund Iqbal
,
Faouzi Kamoun
,
Mohammed Hussain
,
Liaqat Ali Khan
.
csnet 2021
:
90-97
[doi]
Authenticating IDS autoencoders using multipath neural networks
Raphaël M. J. I. Larsen
,
Marc-Oliver Pahl
,
Gouenou Coatrieux
.
csnet 2021
:
1-9
[doi]
Advances in ML-Based Anomaly Detection for the IoT
Christian Lübben
,
Marc-Oliver Pahl
.
csnet 2021
:
18-22
[doi]
Blockchain-based Secure CIDS Operation
Imran Makhdoom
,
Kadhim Hayawi
,
Mohammed Kaosar
,
Sujith Samuel Mathew
,
Mohammad Mehedy Masud
.
csnet 2021
:
103-106
[doi]
C4M: A Partition-Robust Consensus Algorithm for Blockgraph in Mesh Network
David Cordova Morales
,
Pedro B. Velloso
,
Alexandre Laube
,
Thi Mai Trang Nguyen
,
Guy Pujolle
.
csnet 2021
:
82-89
[doi]
Modeling Evasive Malware Authoring Techniques
Mathew Nicho
,
Maitha Alkhateri
.
csnet 2021
:
71-75
[doi]
Mitigation of poisoning attack in federated learning by using historical distance detection
Zhaosen Shi
,
Xuyang Ding
,
Fagen Li
,
Yingni Chen
,
Canran Li
.
csnet 2021
:
10-17
[doi]
Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets
Pascal Urien
.
csnet 2021
:
49-54
[doi]
State of the art: Cross chain communications
Pedro B. Velloso
,
David Cordova Morales
,
Thi Mai Trang Nguyen
,
Guy Pujolle
.
csnet 2021
:
76-81
[doi]
2020
A Policy-based Interaction Protocol between Software Defined Security Controller and Virtual Security Functions
Sara Farahmandian
,
Doan B. Hoang
.
csnet 2020
:
1-8
[doi]
Specific Anomaly Detection Method in Wireless Communication Networks
Eva Holasova
,
Radek Fujdiak
,
Karel Kuchar
.
csnet 2020
:
1-3
[doi]
Simplified Method for Fast and Efficient Incident Detection in Industrial Networks
Karel Kuchar
,
Radek Fujdiak
,
Petr Blazek
,
Zdenek Martinasek
,
Eva Holasova
.
csnet 2020
:
1-3
[doi]
EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection
Fares Meghdouri
,
Maximilian Bachl
,
Tanja Zseby
.
csnet 2020
:
1-7
[doi]
On Darknet HoneyBots
Joanna Moubarak
,
Carole Bassil
.
csnet 2020
:
1-3
[doi]
Activation of LoRaWAN End Devices by Using Public Key Cryptography
Fredrik Mårlind
,
Ismail Butun
.
csnet 2020
:
1-8
[doi]
Using Probabilistic Availability Measures for Predicting Targeted Attacks on Network Nodes
Michal Pióro
,
Mariusz Mycek
,
Artur Tomaszewski
.
csnet 2020
:
1-8
[doi]
Sign in
or
sign up
to see more results.