researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2017
2018
2019
2020
2021
2022
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Abdelmalek Benzekri
Abed Ellatif Samhat
Ahmad Fadlallah
Ahmed Serhrouchni
Alexandre Laubé
Ali Tekeoglu
Ameneh Deljoo
Arnaud Oglaza
Emmanuel Bertin
François Barrère
Guy Pujolle
Igor Jochem Sanz
Marc-Oliver Pahl
Maroun Chamoun
Martin Andreoni Lopez
Nour El Madhoun
Pascal Urien
Rida Khatoun
Romain Laborde
Thi Mai Trang Nguyen
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
approach
attacks
blockchain
cloud
cyber
cybersecurity
detection
intrusion
iot
learning
management
network
networks
privacy
secure
security
system
traffic
using
CSNet (csnet)
Editions
Publications
Viewing Publication 1 - 100 from 131
2022
Demonstration of Standalone Intelligent WiFi Sensing for Real-Time Occupancy Monitoring
Junye Li 0003
,
Aryan Sharma
,
Deepak Mishra 0001
,
Aruna Seneviratne
.
csnet 2022
:
1-2
[doi]
6th Cyber Security in Networking Conference, CSNet 2022, Rio de Janeiro, Brazil, October 24-26, 2022
IEEE,
2022.
[doi]
Horizontal network for a better cybersecurity
Khaldoun Al Agha
,
Pauline Loygue
,
Guy Pujolle
.
csnet 2022
:
1-4
[doi]
A Secure Cloud-based Architecture for monitoring Cyber-Physical Critical Infrastructures
Paulo Assumpção
,
Carlos Oliveira
,
Pablo Ortiz
,
Wilson S. Melo
,
Luiz Carmo
.
csnet 2022
:
1-7
[doi]
Assessing Software-Defined Radio Security and Performance in Virtualized Environments for Cloud Radio Access Networks
Govinda Mohini G. Bezerra
,
Tadeu N. Ferreira
,
Diogo M. F. Mattos
.
csnet 2022
:
1-7
[doi]
ICpSAF - Integrated Cross-platform Security Assessment Framework
João Pedro De Lima Cassiano
,
Sérgio Ribeiro
,
Alana Almeida
.
csnet 2022
:
1-2
[doi]
Security of NFC Banking Transactions: Overview on Attacks and Solutions
Samir Chabbi
,
Nour El Madhoun
,
Lazhar Khamer
.
csnet 2022
:
1-5
[doi]
Performance Analysis of a Privacy-Preserving Frame Sniffer on a Raspberry Pi
Fernando Dias de Mello Silva
,
Abhishek Kumar Mishra
,
Aline Carneiro Viana
,
Nadjib Achir
,
Anne Fladenmuller
,
Luís Henrique M. K. Costa
.
csnet 2022
:
1-7
[doi]
A Study of User Concerns about Smartphone Privacy
Carol J. Fung
,
Vivian Motti 0001
,
Katie Zhang
,
Yanjun Qian
.
csnet 2022
:
1-8
[doi]
A Review On Lexical Based Malicious Domain Name Detection Methods
Cherifa Hamroun
,
Ahmed Amamou
,
Kamel Haddadou
,
Hayat Haroun
,
Guy Pujolle
.
csnet 2022
:
1-7
[doi]
A Stream Learning Intrusion Detection System for Concept Drifting Network Traffic
Pedro Horchulhack
,
Eduardo K. Viegas
,
Martin Andreoni Lopez
.
csnet 2022
:
1-7
[doi]
A Survey on the Security Issues of QUIC
Y. A. Joarder
,
Carol Fung
.
csnet 2022
:
1-8
[doi]
The Impact of the Interest Flooding Attack on the Pending Interest Table of CCN routers
Diego Canizio Lopes
,
André Luiz Nasserala Pires
,
Igor Monteiro Moraes
.
csnet 2022
:
1-5
[doi]
A Web User Interface Tool for Metaheuristics-Based Feature Selection Assessment for IDSs
Humberto Mendes
,
Silvio E. Quincozes
,
Vagner E. Quincozes
.
csnet 2022
:
1-5
[doi]
Feature Extraction for Intrusion Detection in IEC-61850 Communication Networks
Vagner E. Quincozes
,
Silvio E. Quincozes
,
Célio Vinicius N. de Albuquerque
,
Diego G. Passos 0001
,
Daniel Mossé
.
csnet 2022
:
1-7
[doi]
ASOP: A Sovereign and Secure Device Onboarding Protocol for Cloud-based IoT Services
Khan Reaz
,
Gerhard Wunder
.
csnet 2022
:
1-3
[doi]
Security and Performance Analysis of Quorum-based Blockchain Consensus Protocols
Gabriel Antonio F. Rebello
,
Gustavo Franco Camilo
,
Lucas C. B. Guimarães
,
Lucas Airam C. de Souza
,
Otto Carlos M. B. Duarte
.
csnet 2022
:
1-7
[doi]
ZT&T: Secure blockchain-based tokens for service session management in Zero Trust Networks
Javier Jose Diaz Rivera
,
Talha Ahmed Khan
,
Waleed Akbar
,
Muhammad Afaq
,
Wang-Cheol Song
.
csnet 2022
:
1-7
[doi]
GRAFFITO-IDS: A Graph-based Algorithm for Feature Enrichment on Online Intrusion Detection Systems
Igor Jochem Sanz
,
Gabriel Antonio Fontes Rebello
,
Otto Carlos Muniz Bandeira Duarte
.
csnet 2022
:
1-7
[doi]
A Distributed Platform for Intrusion Detection System Using Data Stream Mining in a Big Data Environment
Fábio César Schuartz
,
Mauro Fonseca
,
Anelise Munaretto
.
csnet 2022
:
1-7
[doi]
Securing CoAP with DTLS and OSCORE
Emil Suleymanov
,
Erkin Kirdan
,
Marc-Oliver Pahl
.
csnet 2022
:
1-7
[doi]
Blockchain Meets Formal Logic: Semantics Level Cybersecurity Challenges
Nouredine Tamani
,
Saad El Jaouhari
.
csnet 2022
:
1-6
[doi]
Cyber Deception, the Ultimate Piece of a Defensive Strategy - Proof of Concept
Wiem Tounsi
.
csnet 2022
:
1-5
[doi]
Estimating Speedup Factor For Personal HSMs Based On Secure Elements
Pascal Urien
.
csnet 2022
:
1-4
[doi]
2021
5th Cyber Security in Networking Conference, CSNet 2021, Abu Dhabi, United Arab Emirates, October 12-14, 2021
IEEE,
2021.
[doi]
Incremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devices
AbdElaziz Saad AbdElaziz AbdElaal
,
Kai Lehniger
,
Peter Langendörfer
.
csnet 2021
:
55-62
[doi]
Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems
Mwrwan Abubakar
,
Zakwan Jaroucheh
,
Ahmed Yassin Al-Dubai
,
William J. Buchanan
.
csnet 2021
:
63-70
[doi]
A secure blockchain-based architecture for the COVID-19 data network
Darine Al-Mohtar
,
Amani Ramzi Daou
,
Nour El Madhoun
,
Rachad Maallawi
.
csnet 2021
:
1-5
[doi]
Real Time Detection of Social Bots on Twitter Using Machine Learning and Apache Kafka
Eiman Alothali
,
Hany Alashwal
,
Motamen Salih
,
Kadhim Hayawi
.
csnet 2021
:
98-102
[doi]
Intrusion detection systems in in-vehicle networks based on bag-of-words
Gianmarco Baldini
.
csnet 2021
:
41-48
[doi]
Inferring Legacy IoT Device Behavior over a Layer 2 TLS Tunnel
Rodrigo Caldas
,
Carlos Novo
,
Ricardo Morla
,
Luis Cruz 0007
,
António Carvalho
,
David Campelo
.
csnet 2021
:
23-30
[doi]
AI based Login System using Facial Recognition
Siem Girmay
,
Faniel Samsom
,
Asad Masood Khattak
.
csnet 2021
:
107-109
[doi]
Classification of malicious and benign websites by network features using supervised machine learning algorithms
Sanaa Kaddoura
.
csnet 2021
:
36-40
[doi]
Forensic Analysis of the Cisco WebEx Application
Zainab Khalid
,
Farkhund Iqbal
,
Faouzi Kamoun
,
Mohammed Hussain
,
Liaqat Ali Khan
.
csnet 2021
:
90-97
[doi]
Authenticating IDS autoencoders using multipath neural networks
Raphaël M. J. I. Larsen
,
Marc-Oliver Pahl
,
Gouenou Coatrieux
.
csnet 2021
:
1-9
[doi]
Advances in ML-Based Anomaly Detection for the IoT
Christian Lübben
,
Marc-Oliver Pahl
.
csnet 2021
:
18-22
[doi]
Blockchain-based Secure CIDS Operation
Imran Makhdoom
,
Kadhim Hayawi
,
Mohammed Kaosar
,
Sujith Samuel Mathew
,
Mohammad Mehedy Masud
.
csnet 2021
:
103-106
[doi]
C4M: A Partition-Robust Consensus Algorithm for Blockgraph in Mesh Network
David Cordova Morales
,
Pedro B. Velloso
,
Alexandre Laube
,
Thi Mai Trang Nguyen
,
Guy Pujolle
.
csnet 2021
:
82-89
[doi]
Modeling Evasive Malware Authoring Techniques
Mathew Nicho
,
Maitha Alkhateri
.
csnet 2021
:
71-75
[doi]
Mitigation of poisoning attack in federated learning by using historical distance detection
Zhaosen Shi
,
Xuyang Ding
,
Fagen Li
,
Yingni Chen
,
Canran Li
.
csnet 2021
:
10-17
[doi]
Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets
Pascal Urien
.
csnet 2021
:
49-54
[doi]
State of the art: Cross chain communications
Pedro B. Velloso
,
David Cordova Morales
,
Thi Mai Trang Nguyen
,
Guy Pujolle
.
csnet 2021
:
76-81
[doi]
2020
Privacy-Preserving Authentication Framework for UAS Traffic Management Systems
Anas Alsoliman
,
Abdulrahman Bin Rabiah
,
Marco Levorato
.
csnet 2020
:
1-8
[doi]
Message Fabrication Detection Model based on Reactive Protocols in VANET
Fadlallah Chbib
,
Walid Fahs
,
Jamal Haydar
,
Lyes Khoukhi
,
Rida Khatoun
.
csnet 2020
:
1-5
[doi]
Blockgraph: A blockchain for mobile ad hoc networks
David Cordova
,
Alexandre Laubé
,
Thi Mai Trang Nguyen
,
Guy Pujolle
.
csnet 2020
:
1-8
[doi]
A Policy-based Interaction Protocol between Software Defined Security Controller and Virtual Security Functions
Sara Farahmandian
,
Doan B. Hoang
.
csnet 2020
:
1-8
[doi]
A comparative performance study of cryptographic algorithms for connected vehicles
Abdessamad Fazzat
,
Rida Khatoun
,
Houda Labiod
,
Renaud Dubois
.
csnet 2020
:
1-8
[doi]
Cloud Assisted Privacy Preserving Using Homomorphic Encryption
Khalil Hariss
,
Maroun Chamoun
,
Abed Ellatif Samhat
.
csnet 2020
:
1-8
[doi]
Specific Anomaly Detection Method in Wireless Communication Networks
Eva Holasova
,
Radek Fujdiak
,
Karel Kuchar
.
csnet 2020
:
1-3
[doi]
A Decentralized Resource Discovery Using Attribute Based Encryption for Internet of Things
Mohammed B. M. Kamel
,
YuPing Yan
,
Péter Ligeti
,
Christoph Reich
.
csnet 2020
:
1-3
[doi]
Safe Traffic Adaptation Model in Wireless Mesh Networks
Lyes Khoukhi
,
Rida Khatoun
.
csnet 2020
:
1-4
[doi]
Simplified Method for Fast and Efficient Incident Detection in Industrial Networks
Karel Kuchar
,
Radek Fujdiak
,
Petr Blazek
,
Zdenek Martinasek
,
Eva Holasova
.
csnet 2020
:
1-3
[doi]
4th Cyber Security in Networking Conference, CSNet 2020, Lausanne, Switzerland, October 21-23, 2020
Romain Laborde
,
Nadjib Aitsaadi
,
Solange Ghernaouti
,
Abdelmalek Benzekri
,
Joaquín García-Alfaro
, editors,
IEEE,
2020.
[doi]
EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection
Fares Meghdouri
,
Maximilian Bachl
,
Tanja Zseby
.
csnet 2020
:
1-7
[doi]
On Darknet HoneyBots
Joanna Moubarak
,
Carole Bassil
.
csnet 2020
:
1-3
[doi]
Activation of LoRaWAN End Devices by Using Public Key Cryptography
Fredrik Mårlind
,
Ismail Butun
.
csnet 2020
:
1-8
[doi]
Detecting abnormal DNS traffic using unsupervised machine learning
Thi Quynh Nguyen
,
Romain Laborde
,
Abdelmalek Benzekri
,
Bruno Qu'hen
.
csnet 2020
:
1-8
[doi]
Using Probabilistic Availability Measures for Predicting Targeted Attacks on Network Nodes
Michal Pióro
,
Mariusz Mycek
,
Artur Tomaszewski
.
csnet 2020
:
1-8
[doi]
Unsupervised Machine Learning Techniques for Network Intrusion Detection on Modern Data
Miel Verkerken
,
Laurens D'hooge
,
Tim Wauters
,
Bruno Volckaert
,
Filip De Turck
.
csnet 2020
:
1-8
[doi]
2019
3rd Cyber Security in Networking Conference, CSNet 2019, Quito, Ecuador, October 23-25, 2019
IEEE,
2019.
[doi]
Towards Blockchain Services For Mobile Money Traceability And Federation
Kodjo Edem Agbezoutsi
,
Pascal Urien
,
Toundé Mesmin Dandjinou
.
csnet 2019
:
14-20
[doi]
Social Consensus-inspired Aggregation Algorithms for Edge Computing
Firas Al-Doghman
,
Zenon Chaczko
,
Wayne Brookes
,
Lucia Carrion Gordon
.
csnet 2019
:
138-141
[doi]
A Blockchain-Encryption-Based Approach to Protect Fog Federations from Rogue Nodes
Mohammed Alshehri
,
Brajendra Panda
.
csnet 2019
:
6-13
[doi]
Human Interaction Proofs (HIPs) based on Emerging Images and Topological Data Analysis (TDA) Techniques
Maria Alejandra Osorio Angarita
,
Ebroul Izquierdo
,
Agustín Moreno Cañadas
.
csnet 2019
:
73-79
[doi]
Cloud-based Sybil Attack Detection Scheme for Connected Vehicles
Anika Anwar
,
Talal Halabi
,
Mohammad Zulkernine
.
csnet 2019
:
114-121
[doi]
Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situations
Abdelmalek Benzekri
,
Romain Laborde
,
Arnaud Oglaza
,
Darine Rammal
,
François Barrère
.
csnet 2019
:
66-72
[doi]
Hashing-based authentication for CAN bus and application to Denial-of-Service protection
Olivier Cros
,
Gabriel Chênevert
.
csnet 2019
:
91-98
[doi]
A Precise Method for Monitoring and Detecting Recurrent Attacks on Wireless Networks based on Link-Layer Traffic Classification
Andreane Spano da Roza
,
João Vitor Valle
,
Diogo Menezes Ferrazani Mattos
.
csnet 2019
:
150-157
[doi]
A Secure and Fault-Tolerant Architecture for LoRaWAN Based on Blockchain
Victor Pasknel de Alencar Ribeiro
,
Raimir Holanda Filho
,
Alex Ramos
.
csnet 2019
:
35-41
[doi]
Managing Effective Collaboration in Cybersecurity Alliances Using Social Computational Trust
Ameneh Deljoo
,
Ralph Koning
,
Tom M. van Engers
,
Leon Gommans
,
Cees de Laat
.
csnet 2019
:
50-57
[doi]
Efficient Block replication to optimize the blockchain resources
El-hacen Diallo
,
Alexandre Laubé
,
Khaldoun Al Agha
,
Steven Martin 0001
.
csnet 2019
:
1-5
[doi]
A Blockchain-based Lightweight Authentication Solution for IoT
Achraf Fayad
,
Badis Hammi
,
Rida Khatoun
,
Ahmed Serhrouchni
.
csnet 2019
:
28-34
[doi]
Information sharing in cybersecurity : Enhancing security, trust and privacy by capacity building
Solange Ghernaouti
,
Léonore Cellier
,
Bastien Wanner
.
csnet 2019
:
58-62
[doi]
A Risk Management Framework and A Generalized Attack Automata for IoT based Smart Home Environment
Fathima James
.
csnet 2019
:
86-90
[doi]
IoT Cybersecurity based Smart Home Intrusion Prevention System
Fathima James
.
csnet 2019
:
107-113
[doi]
Trust-based collaborative defences in multi network alliances
Ralph Koning
,
Ameneh Deljoo
,
Lydia Meijer
,
Cees de Laat
,
Paola Grosso
.
csnet 2019
:
42-49
[doi]
Bluetooth Low Energy Makes "Just Works" Not Work
Karim Lounis
,
Mohammad Zulkernine
.
csnet 2019
:
99-106
[doi]
Going Beyond the Blockchain Hype: In Which Cases are Blockchains Useful for IT Applications?
Nour El Madhoun
,
Julien Hatin
,
Emmanuel Bertin
.
csnet 2019
:
21-27
[doi]
The EMV Payment System: Is It Reliable?
Nour El Madhoun
,
Emmanuel Bertin
,
Guy Pujolle
.
csnet 2019
:
80-85
[doi]
TAG: Topological Attack Graph Analysis Tool
Marek Malowidzki
,
Damian Hermanowski
,
Przemyslaw Berezinski
.
csnet 2019
:
158-160
[doi]
Information Security Management Frameworks in Higher Education Institutions: An Overview
Jorge Merchan-Lima
,
Fabian Astudillo-Salinas
,
Luis Tello-Oquendo
,
Franklin Sanchez
,
Gabriel Lopez
,
Dorys Quiroz
.
csnet 2019
:
63-65
[doi]
Phishing Attacks: Detecting and Preventing Infected E-mails Using Machine Learning Methods
Diego Oña
,
Lenín Zapata
,
Walter Fuertes
,
Germán E. Rodríguez
,
Eduardo Benavides
,
Theofilos Toulkeridis
.
csnet 2019
:
161-163
[doi]
XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in Universities
Germán E. Rodríguez
,
Jenny Torres
,
Pamela Flores
,
Eduardo Benavides
,
Daniel Nuñez-Agurto
.
csnet 2019
:
142-149
[doi]
Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey
José David Vega Sánchez
,
Luis Urquiza Aguiar
,
Martha Cecilia Paredes Paredes
.
csnet 2019
:
122-129
[doi]
Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTC
Christian Tietz
,
Eric Klieme
,
Lukas Behrendt
,
Pawel Böning
,
Leonard Marschke
,
Christoph Meinel
.
csnet 2019
:
130-137
[doi]
2018
Tango: The Beginning-A Semi-Synchronous Iota-Tangle Type Distributed Ledger with Periodic Pulsed Entries
Bruno Andriamanalimanana
,
Chen-Fu Chiang
,
Jorge Novillo
,
Sam Sengupta
,
Ali Tekeoglu
.
csnet 2018
:
1-3
[doi]
A Probabilistic Model of Periodic Pulsed Transaction Injection
Bruno Andriamanalimanana
,
Chen-Fu Chiang
,
Jorge Novillo
,
Sam Sengupta
,
Ali Tekeoglu
.
csnet 2018
:
1-5
[doi]
Using Genetic Algorithm to Improve Classification of Imbalanced Datasets for Credit Card Fraud Detection
Ibtissam Benchaji
,
Samira Douzi
,
Bouabid El Ouahidi
.
csnet 2018
:
1-5
[doi]
A Forensic Pattern-Based Approach for Investigations in Cloud System Environments
Juan-Carlos Bennett
,
Mamadou H. Diallo
.
csnet 2018
:
1-8
[doi]
Ransomware Encrypted Your Files but You Restored Them from Network Traffic
Eduardo Berrueta
,
Daniel Morató
,
Eduardo Magaña
,
Mikel Izal
.
csnet 2018
:
1-7
[doi]
Cyber Attacks Classification in IoT-Based-Healthcare Infrastructure
Amir Djenna
,
Diamel-Eddine Saidouni
.
csnet 2018
:
1-4
[doi]
Hybrid Approach for Intrusion Detection Using Fuzzy Association Rules
Samira Douzi
,
Ibtissam Benchaji
,
Bouabid El Ouahidi
.
csnet 2018
:
1-3
[doi]
Analysis of Cryptographic Algorithms on IoT Hardware platforms
Mohammed El-Haii
,
Maroun Chamoun
,
Ahmad Fadlallah
,
Ahmed Serhrouchni
.
csnet 2018
:
1-5
[doi]
A Heuristic Algorithm for Relaxed Optimal Rule Ordering Problem
Takashi Harada
,
Ken Tanaka
,
Kenji Mikawa
.
csnet 2018
:
1-8
[doi]
2nd Cyber Security in Networking Conference, CSNet 2018, Paris, France, October 24-26, 2018
Patrick Hebrard
,
Solange Ghernaouti
, editors,
IEEE,
2018.
[doi]
Detecting and Hunting Cyberthreats in a Maritime Environment: Specification and Experimentation of a Maritime Cybersecurity Operations Centre
Olivier Jacq
,
Xavier Boudvin
,
David Brosset
,
Yvon Kermarrec
,
Jacques Simonin
.
csnet 2018
:
1-8
[doi]
Cross Channel Scripting (XCS) Attacks in Web Applications: Detection and Mitigation Approaches
R. Madhusudhan
,
Shashidhara
.
csnet 2018
:
1-3
[doi]
Performance of Revocation Protocols for Vehicular Ad-Hoc Network. Review of State-of-Art Techniques and Proposition of New Enhancement Revocation Method
Hassan Noun
,
Walid Fahs
,
Ali Kalakech
,
Jamal Haydar
.
csnet 2018
:
1-6
[doi]
From ICS Attacks' Analysis to the S.A.F.E. Approach: Implementation of Filters Based on Behavioral Models and Critical State Distance for ICS Cybersecurity
Franck Sicard
,
Cedric Escudero
,
Eric Zamaï
,
Jean-Marie Flaus
.
csnet 2018
:
1-8
[doi]
Concept for Controlled Business Critical Information Sharing Using Smart Contracts
Klaus Zaerens
.
csnet 2018
:
1-8
[doi]
Sign in
or
sign up
to see more results.