Abstract is missing.
- Survey of Remote TLS Vulnerability Scanning Tools and Snapshot of TLS Use in Banking SectorJay Chung, Natalija Vlajic. 1-2 [doi]
- Tweak: Towards Portable Deep Learning Models for Domain-Agnostic LoRa Device AuthenticationJared Gaskin, Bechir Hamdaoui, Weng-Keen Wong. 1-9 [doi]
- Alexa Skills: Security Vulnerabilities and CountermeasuresDan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang 0012. 1-9 [doi]
- Towards Unsupervised Learning based Denoising of Cyber Physical System Data to Mitigate Security ConcernsMst. Shapna Akter, Hossain Shahriar. 1-6 [doi]
- Expectation Entropy as a Password Strength MetricKhan Reaz, Gerhard Wunder. 1-2 [doi]
- NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural LanguageFaysal Hossain Shezan, Yingjie Lao, Minlong Peng, Xin Wang, Mingming Sun, Ping Li 0001. 1-9 [doi]
- Real World Snapshot of Trends in IoT Device and Protocol Deployment: IEEE CNS 22 PosterDaniel Brown, Gabriele Cianfarani, Natalija Vlajic. 1-2 [doi]
- Machine Learning-based False Data Injection Attack Detection and Localization in Power GridsBruno P. Leao, Jagannadh Vempati, Ulrich Münz, Shashank Shekhar 0001, Amit Pandey, David Hingos, Siddharth Bhela, Jing Wang, Chris Bilby. 1-8 [doi]
- A Novel Secure Physical Layer Key Generation Method in Connected and Autonomous Vehicles (CAVs)Md Shah Alam, Sarkar Marshia Hossain, Jared Oluoch, Junghwan Kim. 1-6 [doi]
- Towards Cost-Balanced Intrusion Detection in OT EnvironmentsAndrew Morin, Tyler Moore 0001. 1-6 [doi]
- Adding Zero Trust in BYOD Environments through Network InspectionAfshin Zivi, Christian Doerr. 1-6 [doi]
- ACADIA: Efficient and Robust Adversarial Attacks Against Deep Reinforcement LearningHaider Ali, Mohannad Al Ameedi, Ananthram Swami, Rui Ning, Jiang Li, Hongyi Wu, Jin-Hee Cho. 1-9 [doi]
- Highly Efficient FDD Secret Key Generation using ESPRIT and Jump Removal on Phase DifferencesEhsan Olyaei Torshizi, Utkrist Uprety, Werner Henkel. 1-6 [doi]
- Towards Cost-Benefit-Aware Adaptive Monitoring for Cyber-Physical SystemsMichael Vierhauser, Rebekka Wohlrab, Stefan Rass. 1-6 [doi]
- Towards Cost-Balanced Intrusion Detection in OT EnvironmentsAndrew Morin, Tyler Moore 0001. 1-6 [doi]
- A Secured Certificateless Sign-encrypted Blockchain Communication for Intelligent Transport SystemRizwan Patan, Reza M. Parizi, Seyedamin Pouriyeh, Mohammad S. Khan, Amir H. Gandomi. 1-7 [doi]
- ML-AWARE: A Machine Learning Approach for Detecting Wormhole Attack ResonanceRanju Kumari, Faheed A. F. Alenezi, Sejun Song, Baek-Young Choi. 1-6 [doi]
- SIGTAM: A Tampering Attack on Wi-Fi Preamble Signaling and CountermeasuresZhengguang Zhang, Marwan Krunz. 1-9 [doi]
- MultiEvasion: Evasion Attacks Against Multiple Malware DetectorsHao Liu, Wenhai Sun, Nan Niu, Boyang Wang. 10-18 [doi]
- Network-Level Adversaries in Federated LearningGiorgio Severi, Matthew Jagielski, Gökberk Yar, Yuxuan Wang, Alina Oprea, Cristina Nita-Rotaru. 19-27 [doi]
- Transferability of Adversarial Examples in Machine Learning-based Malware DetectionYang Hu, Ning Wang 0022, Yimin Chen 0004, Wenjing Lou, Y. Thomas Hou. 28-36 [doi]
- 5G Messaging: System Insecurity and DefensesJinghao Zhao, Qianru Li, Zengwen Yuan, Zhehui Zhang, Songwu Lu. 37-45 [doi]
- Absolute Security in High-Frequency Wireless LinksAlejandro Cohen, Rafael G. L. D'Oliveira, Chia-Yi Yeh, Hichem Guerboukha, Rabi Shrestha, Zhaoji Fang, Edward W. Knightly, Muriel Médard, Daniel M. Mittleman. 46-54 [doi]
- Learning-Based Radio Fingerprinting for RFID Secure Authentication SchemeJiaqi Xu, Xingya Zhao, Arjun Bakshi, Kannan Srinivasan 0001. 55-63 [doi]
- Systematically Analyzing Vulnerabilities in the Connection Establishment Phase of Wi-Fi SystemsNaureen Hoque, Hanif Rahbari, Cullen Rezendes. 64-72 [doi]
- DASK: Driving-Assisted Secret Key EstablishmentEdwin Yang, Song Fang, Dakun Shen. 73-81 [doi]
- HoneyCam: Scalable High-Interaction Honeypot for IoT Cameras Based on 360-Degree VideoChongqi Guan, Xianda Chen, Guohong Cao, Sencun Zhu, Thomas La Porta. 82-90 [doi]
- A User-Friendly Two-Factor Authentication Method against Real-Time Phishing AttacksYuanyi Sun, Sencun Zhu, Yan Zhao, Pengfei Sun. 91-99 [doi]
- GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZoneBalachandar Gowrisankar, Daisuke Mashima, Wen Shei Ong, Quanqi Ye, Ertem Esiner, Binbin Chen, Zbigniew Kalbarczyk. 100-108 [doi]
- Eolo: IoT Proximity-based Authentication via Pressure Correlated VariationsOmar Adel Ibrahim, Gabriele Oligeri, Roberto Di Pietro. 109-117 [doi]
- Multi-Protocol IoT Network ReconnaissanceStefan Gvozdenovic, Johannes K. Becker, John Mikulskis, David Starobinski. 118-126 [doi]
- Agent-Level Differentially Private Federated Learning via Compressed Model PerturbationYuanxiong Guo, Rui Hu 0005, Yanmin Gong 0001. 127-135 [doi]
- PRM - Private Interference Discovery for IEEE 802.15 4 NetworksDominik Roy George, Savio Sciancalepore. 136-144 [doi]
- TrafficSpy: Disaggregating VPN-encrypted IoT Network Traffic for User Privacy InferenceQi Li, Keyang Yu, Dong Chen, Mo Sha, Long Cheng. 145-153 [doi]
- An Active Learning Approach to Dynamic Alert Prioritization for Real-time Situational AwarenessYeongwoo Kim, György Dán. 154-162 [doi]
- AutoDefense: Reinforcement Learning Based Autoreactive Defense Against Network AttacksYu Mi, David Mohaisen, An Wang 0002. 163-171 [doi]
- Returning to Port: Efficient Detection of Home Router DevicesThomas Papastergiou, Roberto Perdisci, Manos Antonakakis. 172-180 [doi]
- Supporting Law-Enforcement to Cope with Blacklisted Websites: Framework and Case StudyMir Mehedi Ahsan Pritom, Shouhuai Xu. 181-189 [doi]
- RadioNet: Robust Deep-Learning Based Radio FingerprintingHaiPeng Li, Kaustubh Gupta, Chenggang Wang, Nirnimesh Ghose, Boyang Wang. 190-198 [doi]
- Securing Wireless Channels: Reliable Shared Secret Extraction through OTFSUsama Saeed, Lingjia Liu 0001, Kai Zeng, A. Robert Calderbank. 199-207 [doi]
- Stealthy Off-Target Coupled-Control-Plane JammingShreya Gupta, Chia-Yi Yeh, Edward W. Knightly. 208-216 [doi]
- A Study on the Testing of Android Security PatchesChristopher Brant, Tuba Yavuz. 217-225 [doi]
- Performant Binary Fuzzing without Source Code using Static InstrumentationEric Pauley, Gang Tan, Danfeng Zhang, Patrick D. McDaniel. 226-235 [doi]
- SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker ImagesYunlong Xing, Jiahao Cao, Xinda Wang 0001, Sadegh Torabi, Kun Sun 0001, Fei Yan 0008, Qi Li 0002. 236-244 [doi]
- HallMonitor: A Framework for Identifying Network Policy Violations in SoftwareDaniel Olszewski, Weidong Zhu, Sandeep Sathyanarayana, Kevin R. B. Butler, Patrick Traynor. 245-253 [doi]
- Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018Lisa Liu, Gints Engelen, Timothy M. Lynar, Daryl Essam, Wouter Joosen. 254-262 [doi]
- Enhancing Load Balancing by Intrusion Detection System Chain on SDN Data PlaneNadia Niknami, Jie Wu 0001. 264-272 [doi]
- Detecting DNS hijacking by using NetFlow dataMartin Fejrskov, Jens Myrup Pedersen, Emmanouil Vasilomanolakis. 273-280 [doi]
- Refining Network Message Segmentation with Principal Component AnalysisStephan Kleber, Frank Kargl. 281-289 [doi]
- When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the InternetTao Hou, Shengping Bi, Mingkui Wei, Tao Wang 0026, Zhuo Lu, Yao Liu 0007. 290-298 [doi]
- Membership Inference Attack in Face of Data TransformationsJiyu Chen, Yiwen Guo, Hao Chen 0003, Neil Gong. 299-307 [doi]
- Efficient Public Verification of Confidential Supply-Chain TransactionsKilian Becher, Mirko Schäfer, Axel Schropfer, Thorsten Strufe. 308-316 [doi]
- On Security of Proof-of-Policy (PoP) in the Execute-Order-Validate Blockchain ParadigmShan Wang 0008, Ming Yang 0001, Bryan Pearson, Tingjian Ge, Xinwen Fu, Wei Zhao. 317-325 [doi]
- Ransomware Detection in Databases through Dynamic Analysis of Query SequencesChristoph Sendner, Lukas Iffländer, Sebastian Schindler, Michael Jobst, Alexandra Dmitrienko, Samuel Kounev. 326-334 [doi]
- Securing Communication Against Leaky SwitchesLeila Rashidi, Sogand SadrHaghighi, Majid Ghaderi, Cristina Nita-Rotaru, Reihaneh Safavi-Naini. 335-343 [doi]
- Security Analysis of Mixed RF-FSO Blockage Attack Over Generalized RF Fading and Atmospheric TurbulenceNeji Mensi, Danda B. Rawat, Chunmei Liu. 344-352 [doi]
- On SDPN: Integrating the Software-Defined Perimeter (SDP) and the Software-Defined Network (SDN) ParadigmsMichael Lefebvre, Daniel W. Engels, Suku Nair. 353-358 [doi]
- Trust Threshold Policy for Explainable and Adaptive Zero-Trust Defense in Enterprise NetworksYunfei Ge, Quanyan Zhu. 359-364 [doi]
- Free-Rider Games for Federated Learning with Selfish Clients in NextG Wireless NetworksYalin E. Sagduyu. 365-370 [doi]
- Proactive and Resilient UAV Orchestration for QoS Driven Connectivity and Coverage of Ground UsersYuhui Wang, Junaid Farooq. 371-376 [doi]
- On the Role of Risk Perceptions in Cyber Insurance ContractsShutian Liu, Quanyan Zhu. 377-382 [doi]