Abstract is missing.
- Vulnerability Detection Using Deep Learning Based Function ClassificationHuihui Gong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu 0002. 3-22 [doi]
- RAIDER: Reinforcement-Aided Spear Phishing DetectorKeelan Evans, Alsharif Abuadbba, Tingmin Wu, Kristen Moore, Mohiuddin Ahmed, Ganna Pogrebna, Surya Nepal, Mike Johnstone. 23-50 [doi]
- Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep LearningYunhao Li, Weichuan Mo, Cong Li, Haiyang Wang, Jianwei He, Shanshan Hao, Hongyang Yan. 51-65 [doi]
- A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital ForensicsStuart W. Hall, Amin Sakzad, Sepehr Minagar. 66-85 [doi]
- Graph Intelligence Enhanced Bi-Channel Insider Threat DetectionWei Hong, Jiao Yin 0003, Mingshan You, Hua Wang 0002, Jinli Cao, Jianxin Li 0001, Ming Liu 0028. 86-102 [doi]
- Exploiting Redundancy in Network Flow Information for Efficient Security Attack DetectionSiqi Xia, Sutharshan Rajasegarar, Christopher Leckie, Sarah M. Erfani, Jeffrey Chan. 105-119 [doi]
- A Learning Methodology for Line-Rate Ransomware Mitigation with P4 SwitchesKurt Friday, Elias Bou-Harb, Jorge Crichigno. 120-139 [doi]
- Reducing Intrusion Alert Trees to Aid VisualizationEric Ficke, Raymond M. Bateman, Shouhuai Xu. 140-154 [doi]
- Attacker Attribution via Characteristics Inference Using Honeypot DataPierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens. 155-169 [doi]
- Detecting Contradictions from CoAP RFC Based on Knowledge GraphXinguo Feng, Yanjun Zhang, Mark Huasong Meng, Sin G. Teo. 170-189 [doi]
- A First Look at Android Apps' Third-Party Resources LoadingHina Qayyum, Muhammad Salman, I Wayan Budi Sentana, Duc Linh Giang Nguyen, Muhammad Ikram 0001, Gareth Tyson, Mohamed Ali Kâafar. 193-213 [doi]
- Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic DatasetShuang Zhao, Jincheng Zhong, Shuhui Chen, Jianbing Liang. 214-232 [doi]
- DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile DevicesBo Yang, Yanchao Zhang, Dong Tong 0003. 233-248 [doi]
- A Beyond-5G Authentication and Key Agreement ProtocolMohamed Taoufiq Damir, Tommi Meskanen, Sara Ramezanian, Valtteri Niemi. 249-264 [doi]
- A Survey on IoT Vulnerability DiscoveryXinbo Ban, Ming Ding 0001, Shigang Liu, Chao Chen 0015, Jun Zhang 0010. 267-282 [doi]
- Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV NetworksJiani Fan, Lwin Khin Shar, Jiale Guo, Wenzhuo Yang, Dusit Niyato, Kwok-Yan Lam. 283-304 [doi]
- An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed NetworksTianqi Zhou, Wenying Zheng, Haowen Tan. 305-318 [doi]
- Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack DetectionBhagyashri Tushir, Yuhong Liu, Behnam Dezfouli. 319-334 [doi]
- Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 DatasetLei Shi, Shanti Krishnan, Sheng Wen, Yang Xiang 0001. 335-353 [doi]
- The Force of Compensation, a Multi-stage Incentive Mechanism Model for Federated LearningHan Xu, Priyadarsi Nanda, Jie Liang, Xiangjian He. 357-373 [doi]
- A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash AuthenticationYang Hong, Lisong Wang, Weizhi Meng 0001, Jian Cao, Chunpeng Ge, Qin Zhang, Rui Zhang. 374-386 [doi]
- An Efficient Clustering-Based Privacy-Preserving Recommender SystemJunwei Luo, Xun Yi, Fengling Han, Xuechao Yang, Xu Yang 0002. 387-405 [doi]
- A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT NetworksGuizhen Yang, Mengmeng Ge, Shang Gao 0003, Xuequan Lu, Leo Yu Zhang, Robin Doss. 406-425 [doi]
- Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted ServerHongcheng Xie, Zizhuo Chen, Yu Guo 0003, Qin Liu, Xiaohua Jia. 429-442 [doi]
- Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart HealthcareJianghua Liu, Lei Xu, Bruce Gu, Lei Cui 0006, Fei Zhu. 443-458 [doi]
- Enabling Secure Deduplication in Encrypted Decentralized StorageBo Zhang, Helei Cui, Yaxing Chen, Xiaoning Liu, Zhiwen Yu 0001, Bin Guo. 459-475 [doi]
- Geometric Range Searchable Encryption with Forward and Backward SecurityMengwei Yang, Chungen Xu, Pan Zhang. 476-495 [doi]
- Towards Secure and Trustworthy Flash Loans: A Blockchain-Based Trust Management ApproachYining Xie, Xin Kang 0001, Tieyan Li, Cheng-Kang Chu, Haiguang Wang. 499-513 [doi]
- Forward Traceability for Product Authenticity Using Ethereum Smart ContractsFokke Heikamp, Lei Pan 0002, Rolando Trujillo-Rasua, Sushmita Ruj, Robin Doss. 514-523 [doi]
- BSB: Bringing Safe Browsing to Blockchain PlatformZhuang Zhou, Cheng Tan, Shiyun Liu, Rongwei Yu, Siwei Wu, Shengwu Xiong. 524-543 [doi]
- Practical Anonymous Multi-hop Locks for Lightning Network Compatible Payment Channel NetworksMengling Liu, Man Ho Au. 547-560 [doi]
- Blockchain Based Regulatory Technology Deployment for Real Estate TransactionRu Ray Raymond Chao, Joseph K. Liu, Kai Su. 561-579 [doi]
- CVallet: A Blockchain-Oriented Application Development for Education and RecruitmentZoey Ziyi Li, Joseph K. Liu, Jiangshan Yu, Dragan Gasevic, Wayne Yang. 580-597 [doi]
- Decentralized Access Control for Secure Microservices Cooperation with BlockchainNing Xi, Yajie Li, Jin Liu. 598-614 [doi]
- Blockchain-Based Access Control for Secure Smart Industry Management SystemsAditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman 0001, Abdelaziz Bouras. 615-630 [doi]
- Driver Locations Harvesting Attack on pRideShyam Murthy, Srinivas Vivek 0001. 633-648 [doi]
- Rebound Attacks on sfSKINNY Hashing with Automatic ToolsShun Li, Guozhen Liu, Phuong Pham. 649-666 [doi]
- A Combination Reduction Algorithm and Its ApplicationWei Yang, Shao-Jun Yang, Wei Wu, Yong Zhao. 667-683 [doi]
- Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum SettingsZhenzhen Bao, Jian Guo 0001, Shun Li, Phuong Pham. 687-711 [doi]
- An Efficient Lattice-Based Encrypted Search Scheme with Forward SecurityXiaoling Yu, Lei Xu 0019, Xin Huang, Chungen Xu. 712-726 [doi]
- Strengthening the Security of AES Against Differential Fault AttackAnit Kumar Ghosal, Dipanwita Roychowdhury. 727-744 [doi]