Abstract is missing.
- ChainSCAN: A Blockchain-Based Supply Chain Alerting Framework for Food SafetyJorge Castillo, Kevin Barba, Qian Chen 0019. 3-20 [doi]
- BlockRAT: An Enhanced Remote Access Trojan Framework via BlockchainYanze Kang, Xiaobo Yu, Weizhi Meng, Yining Liu. 21-35 [doi]
- Adapted PBFT Consensus Protocol for Sharded BlockchainLing Yang, Huawei Huang. 36-50 [doi]
- A Practical Blockchain-Based Maintenance Record System for Better Aircraft SecurityWictor Lang Jensen, Sille Jessing, Wei-Yang Chiu, Weizhi Meng 0001. 51-67 [doi]
- Redactable Blockchain with Fine-Grained Autonomy and Transaction RollbackChunying Peng, Haixia Xu. 68-84 [doi]
- Pitch in: A Secure Extension Signature Based on SM9Chuyi Yan, Haixia Xu, Yongheng Mu, Jiong Ding. 87-104 [doi]
- Verifiable DOPE from Somewhat Homomorphic Encryption, and the Extension to DOTAmirreza Hamidi, Hossein Ghodosi. 105-120 [doi]
- Scalable M+1st-Price Auction with Infinite Bidding PricePo-Chu Hsu, Atsuko Miyaji. 121-136 [doi]
- The Shared Memory Based Cryptographic Card VirtualizationChen Li, Bibo Tu, Yanchang Feng. 137-151 [doi]
- Feature Transfer Based Network Anomaly DetectionTao Chen, Kun Wen. 155-169 [doi]
- Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDNKun Jia, Jiazhi Liu, Wen Wang, Feng Liu. 170-185 [doi]
- AtNet: A Novel Anti-tracking Network with Multi-Party Judgement Capability Based on Cross-Domain Small-World TopologyWenjie Qin, Chengwei Peng, Tao Yin, Changbo Tian, Guangze Zhao. 186-200 [doi]
- A Two-Stage Method for Fine-Grained DNS Covert Tunnel Behavior DetectionBingxu Wang, Gang Xiong 0001, Peipei Fu, Gaopeng Gou, Yingchao Qin, Zhen Li 0011. 201-216 [doi]
- Analysis and Detection Against Overlapping Phenomenon of Behavioral Attribute in Network AttacksJiang Xie 0004, Shuhao Li, Peishuai Sun. 217-232 [doi]
- Integration of Cybersecurity Related Development Processes by Using a Quantification MethodHassan Noun, Florian Rehm, Guillaume Zeller, G. Rajesh, Roland Lachmayer. 233-242 [doi]
- ZoomPass: A Zoom-Based Android Unlock Scheme on Smart DevicesThomas Gleerup, Wenjuan Li 0001, Jiao Tan, Yu Wang 0017. 245-259 [doi]
- Metasploit for Cyber-Physical Security Testing with Real-Time ConstraintsSulav Lal Shrestha, Taylor Lee, Sebastian Fischmeister. 260-275 [doi]
- Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT SystemsGuozhu Zhao, Pinchang Zhang, Yulong Shen, Xiaohong Jiang 0001. 276-284 [doi]
- Malware Classification Based on Semi-Supervised LearningYu Ding, Xiaoyu Zhang 0002, Binbin Li, Jian-xing, Qian Qiang, Zisen Qi, Menghan Guo, Siyu Jia, Haiping Wang. 287-301 [doi]
- Malware Detected and Tell Me Why: An Verifiable Malware Detection Model with Graph Metric LearningXiao Chen, Zhengwei Jiang, Shuwei Wang, Rongqi Jing, Chen Ling, Qiuyun Wang. 302-314 [doi]
- Malware Detection Using Automated Generation of Yara Rules on Dynamic FeaturesQin Si, Hui Xu, Ying Tong, Yu Zhou, Jian Liang, Lei Cui 0003, Zhiyu Hao. 315-330 [doi]
- Question Answering Models for Privacy Policies of Mobile Apps: Are We There Yet?Khalid Alkhattabi, Davita Bird, Kai Miller, Chuan Yue. 333-352 [doi]
- Design of End-To-End Security for MQTT 5.0Hung-Yu Chien. 353-363 [doi]
- DroidFP: A Zero-Permission Detection Framework for Android Devices Based on Gated Recurrent UnitXinyu Liu, Wu Zhao, Langping Chen, Qixu Liu. 364-374 [doi]
- An Intrusion Detection System Based on Deep Belief NetworksOthmane Belarbi, Aftab Khan, Pietro Edoardo Carnelli, Theodoros Spyridopoulos. 377-392 [doi]
- HINCDG: Multi-Meta-Path Graph Auto-Encoders for Mining of Weak Association Malicious DomainsJiawei Sun, Guangjun Wu, Junnan Yin, Qiang Qian, Junjiao Liu, Jun Li, Yong Wang. 393-406 [doi]
- AttVAE: A Novel Anomaly Detection Framework for Multivariate Time SeriesYi Liu, Yanni Han, Wei An. 407-420 [doi]
- BASNEA: Threat Hunting for Ethereum Smart Contract Based on Backtrackless Aligned-Spatial Network Entity AlignmentXiangyu Du, Zhengwei Jiang, Jun Jiang, Kai Zhang, Zijing Fan, Fangming Dong, Ning Li, Baoxu Liu. 421-436 [doi]
- Multi-region SRAM-Based TCAM for Longest PrefixQian Zou, Ning Zhang, Feng Guo, Qingshan Kong, Zhiqiang Lv. 437-452 [doi]
- A Solution for the Offline Double-Spending Issue of Digital CurrenciesZhexuan Hong, Jiageng Chen. 455-471 [doi]
- A Hierarchical Macroeconomic Copula Model for Cyber Damages Based on Current Cyber Insurance PricesDaniel Kasper, Jens Grossklags. 472-483 [doi]
- Cyber Social Engineering Kill ChainRosana Montanez Rodriguez, Shouhuai Xu. 487-504 [doi]
- Towards Practical Personalized Security Nudge Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge EffectsLeilei Qu, Ruojin Xiao, Wenchang Shi. 505-521 [doi]
- Spear Phishing Email Detection with Multiple Reputation Features and Sample EnhancementZhiting Ling, Huamin Feng, Xiong Ding, Xuren Wang, Chang Gao, Peian Yang. 522-538 [doi]
- TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android AppsHuajun Cui, Guozhu Meng, Yan Zhang, Weiping Wang, Dali Zhu, Ting Su 0001, Xiaodong Zhang, Yuejun Li. 541-556 [doi]
- A k-Anonymity-Based Robust Watermarking Scheme for Relational DatabaseJing Yu 0007, Shuguang Yuan 0003, Yulin Yuan, Yafan Li, Chi Chen. 557-573 [doi]