Abstract is missing.
- RFI: Enhancing Network Intrusion Detection Through Robust Feature Selection TechniquesCunxin Li, Hongbing Cheng, Jie Gao, Wei Li. 3-19 [doi]
- HyperBC: Hypergraph-Based Approach for Behavior Cluster of Suspicious APT AttacksWenhui Du, Shuilin Li, Gaolei Li, Jianhua Li 0001. 20-40 [doi]
- MEMO: Detecting Unknown Malicious Encrypted Traffic via Metric Learning and Order-Aware Pre-trainingFengrui Xiao, Shuangwu Chen, Jian Yang 0014, Jiahao Mei, Quan Zheng 0002, Jian Wang. 41-60 [doi]
- Interoperable Security Information and Event Management Framework for Multi-cloud EnvironmentJung-Hwa Ryu, Seo-Yi Kim, Ri-Yeong Kim, Yeeun Kim, Seongmin Kim, Il-Gu Lee. 61-83 [doi]
- Anti-EMP: Encrypted Malware Packets Filtering Algorithm Leveraging Ciphertext Patterns Under Zero Knowledge SettingJunggab Son, Jeehyung Kim, Jemin Ahn, Doowon Kim, Homook Cho, Daeyoung Kim 0004. 84-107 [doi]
- Is This the Same Code? A Comprehensive Study of Decompilation Techniques for WebAssembly BinariesWei-Cheng Wu, Yutian Yan, Hallgrimur David Egilsson, David Park, Steven Chan, Christophe Hauser, Weihang Wang 0001. 108-130 [doi]
- Distributed Intrusion Detection in Dynamic Networks of UAVs Using Few-Shot Federated LearningOzlem Ceviz, Sevil Sen, Pinar Sadioglu. 131-153 [doi]
- Interference Avoidance and Mitigation Technique Utilizing Cooperative Characterization of Interferers in Dense Wireless NetworksHye-Yeon Shim, Jin-Min Lee, Il-Gu Lee. 154-165 [doi]
- A Border Management Protocol for Multi-identifier Network Within the Network Layer and Its Attack Detection ExtensionJiaqing Lv, Hui Li 0022, Kedan Li, Yuanshao Liang, Zhengqi Wu. 166-185 [doi]
- VLDoS: Variable Low-Rate DoS Attack Model for BBR Algorithm in TCPMeng Yue, Zihan Lai, Tong Wang, Zhijun Wu 0001. 186-205 [doi]
- FullView: Using Bidirectional Group Sequences to Achieve Accurate Encrypted Traffic ClassificationYuwei Xu 0001, Zhiyuan Liang, Zhengxin Xu, Kehui Song, Qiao Xiang, Guang Cheng 0001. 206-223 [doi]
- TEE-Receipt: A TEE-Based Non-repudiation Framework for Web ApplicationsMahmoud Hofny, Lianying Zhao, Mohammad Mannan, Amr M. Youssef. 224-247 [doi]
- An Incentive Mechanism for Enhancing Transaction Privacy Based on Reputation Perception and Double AuctionHai Liu, Fangqiong Li, Hongye Peng, Tianxi Wang. 248-268 [doi]
- Dynamically Expanding Factor Base of Index Calculus Algorithm to Solve Massive Discrete Logarithm Problems FasterYichen Hao, Wen Huang 0002, Zhishuo Zhang, Weixin Zhao, Jian Peng 0002, Yongjian Liao. 269-287 [doi]
- ASOZ: Anonymous and Auditable Cryptocurrency with Enhanced Confidential TransactionTianjian Liu, Yang Liu 0171, Dawei Zhang, Chang Chen 0003, Wei Wang 0012. 291-311 [doi]
- Identity Inference in Ethereum: Towards Financial Security for Blockchain EcosystemKai Li, Yanyu Chen, Zhangjie Fu. 312-330 [doi]
- SMDT: A Blockchain-Based Secure Multi-version Data Trading Scheme with Fair Profit SharingYuhang Li, Yu Tao 0004, Min Fang, Hao Wang 0189, Lu Zhou 0002, Chunpeng Ge 0001. 331-352 [doi]
- Substitution Attacks on Asymmetric (Group) Message FrankingYumin Chen, Yi Wang, Rongmao Chen. 353-375 [doi]
- Symerge: Replacing Calls in Under-Constrained Symbolic Execution and Find VulnerabilitiesYicheng Zeng, Jiaqian Peng, Jiami Lin, Rongrong Xi, Hongsong Zhu. 376-399 [doi]
- Threshold Key Management and Signature in Dynamic Distributed SystemKang Chen, Daojing He, Lei Chen, Dawei Li. 400-419 [doi]