default search action
CSR 2022: Rhodes, Greece
- IEEE International Conference on Cyber Security and Resilience, CSR 2022, Rhodes, Greece, July 27-29, 2022. IEEE 2022, ISBN 978-1-6654-9952-1
- Tapadhir Das, Osama Abu Hamdan, Shamik Sengupta, Engin Arslan:
Flood Control: TCP-SYN Flood Detection for Software-Defined Networks using OpenFlow Port Statistics. 1-8 - Raha Soleymanzadeh, Rasha F. Kashef:
A Stable Generative Adversarial Network Architecture for Network Intrusion Detection. 9-15 - Cameron Lischke, Tongtong Liu, Joe McCalmon, Md Asifur Rahman, Talal Halabi, Sarra M. Alqahtani:
LSTM-Based Anomalous Behavior Detection in Multi-Agent Reinforcement Learning. 16-21 - Christopher Molloy, Steven H. H. Ding, Benjamin C. M. Fung, Philippe Charland:
H4rm0ny: A Competitive Zero-Sum Two-Player Markov Game for Multi-Agent Learning on Evasive Malware Generation and Detection. 22-29 - Alfonso Iacovazzi, Shahid Raza:
Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers. 30-37 - Jenny Heino, Ayush Gupta, Antti Hakkala, Seppo Virtanen:
On Usability of Hash Fingerprinting for Endpoint Application Identification. 38-43 - Michael Vogel, Franka Schuster, Fabian Malte Kopp, Hartmut König:
Data Volume Reduction for Deep Packet Inspection by Multi-layer Application Determination. 44-49 - Angelos Papoutsis, Christos Iliou, Dimitris Kavallieros, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris:
Host-based Cyber Attack Pattern Identification on Honeypot Logs Using Association Rule Learning. 50-55 - Luca Deri, Alfredo Cardigliano:
Using CyberScore for Network Traffic Monitoring. 56-61 - Medha Pujari, Bhanu Cherukuri, Ahmad Y. Javaid, Weiqing Sun:
An Approach to Improve the Robustness of Machine Learning based Intrusion Detection System Models Against the Carlini-Wagner Attack. 62-67 - Zhen Huang, Marc White:
Semantic-Aware Vulnerability Detection. 68-75 - Alan Mills, Jonathan White, Phil Legg:
OGMA: Visualisation for Software Container Security Analysis and Automated Remediation. 76-81 - Luca Faramondi, Marta Grassi, Simone Guarino, Roberto Setola, Cristina Alcaraz:
Configuration vulnerability in SNORT for Windows Operating Systems. 82-89 - Joshua Hubbard, Gueltoum Bendiab, Stavros Shiaeles:
IPASS: A Novel Open-Source Intelligence Password Scoring System. 90-95 - Nathan Daughety, Marcus Pendleton, Rebeca Perez, Shouhuai Xu, John V. Franco:
Auditing a Software-Defined Cross Domain Solution Architecture. 96-103 - M. Caballero, Dimitris Kavallieros, A. Spyros, A. Tavernarakisv, Athanasios Tziouvaras, Stefano Bonacina, K. Chandrarmouli, M. Coroiu, L. Chen, T. Dounia, I. Giannoulakis, N. Gligoric, Emmanouil Kafetzakis, T. Kasig, Vaios Koumaras, T. Krousarlis, K. Lapidaki, A. Markakis, S. Marin, Mark Manulis, Sofia-Anna Menesidou, Sokratis Nifakos, L. Meng, S. Mhiri, M. Nati, K. Ntafloukas, D. Oniga, Dimitrios Papamartzivanos, Spyros Papastergiou, K. Sanchez, Christos Sakkas, K. Stelliou, L. Trujillo, Theodora Tsikrika, E. Venegas, Stefanos Vrochidis, D. Xydias:
ICT in Healthcare: the role of IoT and the SECANT solution. 104-111 - Tatiana Trantidou, George Bravos, Philippe Valoggia, Ioannis Skourtis, Manolis Falelakis, Kostas Poulios, Ilias Spais, Sotiris Ioannidis, Thomas Oudin, Ruben Costa, Christopher Konialis, Daryl Holkham, Zoe Kasapi, Athanasios Karantjias:
SENTINEL - Approachable, tailor-made cybersecurity and data protection for small enterprises. 112-117 - Emanuele Bellini, Iolanda Aversa, Stelvio Cimato, Antonio Esposito:
A Blockchain-based Trustworthy Cloud Services Digital Ecosystem. 118-124 - Gopal Gurung, Gueltoum Bendiab, Maria Shiaele, Stavros Shiaeles:
CIDS: Collaborative Intrusion Detection System using Blockchain Technology. 125-130 - Sotirios Brotsis, Nicholas Kolokotronis:
Blockchain-Enabled Digital Forensics for the IoT: Challenges, Features, and Current Frameworks. 131-137 - Alexandros Vasilaras, Donatos Dosis, Michael Kotsis, Panagiotis Rizomiliotis:
Android Device Incident Response: Viber Analysis. 138-142 - Edward L. Amoruso, Richard Leinecker, Cliff C. Zou:
SeeShells: An Optimized Solution for Utilizing Shellbags in a Digital Forensic Investigation. 143-148 - Mohammed Alkhowaiter, Khalid Almubarak, Cliff C. Zou:
Evaluating Perceptual Hashing Algorithms in Detecting Image Manipulation Over Social Media Platforms. 149-156 - Michele Grisafi, Mahmoud Ammar, Bruno Crispo:
On the (in)security of Memory Protection Units : A Cautionary Note. 157-162 - Mordechai Guri:
ETHERLED: Sending Covert Morse Signals from Air-Gapped Devices via Network Card (NIC) LEDs. 163-170 - Risto Vaarandi, Sten Mäses:
How to Build a SOC on a Budget. 171-177 - Hwiwon Lee, Sosun Kim, Huy Kang Kim:
SoK: Demystifying Cyber Resilience Quantification in Cyber-Physical Systems. 178-183 - Razan M. Boodai, Hadeel A. Alessa, Arwa H. Alanazi:
An Approach to Address Risk Management Challenges: Focused on IT Governance Framework. 184-188 - Jan von der Assen, Muriel Figueredo Franco, Christian Killer, Eder J. Scheid, Burkhard Stiller:
CoReTM: An Approach Enabling Cross-Functional Collaborative Threat Modeling. 189-196 - Souhila Badra Guendouzi, Samir Ouchani, Mimoune Malki:
Enhancing the Aggregation of the Federated Learning for the Industrial Cyber Physical Systems. 197-202 - Mehdi Saman Azari, Francesco Flammini, Stefania Santini:
Improving Resilience in Cyber-Physical Systems based on Transfer Learning. 203-208 - Moataz AbdelKhalek, Manimaran Govindarasu:
ML-based Anomaly Detection System for DER DNP3 Communication in Smart Grid. 209-214 - Moataz AbdelKhalek, Burhan Hyder, Manimaran Govindarasu, Craig G. Rieger:
Moving Target Defense Routing for SDN-enabled Smart Grid. 215-220 - Giancarlo Fortino, Claudia Greco, Antonella Guzzo, Michele Ianni:
Neural Network based Temporal Point Processes for Attack Detection in Industrial Control Systems. 221-226 - Nauman Zubair, Adeen Ayub, Hyunguk Yoo, Irfan Ahmed:
Control Logic Obfuscation Attack in Industrial Control Systems. 227-232 - Shaurya Purohit, Manimaran Govindarasu:
ML-based Anomaly Detection for Intra-Vehicular CAN-bus Networks. 233-238 - Murray Dunne, Sebastian Fischmeister:
Powertrace-based Fuzzing of CAN Connected Hardware. 239-244 - Minh A. Vu, William C. Headley, Kevin P. Heaslip:
A Comparative Overview of Automotive Radar Spoofing Countermeasures. 245-252 - Joel Höglund, Shahid Raza:
BLEND: Efficient and blended IoT data storage and communication with application layer security. 253-260 - Irene Bicchierai, Enrico Schiavone, Francesco Brancati:
Modelling and Assessing the Risk of Cascading Effects with ResilBlockly. 261-266 - Arnolnt Spyros, Angelos Papoutsis, Ilias Koritsas, Notis Mengidis, Christos Iliou, Dimitris Kavallieros, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris:
Towards Continuous Enrichment of Cyber Threat Intelligence: A Study on a Honeypot Dataset. 267-272 - Mike Anastasiadis, Georgios Aivatoglou, Georgios Spanos, Antonis Voulgaridis, Konstantinos Votis:
Combining text analysis techniques with unsupervised machine learning methodologies for improved software vulnerability management. 273-278 - Kieran Hughes, Kieran McLaughlin, Sakir Sezer:
Policy-Based Profiles for Network Intrusion Response Systems. 279-286 - Deborah J. Bodeau, Richard D. Graubart, Rosalie McQuaid:
Using Potential Effects on Threat Events (PETE) to Assess Mitigation Effectiveness and Return on Investment (ROI). 287-292 - Ronald C. Turner:
Process Mining for Asymmetric Cybersecurity Audit. 293-298 - Notis Mengidis, Maya Bozhilova, Cyril Ceresola, Consuelo Assunta Colabuono, Michael Cooke, Grégory Depaix, Angel Genchev, Georgi Koykov, Wim Mees, Matteo Merialdo, Antonis Voulgaridis, Theodora Tsikrika, Konstantinos Votis, Stefanos Vrochidis:
Leveraging Cyber Ranges for Prototyping, Certification and Training: The ECHO case. 299-304 - Markos Antonopoulos, Giorgos Drainakis, Eleftherios Ouzounoglou, Giorgos Papavassiliou, Angelos Amditis:
Design and proof of concept of a prediction engine for decision support during cyber range attack simulations in the maritime domain. 305-310 - Sotirios Nikoletos, Paraskevi Raftopoulou:
Employing social network analysis to dark web communities. 311-316 - Jibrilla Tanimu, Stavros Shiaeles:
Phishing Detection Using Machine Learning Algorithm. 317-322 - Manabu Hirano, Ryotaro Kobayashi:
Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic Hypervisor. 323-330 - Abhilash Hota, Jürgen Schönwälder:
A Bayesian Model Combination based approach to Active Malware Analysis. 331-336 - P. Mohan Anand, P. V. Sai Charan, Sandeep K. Shukla:
A Comprehensive API Call Analysis for Detecting Windows-Based Ransomware. 337-344 - Elisavet Grigoriou, Athanasios Liatifis, Panagiotis I. Radoglou-Grammatikis, Thomas Lagkas, Ioannis D. Moscholios, Evangelos K. Markakis, Panagiotis G. Sarigiannidis:
Protecting IEC 60870-5-104 ICS/SCADA Systems with Honeypots. 345-350 - Vasiliki Kelli, Panagiotis I. Radoglou-Grammatikis, Thomas Lagkas, Evangelos K. Markakis, Panagiotis G. Sarigiannidis:
Risk Analysis of DNP3 Attacks. 351-356 - Ahmed Aleroud, Majd Shariah, Rami Malkawi:
Privacy Preserving Human Activity Recognition Using Microaggregated Generative Deep Learning. 357-363 - Yuri B. Boiko, Iluju Kiringa, Tet Hin Yeap:
Current drainage induced by bias injection attack against Kalman filter of BLDC motor. 364-369 - Abeer Almutairi, Ying He, Steven Furnell:
A Multi-Level Trust Framework for the Internet of Underwater Things. 370-375 - Jack Edwards, Francisco J. Aparicio-Navarro, Leandros Maglaras, Christos Douligeris:
FFDA: A novel Four-Factor Distributed Authentication mechanism. 376-381 - Alexandra K. Michota, Nineta Polemi:
A Supply Chain Service Cybersecurity Certification Scheme based on the Cybersecurity Act. 382-387 - Marco Raimondi, Giacomo Longo, Alessio Merlo, Alessandro Armando, Enrico Russo:
Training the Maritime Security Operations Centre Teams. 388-393 - Evangelos D. Charitos, Nikolaos A. Kounalakis, Ioanna Kantzavelou:
Cybersecurity at Merchant Shipping. 394-399
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.