default search action
DSC 2018: Kaohsiung, Taiwan
- IEEE Conference on Dependable and Secure Computing, DSC 2018, Kaohsiung, Taiwan, December 10-13, 2018. IEEE 2018, ISBN 978-1-5386-5790-4
- Koichi Funaya, Samir Bajaj, Kumar Sharad, Alok Srivastava:
Optimizing the Sequence of Vulnerability Scanning Injections. 1-2 - Jihun Kim, Jeonghun Cho, Daejin Park:
Low-Power Command Protection Using SHA-CRC Inversion-Based Scrambling Technique for CAN-Integrated Automotive Controllers. 1-2 - Chen Wu, Shaohua Tang, Xingfu Yan:
A Homomorphic LWE-Based Verifiable Electronic Voting System. 1-8 - Cheng-Hsu Lin, Chi-Yu Li, Kuochen Wang:
Setting Malicious Flow Entries Against SDN Operations: Attacks and Countermeasures. 1-8 - Wu-Chuan Yang, Lien-Yuan Ting, Tzu-Chun Kuo:
On the Authentication of Certificateless RSA Public Key. 1-2 - Jonghyeon Park, Hyunsu Mun, Youngseok Lee:
Improving Tor Hidden Service Crawler Performance. 1-8 - Chung-Kuan Chen, Shang-Kuei Chen, Shiuhpyng Winston Shieh:
Mitigating Over-Permissible Transfer for Control Flow Integrity. 1-8 - Jen-Cheng Ying, Wang-Dauh Tseng, Wen-Jiin Tsai:
Bipolar Dual-LFSR Reseeding for Low-Power Testing. 1-7 - Kodai Nagata, Hiroaki Kikuchi, Chun-I Fan:
Risk of Bitcoin Addresses to be Identified from Features of Output Addresses. 1-6 - Koichiro Amemiya:
DSC#7. 204 - Rua-Huan Tsaih, Shin-Ying Huang, Mao-Ci Lian, Yennun Huang:
ANN Mechanism for Network Traffic Anomaly Detection in the Concept Drifting Environment. 1-6 - Albert Guan, Chin-Laung Lei:
Efficient Key Agreement Protocol for Smart Sensors. 1-7 - Chi-Kuan Chiu, Hsiao-Hsien Chang, Ching-Hao Mao, Te-En Wei:
Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Graph Edit Distance. 1-2 - Koji Nakao:
Keynote Talk #2. 14 - Kai Qian, Reza M. Parizi, Dan Chia-Tien Lo:
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development. 1-2 - Chih-Hung Wang:
An Identity-Based Fair Contract Signing Protocol Constructed by the Confirmation Signature. 1-6 - Narmadha Sambandam, Mourad Hussein, Noor Siddiqi, Chung-Horng Lung:
Network Security for IoT Using SDN: Timely DDoS Detection. 1-2 - Jeffrey M. Voas:
Keynote Talk #1. 13 - Caiqin Nong, Shaohua Tang, Yuanyuan Zhang:
A Privacy-Preserving Metro Passenger Flow Acquisition and Query System Based on Crowd-Sensing. 1-8 - Mordechai Guri, Yosef A. Solewicz, Yuval Elovici:
MOSQUITO: Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker Communication. 1-8 - Henan Kottayil Hyder, Chung-Horng Lung:
Closed-Loop DDoS Mitigation System in Software Defined Networks. 1-6 - Hidenori Kuwakado:
Secret Sharing Schemes Using Modulo-$2^{m}$ Arithmetic Operations. 1-7 - Helei Cui, Cong Wang, Yu Hua, Yuefeng Du, Xingliang Yuan:
A Bandwidth-Efficient Middleware for Encrypted Deduplication. 1-8 - Ying-Shen Chen, Wei-Ning Chen, Che-Yu Wu, Hsu-Chun Hsiao, Shih-Kun Huang:
Dynamic Path Pruning in Symbolic Execution. 1-8 - Sen Wang, J. Morris Chang:
Differentially Private Principal Component Analysis Over Horizontally Partitioned Data. 1-8 - Kota Sasa, Hiroaki Kikuchi:
Impact Assessment of Password Reset PRMitM Attack with Two-Factor Authentication. 1-8 - Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou:
Resilient and Scalable Cloned App Detection Using Forced Execution and Compression Trees. 1-8 - Mingbo Zhang, Saman A. Zonouz:
Use-After-Free Mitigation via Protected Heap Allocation. 1-8 - Jia-Ning Luo, Ming-Hour Yang:
Offline Transferable E-Cash Mechanism. 1-2 - Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura, Masaki Hashimoto:
Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes. 1-8 - Amer Aljaedi, C. Edward Chow, Ehab Ashary, Francisco Torres-Reyes:
OTMEN: Offloading Traffic Monitoring to Edge Nodes in Software-Defined Datacenter Networks. 1-8 - Matthew Hagan, Fahad Siddiqui, Sakir Sezer, BooJoong Kang, Kieran McLaughlin:
Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things. 1-8 - Chi Ho Lau, Alan Kai-Hau Yeung, Fan Yan:
Blockchain-Based Authentication in IoT Networks. 1-8 - Mahmoud Ammar, Mahdi Washha, Gowri Sankar Ramachandran, Bruno Crispo:
SlimIoT: Scalable Lightweight Attestation Protocol for the Internet of Things. 1-8 - Antonino Rullo, Elisa Bertino, Domenico Saccà:
PAST: Protocol-Adaptable Security Tool for Heterogeneous IoT Ecosystems. 1-8 - Ose Osamudiamen, Chung-Horng Lung:
Segment Routing Green Spine Switch Management Systems for Data Center Networks. 1-8 - Ian Perry, Lutzu Li, Christopher Sweet, Shao-Hsuan Su, Fu-Yuan Cheng, Shanchieh Jay Yang, Ahmet Okutan:
Differentiating and Predicting Cyberattack Behaviors Using LSTM. 1-8 - Harpreet Kaur Dhaliwal, Chung-Horng Lung:
Load Balancing Using ECMP in Multi-Stage Clos Topology in a Datacenter. 1-7 - Wei-Hao Chen, Chun-I Fan, Yi-Fan Tseng:
Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds. 1-4 - Po-Wen Chi, Ming-Hung Wang:
A Lightweight Compound Defense Framework Against Injection Attacks in IIoT. 1-8 - Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi:
Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks. 1-8 - Wei-Ho Chung, Mu-En Wu, Yeong-Luh Ueng, Yi-Hsuan Su:
Forged Seal Imprint Identification Based on Regression Analysis on Imprint Borders and Metrics Comparisons. 1-5 - Rui Policarpo Duarte, Horácio C. Neto:
Stochastic Processors on FPGAs to Compute Sensor Data Towards Fault-Tolerant IoT Systems. 1-8 - Chia-Wei Hsu, Sheng-Ru Wei, Shiuhpyng Shieh:
Finder: Automatic ICC Data Reconstruction for Long-Term Runtime Semantics. 1-9 - Tien-Ho Chang, Jiunn-Wu Lin, Chia-Mei Chen, Gu Hsin Lai:
The Method of Capturing the Encrypted Password Packets of WPA & WPA2, Automatic, Semi-Automatic or Manual? 1-4 - Chung-Kuan Chen, E.-Lin Ho, Shiuhpyng Winston Shieh:
DeepMemIntrospect: Recognizing Data Structures in Memory with Neural Networks. 1-2 - Daniel Fleck, Angelos Stavrou, George Kesidis, Neda Nasiriani, Yuquan Shan, Takis Konstantopoulos:
Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model. 1-8 - Alexander Yohan, Nai-Wei Lo:
An Over-the-Blockchain Firmware Update Framework for IoT Devices. 1-8 - Kuo-Sui Lin, Chih-Chung Chiu:
Vague Set Based FMEA Method for Risk Evaluation of Safety-Related Systems. 1-8 - Chia-Min Lai, Bo-Ching Huang, Shin-Ying Huang, Ching-Hao Mao, Hahn-Ming Lee:
Detection of DNS Tunneling by Feature-Free Mechanism. 1-2 - Yoshihiro Oyama:
Skipping Sleeps in Dynamic Analysis of Multithreaded Malware. 1-8 - Ruei-Hau Hsu, Chun-I Fan, Tony Q. S. Quek, Jemin Lee:
CORE: Cooperative Encryption with its Applications to Controllable Security Services. 1-8 - Yangguang Tian, Yingjiu Li, Ximeng Liu, Robert H. Deng, Binanda Sengupta:
PriBioAuth: Privacy-Preserving Biometric-Based Remote User Authentication. 1-8 - Tzung-Han Jeng, Yi-Ming Chen, Chien-Chih Chen, Chuan-Chiang Huang, Kuo-Sen Chou:
CC-Tracker: Interaction Profiling Bipartite Graph Mining for Malicious Network Activity Detection. 1-8 - Wei-Chieh Chao, Si-Chen Lin, Yi-Hsien Chen, Chin-Wei Tien, Chun-Ying Huang:
Design and Implement Binary Fuzzing Based on Libfuzzer. 1-2 - Hsiao-Ying Lin, Zhuo Wei, Yanjiang Yang, Yadong Wei, Kang Tang, Qingdi Sha:
AnchorCAN: Anchor-Based Secure CAN Communications System. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.