Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Assessing the Performance of Ethereum and Hyperledger Fabric Under DDoS Attacks for Cyber-Physical Systems
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 48, Pages 1–6https://doi.org/10.1145/3664476.3670927Blockchain technology offers a decentralized and secure platform for addressing various challenges in smart cities and cyber-physical systems, including identity management, trust and transparency, and supply chain management. However, blockchains are ...
- research-articleOctober 2024
A Novel Differentially Private Online Learning Algorithm for Group Lasso in Big Data
This study addresses the challenge of extracting valuable information and selecting key variables from large datasets, essential across statistics, computational science, and data science. In the age of big data, where safeguarding personal privacy is ...
- research-articleFebruary 2024
Dual-Mode Encryption for UC-Secure String OT from Learning with Errors
Universal composability (UC) is a primary security flavor for designing oblivious transfer (OT) due to its advantage of arbitrary composition. However, the study of UC-secure OT over lattices is still far behind compared with constructions over prequantum ...
- research-articleJanuary 2023
Anomaly Detection Using Multiscale C-LSTM for Univariate Time-Series
Computers generate network traffic data when people go online, and devices generate sensor data when they communicate with each other. When events such as network intrusion or equipment failure occur, the corresponding time-series will show abnormal ...
- research-articleJanuary 2023
A Few-Shot Malicious Encrypted Traffic Detection Approach Based on Model-Agnostic Meta-Learning
Existing malicious encrypted traffic detection approaches need to be trained with many samples to achieve effective detection of a specified class of encrypted traffic data. With the rapid development of encryption technology, various new types of ...
- research-articleJanuary 2022
A Decision Tree-Based Online Traffic Classification Method for QoS Routing in Data Center Networks
In data center networks, how to ensure the quality of service (QoS) of traffic effectively has become an important optimization goal. Traffic classification has been widely studied to guarantee network flow QoS since it provides a basis for the network ...
- research-articleJanuary 2022
IMCSA: Providing Better Sequence Alignment Space for Industrial Control Protocol Reverse Engineering
Nowadays, with the wide application of industrial control facilities, industrial control protocol reverse engineering has significant security implications. The reverse method of industrial protocol based on sequence alignment is the current mainstream ...
- review-articleJanuary 2022
Building towards Automated Cyberbullying Detection: A Comparative Analysis
The increased use of social media among digitally anonymous users, sharing their thoughts and opinions, can facilitate participation and collaboration. However, this anonymity feature which gives users freedom of speech and allows them to conduct ...
- research-articleSeptember 2021
Newly engineered energy-based features for supervised anomaly detection in a physical model of a water supply system
AbstractIndustrial Control Systems (ICS) are hardware, network, and software, upon which a facility depends to allow daily operations to function. In most cases society takes the operation of such systems, for example public transport, tap water or ...
- research-articleJanuary 2020
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset
One of the important features of routing protocol for low-power and lossy networks (RPLs) is objective function (OF). OF influences an IoT network in terms of routing strategies and network topology. On the contrary, detecting a combination of ...
- research-articleSeptember 2019
PLC memory attack detection and response in a clean water supply system
International Journal of Critical Infrastructure Protection (IJCIP), Volume 26, Issue Chttps://doi.org/10.1016/j.ijcip.2019.05.003AbstractIndustrial Control Systems (ICS) are frequently used in manufacturing and critical infrastructures like water treatment, chemical plants, and transportation schemes. Citizens tend to take modern-day conveniences such as trains, planes ...
- research-articleSeptember 2018
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things
SIN '18: Proceedings of the 11th International Conference on Security of Information and NetworksArticle No.: 1, Pages 1–6https://doi.org/10.1145/3264437.3264438The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Positioning devices (GPS) and Local Area Network (LAN) interfaces. Security is by far ...
- proceedingSeptember 2018
SIN '18: Proceedings of the 11th International Conference on Security of Information and Networks
- Pete Burnap,
- Atilla Elçi,
- Omer Rana,
- Philipp Reinecke,
- Naghmeh Moradpoor,
- George Theodorakopoulos,
- Koray Karabina
We welcome you to the Eleventh International Conference on Security of Information and Networks (SIN 2018). The SIN series of conference provides an international forum for the presentation of research and applications of security in information and ...
- extended-abstractOctober 2017
Insider threat detection using principal component analysis and self-organising map
SIN '17: Proceedings of the 10th International Conference on Security of Information and NetworksPages 274–279https://doi.org/10.1145/3136825.3136859An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data which can damage the employer's marketing position and reputation. In addition, ...