


default search action
5th CSNet 2021: Abu Dhabi, United Arab Emirates
- 5th Cyber Security in Networking Conference, CSNet 2021, Abu Dhabi, United Arab Emirates, October 12-14, 2021. IEEE 2021, ISBN 978-1-6654-0722-9

- Raphaël M. J. I. Larsen, Marc-Oliver Pahl

, Gouenou Coatrieux:
Authenticating IDS autoencoders using multipath neural networks. 1-9 - Darine Al-Mohtar, Amani Ramzi Daou, Nour El Madhoun, Rachad Maallawi:

A secure blockchain-based architecture for the COVID-19 data network. 1-5 - Zhaosen Shi, Xuyang Ding, Fagen Li, Yingni Chen, Canran Li:

Mitigation of poisoning attack in federated learning by using historical distance detection. 10-17 - Christian Lübben, Marc-Oliver Pahl

:
Advances in ML-Based Anomaly Detection for the IoT. 18-22 - Rodrigo Caldas, Carlos Novo

, Ricardo Morla
, Luis Cruz, António Carvalho, David Campelo:
Inferring Legacy IoT Device Behavior over a Layer 2 TLS Tunnel. 23-30 - Sanaa Kaddoura:

Classification of malicious and benign websites by network features using supervised machine learning algorithms. 36-40 - Gianmarco Baldini:

Intrusion detection systems in in-vehicle networks based on bag-of-words. 41-48 - Pascal Urien

:
Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets. 49-54 - AbdElaziz Saad AbdElaziz AbdElaal, Kai Lehniger, Peter Langendörfer

:
Incremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devices. 55-62 - Mwrwan Abubakar

, Zakwan Jaroucheh, Ahmed Yassin Al-Dubai
, William J. Buchanan
:
Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. 63-70 - Mathew Nicho

, Maitha Alkhateri:
Modeling Evasive Malware Authoring Techniques. 71-75 - Pedro B. Velloso

, David Cordova Morales
, Thi Mai Trang Nguyen, Guy Pujolle:
State of the art: Cross chain communications. 76-81 - David Cordova Morales

, Pedro B. Velloso
, Alexandre Laubé, Thi Mai Trang Nguyen, Guy Pujolle:
C4M: A Partition-Robust Consensus Algorithm for Blockgraph in Mesh Network. 82-89 - Zainab Khalid

, Farkhund Iqbal, Faouzi Kamoun, Mohammed Hussain, Liaqat Ali Khan:
Forensic Analysis of the Cisco WebEx Application. 90-97 - Eiman Alothali, Hany Alashwal, Motamen Salih

, Kadhim Hayawi:
Real Time Detection of Social Bots on Twitter Using Machine Learning and Apache Kafka. 98-102 - Imran Makhdoom

, Kadhim Hayawi, Mohammed Kaosar
, Sujith Samuel Mathew, Mohammad Mehedy Masud:
Blockchain-based Secure CIDS Operation. 103-106 - Siem Girmay

, Faniel Samsom, Asad Masood Khattak:
AI based Login System using Facial Recognition. 107-109

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














