


default search action
13th SIN 2020: Virtual Event / Istanbul, Turkey
- Siddika Berna Örs, Atilla Elçi:

SIN 2020: 13th International Conference on Security of Information and Networks, Virtual Event / Istanbul, Turkey, November 4-6, 2020. ACM 2020, ISBN 978-1-4503-8751-4
Session 1: Network Security and Protocols 1
- Nasser Al-Hadhrami

, Matthew Collinson, Nir Oren
:
A Subjective Network Approach for Cybersecurity Risk Assessment. 1:1-1:8 - Karim Lounis, Mohammad Zulkernine:

Exploiting Race Condition for Wi-Fi Denial of Service Attacks. 2:1-2:8 - Tigran Ovasapyan, Dmitry A. Moskvin, Artem Tsvetkov:

Detection of attacks on the Internet of Things based on intelligent analysis of devices functioning indicators. 3:1-3:7 - Farzan Majdani, Lynne Batik, Andrei Petrovski, Sergey Petrovski

:
Detecting Malicious Signal Manipulation in Smart Grids Using Intelligent Analysis of Contextual Data. 4:1-4:8 - Ouissem Ben Fredj, Alaeddine Mihoub

, Moez Krichen, Omar Cheikhrouhou, Abdelouahid Derhab:
CyberSecurity Attack Prediction: A Deep Learning Approach. 5:1-5:6 - Arnab Mukherjee, Raju Halder

:
PoliceChain: Blockchain-Based Smart Policing System for Smart Cities. 6:1-6:5
Session 2: Security of Cyber-Physical Systems
- Sinem Gur, Simge Demir, Sevval Simsek, Albert Levi:

Secure and Privacy-Aware Gateway for Home Automation Systems. 7:1-7:10 - Giovanni Salzillo, Massimiliano Rak, Felice Moretta

:
Threat Modeling based Penetration Testing: The Open Energy Monitor Case study. 8:1-8:8 - Yuning Jiang, Yacine Atif

:
An Approach to Discover and Assess Vulnerability Severity Automatically in Cyber-Physical Systems. 9:1-9:8 - Hope Nkiruka Eke, Andrei Petrovski, Hatem Ahriz

:
Detection of False Command and Response Injection Attacks for Cyber Physical Systems Security and Resilience. 10:1-10:8 - Jessica Fong, Ron Poet:

Creating Graphical Passwords on a Mobile Phone: Graphical Passwords on a Mobile. 11:1-11:6 - Jiyou Wang, Ron Poet:

Permission Management and User Privacy Based On Android: Permission Management On Android. 12:1-12:5
Session 3: Network Security and Protocols 2
- Richard Beno, Ron Poet:

Hacking Passwords that Satisfy Common Password Policies: Hacking Passwords. 13:1-13:3 - Mamello Thinyane

, Debora Irene Christine
:
SMART Citizen Cyber Resilience (SC2R) Ontology. 14:1-14:8 - Markus Hornsteiner, Sebastian Groll

, Alexander Puchta:
Towards a user-centric IAM entitlement shop - Learnings from the e-commerce. 15:1-15:4 - Kubra Aydin, Rahime Belen Saglam, Shujun Li

, Abdullah Bulbul:
When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter. 16:1-16:8 - Zeynep Chousein, Haci Yakup Tetik, Rahime Belen Saglam, Abdullah Bülbül, Shujun Li

:
Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions. 17:1-17:8
Session 4: Intrusion Detection
- Beyazit Bestami Yuksel, Serif Bahtiyar

, Ayse Yilmazer
:
Credit Card Fraud Detection with NCA Dimensionality Reduction. 18:1-18:7 - Maksim Kalameyets

, Dmitry Levshun
, Sergei Soloviev, Andrey Chechulin, Igor V. Kotenko:
Social networks bot detection using Benford's law. 19:1-19:8 - Mark Vella

, Christian Colombo:
SpotCheck: On-Device Anomaly Detection for Android. 20:1-20:6 - Vara Vundavalli, Farhat Lamia Barsha

, Mohammad Masum, Hossain Shahriar
, Hisham Haddad:
Malicious URL Detection Using Supervised Machine Learning Techniques. 21:1-21:6 - Maxim O. Kalinin

, Peter D. Zegzhda
:
AI-based Security for the Smart Networks. 22:1-22:4
Session 5: Cryptographic Techniques and Key Management
- Giovanni Di Crescenzo, Glenn Veach:

RPM: Additive Stream Ciphers for Lightweight Communication Security. 23:1-23:8 - Yakov Mironov, Polina Mironova

, Konstantin E. Rumyantsev:
Characteristics of a two-stage synchronization algorithm in the system of quantum key distribution with dividing a fiber-optic line into sections with decreasing length. 24:1-24:5 - Valeriy O. Osipyan, Kirill I. Litvinov:

Development of the mathematic model of disymmetric bigram cryptosystem based on a parametric solution family of multi-degree system of Diophantine equations✱. 25:1-25:7 - Liudmila Babenko, Ilya Pisarev:

Modeling replay and integrity violations attacks for cryptographic protocols source codes verification of e-voting system based on blind intermediaries. 26:1-26:3 - Oksana Kilik, Abdulaziz Almehmadi, Khalil El-Khatib:

Eye Gaze-Based Human Error Prevention System: Experts vs. Non-Experts. 27:1-27:7 - Shreyas Srinivasa

, Jens Myrup Pedersen
, Emmanouil Vasilomanolakis
:
Towards systematic honeytoken fingerprinting. 28:1-28:5
Session 6: Computational Intelligence Techniques in Security
- Jonathan Francis Roscoe, Max Smith-Creasey:

Unconventional Mechanisms for Biometric Data Acquisition via Side-Channels. 29:1-29:4 - Stanislav Zhdanov, Ekaterina Maro:

Power Analysis Side-Channel Attacks on Symmetric Block Cipher Magma. 30:1-30:5 - Igor V. Kotenko, Igor Saenko, Fadey Skorik:

Intelligent support for network administrator decisions based on combined neural networks. 31:1-31:8 - Vasiliy M. Krundyshev:

Neural network approach to assessing cybersecurity risks in large-scale dynamic networks. 32:1-32:8 - Mark Sokolov, Kehinde Olufowobi, Nic Herndon

:
Visual spoofing in content-based spam detection. 33:1-33:5 - Muhammet Sahin, Serif Bahtiyar

:
A Survey on Malware Detection with Deep Learning. 34:1-34:6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














