


default search action
17th SIN 2024: Sydney, Australia
- 17th International Conference on Security of Information and Networks, SIN 2024, Sydney, Australia, December 2-4, 2024. IEEE 2024, ISBN 979-8-3315-0973-6
- Amin Rois Sinung Nugroho, Muhammad Ikram
, Mohamed Ali Kâafar
:
Performance Evaluation of Quantum-Secure Symmetric Key Agreement. 1-9 - Nicholas D'Silva
, Toran Shahi, Øyvind Timian Dokk Husveg, Adith Sanjeeve, Erik Buchholz
, Salil S. Kanhere:
Demystifying Trajectory Recovery from Ash: An Open-Source Evaluation and Enhancement. 1-8 - Wael Jefry
, Firas Al-Doghman
, Farookh Hussain
:
BERT-LA: Leveraging BERT and AraBERT With Bi-LSTM for Cross-Lingual Sentiment Analysis of English and Arabic Texts. 1-10 - Ghazaleh Keshavarzkalhori, Cristina Pérez-Solà
, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí
:
Building Resilient AI: A Solution to Data and Model Poisoning Prevention. 1-8 - Stuart Weir, Muhammad Shahbaz Khan, Naghmeh Moradpoor, Jawad Ahmad:
Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis. 1-7 - Carlos A. Rivera Alvarez, Arash Shaghaghi, Gustavo Batista, Salil S. Kanhere:
Towards Weaknesses and Attack Patterns Prediction for IoT Devices. 1-10 - Halimcan Yasar, Serif Bahtiyar
:
Secure Communication for MUM-T: A Blockchain and Lightweight Cryptography Framework. 1-8 - Christoforus Yoga Haryanto
, Anne Maria Elvira, Trung Duc Nguyen, Minh Hieu Vu, Yoshiano Hartanto, Emily Lomempow, Arathi Arakala:
Contextualized AI for Cyber Defense: An Automated Survey Using LLMs. 1-8 - Mehdi Houichi
, Faouzi Jaïdi
, Adel Bouhoula:
A Novel Framework for Attack Detection and Localization in Smart Cities. 1-9 - Hiep Vo
, Shui Yu
, Xi Zheng
:
Prompt Engineering Adversarial Attack Against Image Captioning Models. 1-7 - Pankaj Hariom Sharma, Priyanka Singh
:
CDCEF: A Cloud-Based Data Volatility & CSP Reliance Eradication Framework. 1-6 - Pirunthavi Wijikumar, Shouthiri Partheepan, Jahan Hassan, Farzad Sanati
, Biplop Rakshit Ray:
Bushfire Severity Prediction Optimization: Feature Combination Study with XGBoost Regression and Satellite-Derived Data. 1-7 - Indu Parajuli, Biplob Rakshit Ray, Jahan Hassan, Michael Cowling:
Taxonomy of User-Centric Errors Leading to Cyber Attacks in LoRaWAN. 1-10 - Asad Faraz Khan, Priyadarsi Nanda:
Comprehensive Security of SDN Controllers in NFVI-Based 5G Network. 1-10 - Saleh Mansor Alqahtani, Priyadarsi Nanda
:
Enhancing Phishing Resilience in Academia: The Mediating Role of Anti-Phishing Tools on Student Awareness and Behavior. 1-8 - Devi Listiyani
, Priyanka Singh
:
IRIS-SAFE: Privacy-Preserving Biometric Authentication. 1-7 - Asad Faraz Khan, Priyadarsi Nanda:
Dynamic Network Slicing and Deep Learning Based Intrusion Detection System with Virtual Load Balancing in Edge Enabled SDN/NFV Based 5G Networks. 1-10 - Erkan Uslu, Oguz Yayla:
Dilithium-Based Verifiable Timed Signature Scheme. 1-8 - Tarun Bisht, Sarath Babu, Virendra Singh:
Critical Behavior Sequence Monitoring for Early Malware Detection. 1-8 - Ny Hasina Andriambelo, Naghmeh Moradpoor:
Enhancing Security and Privacy in Federated Learning for Connected Autonomous Vehicles With Lightweight Blockchain and Binius ZeroKnowledge Proofs. 1-8 - Lanlan Pan
, Ruonan Qiu, Minghui Yang:
A Lightweight Hybrid Signcryption Scheme for Smart Devices. 1-8 - Shunmika Chidambaram, Bhagya Sony, Nithya Nedungadi, Sriram Sankaran:
Empirical Analysis of Anomaly Detection Systems for Internet of Things. 1-7 - Taher M. Ghazal, Jamshaid Iqbal Janjua, Walid Abushiba, Munir Ahmad, Anuam Ihsan, Nidal A. Al-Dmour:
Cybersecurity Revolution via Large Language Models and Explainable AI. 1-6 - Liang Liu, Kazumasa Omote:
A Blockchain-Based System for Dynamic Redundancy in IoT Communications. 1-8 - Rajesh Nayak
, C. D. Jaidhar:
Experimental Study on Impact of Appliance ID-Based Normalization on SimDataset for Anomalous Power Consumption Classification. 1-8 - Saleh Mansor Alqahtani, Priyadarsi Nanda
:
Effects of Personal Characteristics on Phishing Awareness, Anti-Phishing Tool Usage, and Phishing Avoidance Behavior: A Structural Equation Modeling Approach. 1-9 - Kaisei Kajita, Go Ohtake:
EncPDS: Encrypted Personal Data Stores via Key-Aggregate ID-Based Proxy Re-Encryption. 1-8 - Akshitha K. Subran, Sriram Sankaran:
A Novel Biometric-Based Multi-Factor Authentication Protocol for EV Charging Infrastructures. 1-7 - Dominic Ayamga
, Priyadarsi Nanda
, Manoranjan Mohanty
:
The Bell-LaPadula (BLP) Enterprise Security Architecture Model vs Inference Attacks. 1-8 - Beyazit Bestami Yuksel, Ayse Yilmazer-Metin:
ECG- PPS: Privacy Preserving Disease Diagnosis and Monitoring System for Real-Time ECG Signals. 1-7 - Büsra Çaliskan, Ibrahim Gulatas
, H. Hakan Kilinc, Abdul Halim Zaim:
The Recent Trends in Ransomware Detection and Behaviour Analysis. 1-8 - Mizuki Tsuchida, Kazumasa Omote:
A Secure Contact Tracing Method Using Blockchain for Criminal Investigation. 1-8 - Farag El Zegil, Priyadarsi Nanda, Manoranjan Mohanty, Majed Alzahrani:
Comparative Analysis of Intrusion Detection Schemes in Internet of Things(IoT) Based Applications. 1-8 - Rahat Mehmood, Priyanka Singh
, Zoe Jeffery:
Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach. 1-7 - Fei Du
, Jinai Ge, Wen Wang, Yuwen Zou, Sang-Yoon Chang, Wenjun Fan:
Exploiting the Vulnerabilities in MAVLink Protocol for UAV Hijacking. 1-8 - Harshit Gupta, Luca D'Agati, Francesco Longo, Antonio Puliafito, Giovanni Merlino:
Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends. 1-8 - Márton Bertalan Limpek, Géza Szabó, László Hévizi, István Gódor:
Spatial Prediction of UAV Position Using Deep Learning. 1-6 - Muntathar Abid, Priyadarsi Nanda, Manoranjan Mohanty:
Incident Response Adaptive Metrics Framework. 1-8 - Yaser Saei, Jafar Tahmoresnezhad, Sima Jafarikhah, Hossein Siadati:
Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework. 1-8 - Amir Javadpour, Forough Ja'fari, Tarik Taleb
, Chafika Benzaïd:
5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning. 1-9 - Kerem Alpdag, Naghmeh Moradpoor, Ny Hasina Andriambelo, Paul Wooderson, Leandros Maglaras
:
EV-IRP Manager: An Electric Vehicle Incident Response Playbook Manager and Visualizer Toolkit. 1-10 - Shayesta Naziri, Xu Wang, Guangsheng Yu, Jian Xu, Sudhir Shrestha, Christy Jie Liang:
SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems. 1-8 - Kaie Maennel, Olaf Manuel Maennel:
Human-AI Collaboration and Cyber Security Training: Learning Analytics Opportunities and Challenges. 1-8 - Mert Yildiz, Serif Bahtiyar
:
A Novel Key Management Framework for Secure and Scalable Decentralized Identity Systems. 1-8 - Adel Atieh, Priyadarsi Nanda, Manoranjan Mohanty:
A Zero-Trust Framework Based on Machine Learning for Industrial Internet of Things. 1-8 - En Jie Tan
, Kowit Tan, Royce Yu Feng Chong, Xingxing Chen, Yi Ching Tan, Liming Lu, Huaqun Guo:
Simulation of Pre-Ransomware Attacks on Active Directory. 1-9 - Valeriy O. Osipyan, E. T. J. Algharib, Arseniy Zhuck, Kirill I. Litvinov:
Mathematical Models of Security Information Systems Based on the Generalized Multiplicative Knapsacks. 1-5 - Yulduz Muradova, Jennifer Amachree, Louis Henry, Anu G. Bourgeois:
Implementation of Natural Language UAV Control Using OpenAI's ChatGPT in a Simulated University Environment. 1-5 - Jay Dave, Nikumani Choudhury, Dantu Havishteja, Katuri Revanth:
Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks. 1-8 - Sajal Bhatia, Saaid Elhadad, Irfan Ahmed:
PATCH: Problem-Based Learning Approach for Teaching Cybersecurity and Ethical Hacking in Community Colleges. 1-9 - Xufeng Liu, Quoc Hoan Vu, Priyanka Singh
:
FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces. 1-7 - Swapnoneel Roy, Charlene H. Crawshaw, Debajyoti Mukhopadhyay, Meera Narvekar:
Security Inspection and Enhancement of a Modern Multi-Factor Authentication Protocol. 1-6 - Sunil Arora
, John D. Hastings
:
Microsegmented Cloud Network Architecture Using Open-Source Tools for a Zero Trust Foundation. 1-8 - Qisheng Chen
, Kazumasa Omote
:
A Token-Level Adversarial Example Attack Method for Machine Learning Based Malicious URL Detectors. 1-7 - Charisee Zhi Ling Yip, Tee Kiat Chua, Clarabel Jinghui Teo, Jing Rui Goh, Brandon Jia Le Loo, Huaqun Guo, Liming Lu, Kan Chen:
Security Situation Awareness Platform. 1-8 - Abdullah Al Noman, Md Tanvir Rahman Tarafder, S. M. Tamim Hossain Rimon, Asif Ahamed
, Shahriar Ahmed, Abdullah Al Sakib:
Discoverable Hidden Patterns in Water Quality Through AI, LLMs, and Transparent Remote Sensing. 1-6 - Xiaocui Dang, Priyadarsi Nanda, Heng Xu, Haiyu Deng, Manoranjan Mohanty:
Recommendation System Model Ownership Verification via Non-Influential Watermarking. 1-8 - Alexey Rusakov, Naghmeh Moradpoor, Aida Akbarzadeh:
Lightweight Blockchain Prototype for Food Supply Chain Management. 1-8 - Azadeh Arnaz, Justin Lipman
, Mehran Abolhasan:
Adversarial Attack Vectors Against Near-Real-Time AI xApps in the Open RAN. 1-9 - Xin Lin Gan, Zhi Ren James Tan, Yu En Bernice Goo, Xin Ling Jocelyn Yeo, Vi Shean Lim, Yan Cong Boo, Huaqun Guo:
Ransomware Insight Analyzer. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.