default search action
6th CSNet 2022: Rio de Janeiro, Brazil
- 6th Cyber Security in Networking Conference, CSNet 2022, Rio de Janeiro, Brazil, October 24-26, 2022. IEEE 2022, ISBN 979-8-3503-9722-2
- Igor Jochem Sanz, Gabriel Antonio Fontes Rebello, Otto Carlos Muniz Bandeira Duarte:
GRAFFITO-IDS: A Graph-based Algorithm for Feature Enrichment on Online Intrusion Detection Systems. 1-7 - Gabriel Antonio F. Rebello, Gustavo Franco Camilo, Lucas C. B. Guimarães, Lucas Airam C. de Souza, Otto Carlos M. B. Duarte:
Security and Performance Analysis of Quorum-based Blockchain Consensus Protocols. 1-7 - Fábio César Schuartz, Mauro Fonseca, Anelise Munaretto:
A Distributed Platform for Intrusion Detection System Using Data Stream Mining in a Big Data Environment. 1-7 - Vagner Ereno Quincozes, Silvio E. Quincozes, Célio Vinicius N. de Albuquerque, Diego G. Passos, Daniel Mossé:
Feature Extraction for Intrusion Detection in IEC-61850 Communication Networks. 1-7 - Samir Chabbi, Nour El Madhoun, Lazhar Khamer:
Security of NFC Banking Transactions: Overview on Attacks and Solutions. 1-5 - Emil Suleymanov, Erkin Kirdan, Marc-Oliver Pahl:
Securing CoAP with DTLS and OSCORE. 1-7 - João Pedro De Lima Cassiano, Sérgio Ribeiro, Alana Almeida:
ICpSAF - Integrated Cross-platform Security Assessment Framework. 1-2 - Nouredine Tamani, Saad El Jaouhari:
Blockchain Meets Formal Logic: Semantics Level Cybersecurity Challenges. 1-6 - Wiem Tounsi:
Cyber Deception, the Ultimate Piece of a Defensive Strategy - Proof of Concept. 1-5 - Paulo Assumpção, Carlos Oliveira, Pablo Ortiz, Wilson S. Melo, Luiz Carmo:
A Secure Cloud-based Architecture for monitoring Cyber-Physical Critical Infrastructures. 1-7 - Pascal Urien:
Estimating Speedup Factor For Personal HSMs Based On Secure Elements. 1-4 - Khan Reaz, Gerhard Wunder:
ASOP: A Sovereign and Secure Device Onboarding Protocol for Cloud-based IoT Services. 1-3 - Govinda Mohini G. Bezerra, Tadeu N. Ferreira, Diogo M. F. Mattos:
Assessing Software-Defined Radio Security and Performance in Virtualized Environments for Cloud Radio Access Networks. 1-7 - Junye Li, Aryan Sharma, Deepak Mishra, Aruna Seneviratne:
Demonstration of Standalone Intelligent WiFi Sensing for Real-Time Occupancy Monitoring. 1-2 - Diego Canizio Lopes, André Luiz Nasserala Pires, Igor Monteiro Moraes:
The Impact of the Interest Flooding Attack on the Pending Interest Table of CCN routers. 1-5 - Javier Jose Diaz Rivera, Talha Ahmed Khan, Waleed Akbar, Muhammad Afaq, Wang-Cheol Song:
ZT&T: Secure blockchain-based tokens for service session management in Zero Trust Networks. 1-7 - Fernando Dias de Mello Silva, Abhishek Kumar Mishra, Aline Carneiro Viana, Nadjib Achir, Anne Fladenmuller, Luís Henrique M. K. Costa:
Performance Analysis of a Privacy-Preserving Frame Sniffer on a Raspberry Pi. 1-7 - Humberto Mendes, Silvio E. Quincozes, Vagner Ereno Quincozes:
A Web User Interface Tool for Metaheuristics-Based Feature Selection Assessment for IDSs. 1-5 - Cherifa Hamroun, Ahmed Amamou, Kamel Haddadou, Hayat Haroun, Guy Pujolle:
A Review On Lexical Based Malicious Domain Name Detection Methods. 1-7 - Khaldoun Al Agha, Pauline Loygue, Guy Pujolle:
Horizontal network for a better cybersecurity. 1-4 - Pedro Horchulhack, Eduardo K. Viegas, Martin Andreoni Lopez:
A Stream Learning Intrusion Detection System for Concept Drifting Network Traffic. 1-7 - Y A Joarder, Carol J. Fung:
A Survey on the Security Issues of QUIC. 1-8 - Carol J. Fung, Vivian Motti, Katie Zhang, Yanjun Qian:
A Study of User Concerns about Smartphone Privacy. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.