| Record Type: |
Electronic resources
: Monograph/item
|
| Title/Author: |
Science of cyber security/ edited by Jun Zhao, Weizhi Meng. |
| Reminder of title: |
6th International Conference, SciSec 2024, Copenhagen, Denmark, August 14-16, 2024 : proceedings / |
| remainder title: |
SciSec 2024 |
| other author: |
Zhao, Jun. |
| corporate name: |
SciSec (Conference) |
| Published: |
Singapore :Springer Nature Singapore : : 2025., |
| Description: |
xiii, 474 p. :ill. (chiefly color), digital ;24 cm. |
| [NT 15003449]: |
A Novel Scoring Algorithm Against HID Attacks Based on Static Text Feature Matching. -- Identifying Ransomware Functions through Microarchitectural Side-channel Analysis. -- STARMAP: Multi-machine Malware Analysis System for Lateral Movement Observation. -- LogSHIELD: A Graph-based Real-time Anomaly Detection Framework using Frequency Analysis. -- Completeness Analysis of Mobile Apps' Privacy Policies by Using Deep Learning. -- Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails. -- Matching Knowledge Graphs for Cybersecurity Countermeasures Selection. -- Graph-Based Profiling of Dependency Vulnerability Remediation. -- Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails. -- An Enhanced Firewall for IoT Security. -- Exploring the Effects of Cybersecurity Awareness and Decision-Making Under Risk. -- SVSM-KMS: Safeguarding Keys for Cloud Services with Encrypted Virtualization. -- GNNexPIDS: An Interpretation Method for Provenance-based Intrusion Detection Based on GNNExplainer. -- Performance Evaluation of Lightweight Cryptographic Ciphers on ARM Processor for IoT Deployments. -- AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees. -- FAF-BM: An Approach for False Alerts Filtering using BERT Model with Semi-supervised Active Learning. -- Smart Home Cyber Insurance Pricing. -- Exhaustive Exploratory Analysis of Low Degree Maximum Period NLFSRs By Graph Analysis. -- Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model. -- Multi-Modal Multi-Task Tiered Expert (M3TTE): An Effective Method for CDN Website Classification. -- Malware Variant Detection Based on Knowledge Transfer and Ensemble Learning. -- An Efficient IOC-Driven BigData Tracing and Backtracking Model for Emergency Response. -- Integrating CP-ABE and Device Fingerprint into Federated Learning. -- Automatic Alert Categories Standardization for Heterogeneous Devices with Incomplete Semantic Knowledge Based on LSTM. -- Family Similarity-Enhanced Implicit Data Augmentation for Malware Classification. |
| Contained By: |
Springer Nature eBook |
| Subject: |
Computer security - Congresses. - |
| Online resource: |
https://doi.org/10.1007/978-981-96-2417-1 |
| ISBN: |
9789819624171 |