default search action
SSCC 2020: Chennai, India
- Sabu M. Thampi, Guojun Wang, Danda B. Rawat, Ryan K. L. Ko, Chun-I Fan:
Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers. Communications in Computer and Information Science 1364, Springer 2021, ISBN 978-981-16-0421-8 - Hetong Jiang, Taejun Choi, Ryan K. L. Ko:
Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools. 1-20 - Houssem Mansouri, Al-Sakib Khan Pathan:
A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems. 21-32 - Teenu S. John, Tony Thomas:
Evading Static and Dynamic Android Malware Detection Mechanisms. 33-48 - Seema Nambiar, Nandakrishna, Chirag Tubakad, Adithya Kiran, Subramaniam Kalambur:
Multilevel Secure Container Deployment Framework in Edge Computing. 49-61 - Taiguo Qu, Wenjun Jiang, Dong Liu, Guojun Wang:
Deep Hierarchical App Recommendation with Dynamic Behaviors. 62-76 - Zbigniew Kotulski, Wojciech Niewolski, Tomasz Wojciech Nowak, Mariusz Sepczuk:
New Security Architecture of Access Control in 5G MEC. 77-91 - Jheng-Jia Huang, Chun-I Fan, Yu-Chen Hsu, Arijit Karati:
A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments. 92-106 - Chintala Yehoshuva, R. Raja Adhithan, N. Nalla Anandakumar:
A Survey of Security Attacks on Silicon Based Weak PUF Architectures. 107-122 - Belal Asad, Neetesh Saxena:
On the Feasibility of DoS Attack on Smart Door Lock IoT Network. 123-138 - Felix O. Olowononi, Danda B. Rawat, Chunmei Liu:
Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning. 139-151 - Paulo Ferreira, Mário Antunes:
Benchmarking Behavior-Based Intrusion Detection Systems with Bio-inspired Algorithms. 152-164 - Betty Saridou, Gueltoum Bendiab, Stavros N. Shiaeles, Basil K. Papadopoulos:
Thermal Management in Large Data Centres: Security Threats and Mitigation. 165-179 - Ilia Odeski, Michael Segal:
Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm. 180-196 - Mohammed Asrar Ahmed, S. Ramachandram, Khaleel Ur Rahman Khan:
Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption Over Outsourced Encrypted Data. 197-212 - N. P. Arun Kumar, Renganathan Laxmanan, S. Ram Kumar, Vobbilisetty Srinidh, R. Ramanathan:
Performance Study of Multi-target Tracking Using Kalman Filter and Hungarian Algorithm. 213-227 - Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty, Nalin Ranasinghe, Kasun De Zoysa, Wee Keong Ng:
SaaS - Microservices-Based Scalable Smart Contract Architecture. 228-243 - Rinoy Macwan, Sankha Das, Manik Lal Das:
GIDS: Anomaly Detection Using Generative Adversarial Networks. 244-251 - Chinmay D. Kuchinad, N. Chiranjeevi, Kartik Vishnu Hegde, Shikha Tripathi:
Audio Steganography Using Multi LSB and IGS Techniques. 252-261 - Naga Venkata Hrushikesh Chunduri, Ashok Kumar Mohan:
A Forensic Analysis on the Availability of MQTT Network Traffic. 262-274 - Angeliki Kalapodi, Nicolas Sklavos:
The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications. 275-289 - Vangara Saiprudhvi, R. Ramanathan:
Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment. 290-303
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.