Abstract is missing.
- Self-similarity based network anomaly detection for industrial control systemsBryan Martin, Chad A. Bollmann. 1-6 [doi]
- Analysis of Decoy Strategies for Detecting RansomwareByron Denham, Dale R. Thompson. 1-6 [doi]
- Authenticating Outsourced Location-Based Skyline Queries under Shortest Path DistanceYidan Hu, Yukun Dong, Wenxin Chen, Yingfei Dong, Rui Zhang 0007. 1-9 [doi]
- Enhancing ML-Based DoS Attack Detection with Feature Engineering : IEEE CNS 23 PosterShujun Zhao, Lesther Santana, Evans Owusu, Mohamed Rahouti, Kaiqi Xiong, Yufeng Xin. 1-2 [doi]
- MMIO Access-Based Coverage for Firmware AnalysisKen Yihang Bai, Tuba Yavuz. 1-9 [doi]
- Protecting Control Commands Using Low-Cost EM Sensors in the Smart GridKylie McClanahan, Jingyao Fan, Qinghua Li, Guohong Cao. 1-9 [doi]
- Enhancing Security in NOMA-Based Networks: An Effective Deceptive Approach to Thwart Multiple EavesdroppersNeji Mensi, Danda B. Rawat. 1-9 [doi]
- Using Phone Sensors to Augment Vehicle ReliabilityNoah T. Curran, Arun Ganesan, Mert D. Pesé, Kang G. Shin. 1-9 [doi]
- Empirical Analysis of Software Vulnerabilities Causing Timing Side ChannelsM. Mehdi Kholoosi, Muhammad Ali Babar 0001, Cemal Yilmaz. 1-9 [doi]
- VetIoT: On Vetting IoT Defenses Enforcing Policies at RuntimeAkib Jawad Nafis, Omar Chowdhury, Md. Endadul Hoque. 1-9 [doi]
- A BERT-based Empirical Study of Privacy Policies' Compliance with GDPRLu Zhang, Nabil Moukafih, Hamad Alamri, Gregory Epiphaniou, Carsten Maple. 1-6 [doi]
- Characterizing Cyber Attacks against Space Systems with Missing Data: Framework and Case StudyEkzhin Ear, Jose L. C. Remy, Antonia Feffer, Shouhuai Xu. 1-9 [doi]
- Machine Learning-Based Intrusion Detection for Swarm of Unmanned Aerial VehiclesUmair Ahmad Mughal, Samuel Chase Hassler, Muhammad Ismail. 1-9 [doi]
- Towards Adaptive Zero Trust Model for Secure AIKexin Zhang, Shengjie Xu, Bongsik Shin. 1-2 [doi]
- Attack Resilient Wireless Backhaul Connectivity with Optimized Fronthaul Coverage in UAV NetworksXingqi Wu, Junaid Farooq. 1-6 [doi]
- Autonomous Cyber Defense Against Dynamic Multi-strategy Infrastructural DDoS AttacksAshutosh Dutta, Ehab Al-Shaer, Samrat Chatterjee, Qi Duan. 1-9 [doi]
- Detection of Zero-Day Attacks using CNN and LSTM in Networked Autonomous Systems 'IEEE CNS 23 Poster'Hassan El Alami, Danda B. Rawat. 1-2 [doi]
- Byzantine-Robust Federated Learning with Variance Reduction and Differential PrivacyZikai Zhang, Rui Hu. 1-9 [doi]
- Homomorphic Comparison Method Based on Dynamically Polynomial Composite Approximating Sign FunctionXiaMeng Feng, Xiaodong Li, SuYa Zhou, Xin Jin. 1-9 [doi]
- VeriActor: Dynamic Generation of Challenge-Response Questions for Enhanced Email Sender VerificationBasel Abdeen, Ehab Al-Shaer, Waseem G. Shadid. 1-9 [doi]
- Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?Andrea Corsini, Shanchieh Jay Yang. 1-9 [doi]
- RMDM: Using Random Meta-Atoms to Send Directional Misinformation to EavesdroppersFahid Hassan, Zhambyl Shaikhanov, Hichem Guerboukha, Daniel M. Mittleman, Kaushik Sengupta, Edward W. Knightly. 1-9 [doi]
- On the Domain Generalizability of RF Fingerprints Through Multifractal Dimension RepresentationBenjamin Johnson 0008, Bechir Hamdaoui. 1-9 [doi]
- Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion AnalysisEvans Owusu, Mohamed Rahouti, D. Frank Hsu, Kaiqi Xiong, Yufeng Xin. 1-6 [doi]
- When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your IdentitiesJingwen Shi, Tian Xie, Guan-Hua Tu, Chunyi Peng 0001, Chi-Yu Li 0001, Andrew Hou, Sihan Wang, Yiwen Hu, Xinyu Lei, Min-Yue Chen, Li Xiao, Xiaoming Liu 0002. 1-9 [doi]
- A Smart Grid Ontology: Vulnerabilities, Attacks, and Security PoliciesUtku Tefek, Ertem Esiner, Carmen Cheh, Daisuke Mashima. 1-6 [doi]
- Universal Network Traffic Analysis for Malicious Traffic Detection using RappNet: A Privacy-Preserving Approach : IEEE CNS 23 PosterOnur Barut, Lulin Deng, David Lu. 1-2 [doi]
- Adversarial Attacks on Deep Learning-Based UAV Navigation SystemsMohammed Mynuddin, Sultan Uddin Khan, Mahmoud Nabil Mahmoud, Ahmad Alsharif. 1-6 [doi]
- Adversarial Manipulation of Learning in Linear-Quadratic Zero-Sum Differential Games via Cost PoisoningSon Tung Do, Gabrielle Ebbrecht, Juntao Chen. 1-6 [doi]
- Security Analysis of Trust on the Controller in the Matter Protocol SpecificationShashwat Kumar, Francis Hahn, Xinming Ou, Anoop Singhal. 1-6 [doi]
- Speaker Anonymity and Voice Conversion Vulnerability: A Speaker Recognition AnalysisShalini Saini, Nitesh Saxena. 1-9 [doi]
- Leveraging Neuro-Inspired Reinforcement Learning for Secure Reputation-based Communication in Connected VehiclesHeena Rathore, Henry Griffith. 1-6 [doi]
- SmartLens: Robust Detection of Rogue Device via Frequency Domain Features in LoRa-Enabled IIoTSubir Halder, Amrita Ghosal, Thomas Newe, Sajal K. Das 0001. 1-9 [doi]
- Lightweight Impact Assessment and Projection of Lateral Movement and Malware InfectionMartin Husák, Michal Javorník. 1-6 [doi]
- The Impact of Dynamic Learning on Adversarial Attacks in Networks (IEEE CNS 23 Poster)Mohamed el Shehaby, Ashraf Matrawy. 1-2 [doi]
- Toward Adaptive DDoS-Filtering Rule GenerationJun Li 0001, Devkishen Sisodia, Yebo Feng, Lumin Shi, Mingwei Zhang 0004, Christopher Early, Peter L. Reiher. 1-9 [doi]
- SecureImgStego: A Keyed Shuffling-based Deep Learning Model for Secure Image SteganographyTrishna Chakraborty, Imranur Rahman, Hasan Murad, Md Shohrab Hossain, Shagufta Mehnaz. 1-9 [doi]
- A Key Generation Scheme from Sensing Data for IoT Security : IEEE CNS 23 PosterXiaokai Ye, Tao Lv, Xiaohan Sun. 1-2 [doi]
- Stealthy False Data Injection Attack on Unmanned Aerial Vehicles with Partial KnowledgeUmair Ahmad Mughal, Muhammad Ismail, Syed Ali Asad Rizvi. 1-9 [doi]
- Application-layer Characterization and Traffic Analysis for Encrypted QUIC Transport ProtocolQianqian Zhang, Chi-Jiun Su. 1-9 [doi]
- Cross-layer Device Identification for Smart Grid Substation Networks : IEEE CNS 23 PosterVenkat Sai Suman Lamba Karanam, Fahmida Afrin, Byrav Ramamurthy, Nirnimesh Ghose. 1-2 [doi]
- Exploring the Dark Side of AI: Advanced Phishing Attack Design and Deployment Using ChatGPTNils Begou, Jeremy Vinoy, Andrzej Duda, Maciej Korczynski. 1-6 [doi]
- BeamSec: A Practical mmWave Physical Layer Security Scheme Against Strong AdversariesAfifa Ishtiaq, Arash Asadi, Ladan Khaloopour, Waqar Ahmed, Vahid Jamali, Matthias Hollick. 1-9 [doi]
- High-speed OFDM Physical-Layer Key ExchangeRadi Abubaker, Guang Gong. 1-9 [doi]
- FAKEY: Fake Hashed Key Attack on Payment Channel NetworksAlvi Ataur Khalil, Mohammad Ashiqur Rahman, Hisham A. Kholidy. 1-9 [doi]
- A Stealthy Inference Attack on Split Learning with a Split-Fuse Defensive MeasureSean Dougherty, Abhinav Kumar, Jie Hou, Reza Tourani, Atena M. Tabakhi. 1-9 [doi]
- P3LI5: Practical and confidEntial Lawful Interception on the 5G coreFrancesco Intoci, Julian Sturm, Daniel Fraunholz, Apostolos Pyrgelis, Colin Barschel. 1-9 [doi]
- IEEE CNS 23 Poster: Cooperative Omnidirectional Beamformation for THz Band Phy-SecurityMehzabien Iqbal, Ahmad Y. Javaid. 1-2 [doi]
- The Tables Have Turned: GPT-3 Distinguishing Passwords from HoneywordsNilesh Chakraborty, Youssef Yamout, Mohammad Zulkernine. 1-5 [doi]
- Inter-Temporal Reward Decisions with Strategic Ethical HackersJing Hou, Xuyu Wang, Amy Z. Zeng. 1-9 [doi]
- Early-stage Conflict Detection in HLF-based Delay-critical IoT NetworksAditya Pathak, Irfan S. Al-Anbagi, Howard J. Hamilton. 1-6 [doi]
- Towards Evaluation and Understanding of Large Language Models for Cyber Operation AutomationMadeena Sultana, Adrian Taylor, Li Li, Suryadipta Majumdar. 1-6 [doi]
- SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data IntegrityDakun Shen, Tao Hou, Zhuo Lu, Yao Liu 0007, Tao Wang 0026. 1-9 [doi]
- A Needle in a Haystack: Distinguishable Deep Neural Network Features for Domain-Agnostic Device FingerprintingAbdurrahman Elmaghbub, Bechir Hamdaoui. 1-9 [doi]
- SHIP: Securing Hashed Timelock Contracts in Payment Channel NetworksAlvi Ataur Khalil, Mohammad Ashiqur Rahman. 1-2 [doi]