


default search action
27th ISC 2024: Arlington, VA, USA - Part II
- Nicky Mouha
, Nick Nikiforakis
:
Information Security - 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part II. Lecture Notes in Computer Science 15258, Springer 2025, ISBN 978-3-031-75763-1
Post-Quantum Cryptography
- Shintaro Narisada
, Shusaku Uemura, Hiroki Okada
, Hiroki Furue, Yusuke Aikawa, Kazuhide Fukushima
:
Solving McEliece-1409 in One Day - Cryptanalysis with the Improved BJMM Algorithm. 3-23 - Yang Zhou, Heyang Cao, Mingsheng Wang:
Deep LLL on Module Lattices. 24-40 - Xuan Yu
, Jipeng Zhang, Junhao Huang, Donglong Chen, Lu Zhou:
Multi-way High-Throughput Implementation of Kyber. 41-60 - Samed Düzlü, Patrick Struck:
The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys. 61-80 - Shota Inoue, Yusuke Aikawa, Tsuyoshi Takagi:
A Faster Variant of CGL Hash Function via Efficient Backtracking Checks. 81-100 - Ahmed Zawia, M. Anwar Hasan:
Streamlining CSIDH: Cost-Effective Strategies for Group Actions Evaluation. 101-118
System Security
- Sardor Mamarasulov
, Yang Li
, Changbo Wang
:
Channel Robust Strategies with Data Augmentation for Audio Anti-spoofing. 121-139 - You Li
, Kaiyu Hou
, Yunqi He
, Yan Chen
, Hai Zhou
:
Property Guided Secure Configuration Space Search. 140-160 - Ekaterina Ivanova
, Natalia Stakhanova
, Bahman Sistany:
Adversarial Analysis of Software Composition Analysis Tools. 161-182 - Anuradha Mandal
, Cagri Arisoy
, Nitesh Saxena
:
News Reader: A News Interest Identification Attack Using Single-Electrode Brainwave Signals. 183-202
Web Security
- Shaown Sarker
, Kasimir Schulz
, Aleksandr Nahapetyan
, Anupam Das
, Alexandros Kapravelos
:
JSHint: Revealing API Usage to Improve Detection of Malicious JavaScript. 205-225 - Shaown Sarker
, William Melicher
, Oleksii Starov
, Anupam Das
, Alexandros Kapravelos
:
Automated Generation of Behavioral Signatures for Malicious Web Campaigns. 226-245 - Daniel Köhler
, Wenzel Pünter
, Christoph Meinel:
We have Phishing at Home: Quantitative Study on Email Phishing Susceptibility in Private Contexts. 246-265
Intrusion Detection
- Zhuoqun Xia, Longfei Huang, Jingjing Tan, Faqun Jiang, Zhenzhen Hu:
TIDL-IDS: A Time-Series Imaging and Deep Learning-Based IDS for Connected Autonomous Vehicles. 269-285 - Shihua Sun
, Pragya Sharma
, Kenechukwu Nwodo
, Angelos Stavrou
, Haining Wang:
FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method. 286-306 - Yiming Wei, Weiye Qi, Zechuan Li, Yufan Han, Yingxu Lai:
MVDetector: Malicious Vehicles Detection Under Sybil Attacks in VANETs. 307-322 - Yue Song
, Jianting Yuan:
Insider Threat Detection Based on User and Entity Behavior Analysis with a Hybrid Model. 323-340

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.