Science of Cyber Security 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings

This book constitutes the refereed proceedings of the 5th International Conference on Science of Cyber Security, SciSec 2023, held in Melbourne, VIC, Australia, during July 11–14, 2023. The 21 full papers presented together with 6 short papers were carefully reviewed and selected from 60 submissions...

Full description

Bibliographic Details
Other Authors: Yung, Moti (Editor), Chen, Chao (Editor), Meng, Weizhi (Editor)
Format: eBook
Language:English
Published: Cham Springer Nature Switzerland 2023, 2023
Edition:1st ed. 2023
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 04693nmm a2200421 u 4500
001 EB002187722
003 EBX01000000000000001325207
005 00000000000000.0
007 cr|||||||||||||||||||||
008 231206 ||| eng
020 |a 9783031459337 
100 1 |a Yung, Moti  |e [editor] 
245 0 0 |a Science of Cyber Security  |h Elektronische Ressource  |b 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings  |c edited by Moti Yung, Chao Chen, Weizhi Meng 
250 |a 1st ed. 2023 
260 |a Cham  |b Springer Nature Switzerland  |c 2023, 2023 
300 |a XIV, 526 p. 164 illus., 118 illus. in color  |b online resource 
505 0 |a Session 1 Network and System Security -- ACDroid: Detecting Collusion Applications on Smart Devices -- DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines -- Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy -- Cyber Attacks against Enterprise Networks: Characterization, Modelling and Forecasting -- Session 2 Cryptography and Authentication -- MCVDSSE: Secure Multi-Client Verifiable Dynamic Symmetric Searchable Encryption -- A Graphical Password Scheme based on Rounded Image Selection -- Implementation of the Elliptic Curve Method -- Almost Injective and Invertible Encodings for Jacobi Quartic Curves -- SeeStar: an Efficient Starlink Asset Detection Framework -- Privacy-enhanced Anonymous and Deniable Post-Quantum X3DH -- Session 3 AI for Security -- Fractional Dynamic: Analysis for Network Malware Propagation -- Enhancing the Anti-steganalysis Ability via Multiple Adversarial Network --  
505 0 |a An Empirical study of AI model’s Performance for Electricity Load Forecasting with Extreme Weather Conditions -- Session 4 Threat Detection and Analysis -- AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection -- Real-time Aggregation for Massive alerts based on Dynamic Attack Granularity Graph -- Decompilation Based Deep Binary-Source Function Matching -- Event-based Threat Intelligence Ontology Model -- Session 5 Web and Privacy Security -- Optimally Blending Honeypots into Production Networks: Hardness and Algorithms -- WebMea: A Google Chrome Extension for Web Security and Privacy Measurement Studies -- Quantifying Psychological Sophistication of Malicious Emails -- SVFL: Secure Vertical Federated Learning on Linear Models -- Session 6: Cryptography and Authentication II -- Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies -- Adaptively Secure Constrained Verifiable Random Function --  
505 0 |a A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments -- Session 7: Advanced Threat Detection Techniques and Blockchain -- VaultBox: Enhancing the Security and Effectiveness of Security Analytics -- Two-stage Anomaly Detection in LEO Satellite Network -- Hydra: An Efficient Asynchronous DAG-based BFT Protocol -- Redactable Blockchain in the Permissioned Setting -- Session 8: Workshop Session -- A MULTI-LEVEL Sorting Prediction Enhancement-based two-dimensional Reversible Data Hiding Algorithm for Jpeg Images -- Research on Encrypted Malicious 5G Access Network Traffic identification based on Deep Learning -- A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional 
653 |a Machine learning 
653 |a Machine Learning 
653 |a Information Storage and Retrieval 
653 |a Database Management 
653 |a Data mining 
653 |a Application software 
653 |a Information storage and retrieval systems 
653 |a Data Mining and Knowledge Discovery 
653 |a Computer and Information Systems Applications 
653 |a Database management 
700 1 |a Chen, Chao  |e [editor] 
700 1 |a Meng, Weizhi  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Lecture Notes in Computer Science 
028 5 0 |a 10.1007/978-3-031-45933-7 
856 4 0 |u https://doi.org/10.1007/978-3-031-45933-7?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 025.04 
520 |a This book constitutes the refereed proceedings of the 5th International Conference on Science of Cyber Security, SciSec 2023, held in Melbourne, VIC, Australia, during July 11–14, 2023. The 21 full papers presented together with 6 short papers were carefully reviewed and selected from 60 submissions. The papers are organized in the topical sections named: ACDroid: Detecting Collusion Applications on Smart Devices; Almost Injective and Invertible Encodings for Jacobi Quartic Curves; Decompilation Based Deep Binary-Source Function Matching