We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Nov 2021, skipping first 105

[ total of 338 entries: 1-100 | 6-105 | 106-205 | 206-305 | 306-338 ]
[ showing 100 entries per page: fewer | more | all ]
[106]  arXiv:2111.07093 [pdf, other]
Title: AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2111.07153 [pdf, other]
Title: Categorizing Service Worker Attacks and Mitigations
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2111.07201 [pdf, other]
Title: Evaluating the effectiveness of Phishing Reports on Twitter
Comments: This paper has been accepted at the 2021 APWG Symposium on Electronic Crime Research (eCrime). The camera ready version of this work was presented and will be published at this conference ( December 1st to 3rd, 2021)
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Social and Information Networks (cs.SI)
[109]  arXiv:2111.07608 [pdf, other]
Title: Property Inference Attacks Against GANs
Comments: To Appear in NDSS 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Machine Learning (stat.ML)
[110]  arXiv:2111.07805 [pdf, other]
Title: Resilience of IOTA Consensus
Authors: Hamed Mamache (SU), Gabin Mazué (SU), Osama Rashid (SU), Gewu Bu (LIMOS), Maria Potop-Butucaru (SU, LINCS)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[111]  arXiv:2111.07847 [pdf, other]
Title: Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments
Comments: To be published in Proceedings of the 2021 Annual Computer Security Applications Conference (ACSAC '21)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[112]  arXiv:2111.07850 [pdf, other]
Title: Colored Noise Mechanism for Differentially Private Clustering
Comments: 5 pages, 3 figures, preprint
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[113]  arXiv:2111.07860 [pdf, other]
Title: Tracking in apps' privacy policies
Authors: Konrad Kollnig
Comments: Technical report from August 2019. Last revised in November 2021
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[114]  arXiv:2111.08146 [pdf, other]
Title: A note on averaging prediction accuracy, Green's functions and other kernels
Subjects: Cryptography and Security (cs.CR); Analysis of PDEs (math.AP); Classical Analysis and ODEs (math.CA)
[115]  arXiv:2111.08217 [pdf, other]
Title: NatiDroid: Cross-Language Android Permission Specification
Subjects: Cryptography and Security (cs.CR)
[116]  arXiv:2111.08223 [pdf, other]
Title: A Survey on Adversarial Attacks for Malware Analysis
Comments: 48 Pages, 31 Figures, 11 Tables
Subjects: Cryptography and Security (cs.CR)
[117]  arXiv:2111.08404 [pdf, other]
Title: Practical Timing Side Channel Attacks on Memory Compression
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:2111.08429 [pdf, other]
Title: An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[119]  arXiv:2111.08440 [pdf, other]
Title: On the Importance of Difficulty Calibration in Membership Inference Attacks
Comments: 16 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[120]  arXiv:2111.08455 [pdf, ps, other]
Title: Integrating On-chain and Off-chain Governance for Supply Chain Transparency and Integrity
Comments: The 5th Symposium on Distributed Ledger Technology
Journal-ref: Proc. 5th Symp. Distributed Ledger Technology, Brisbane, Australia, 23 Nov 2021
Subjects: Cryptography and Security (cs.CR)
[121]  arXiv:2111.08553 [pdf, other]
Title: Remote Memory-Deduplication Attacks
Subjects: Cryptography and Security (cs.CR)
[122]  arXiv:2111.08662 [pdf, other]
Title: RemoteVote and SAFE Vote: Towards Usable End-to-End Verification for Vote-by-Mail
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2111.08665 [pdf, ps, other]
Title: Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round
Subjects: Cryptography and Security (cs.CR)
[124]  arXiv:2111.08784 [pdf, other]
Title: Improved Pan-Private Stream Density Estimation
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Data Structures and Algorithms (cs.DS)
[125]  arXiv:2111.08822 [pdf, other]
Title: BBS: A Blockchain Big-Data Sharing System
Comments: arXiv admin note: substantial text overlap with arXiv:2109.07626
Subjects: Cryptography and Security (cs.CR)
[126]  arXiv:2111.08842 [pdf, other]
Title: Privacy Guarantees of BLE Contact Tracing: A Case Study on COVIDWISE
Authors: Salman Ahmed, Ya Xiao, Taejoong (Tijay) Chung, Carol Fung, Moti Yung, Danfeng (Daphne)Yao
Comments: \{copyright} 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works
Journal-ref: IEEE Computer 2021
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[127]  arXiv:2111.08893 [pdf, other]
Title: Understanding Security Issues in the NFT Ecosystem
Journal-ref: ACM Conference on Computer and Communications Security (CCS), 2022
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2111.09227 [pdf, other]
Title: A Discussion and Comparative Study on Security and Privacy of Smart Meter Data
Subjects: Cryptography and Security (cs.CR)
[129]  arXiv:2111.09374 [pdf, other]
Title: BigFoot: Exploiting and Mitigating Leakage in Encrypted Write-Ahead Logs
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR)
[130]  arXiv:2111.09488 [pdf, other]
Title: Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[131]  arXiv:2111.09529 [pdf, other]
Title: Blockchain Interoperability in UAV Networks: State-of-the-art and Open Issues
Comments: This paper is submitted to an IEEE journal for possible publication
Subjects: Cryptography and Security (cs.CR)
[132]  arXiv:2111.09625 [pdf, other]
Title: InspectJS: Leveraging Code Similarity and User-Feedback for Effective Taint Specification Inference for JavaScript
Comments: 11 pages, sent to Software Engineering in Practice track at ICSE'2022
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[133]  arXiv:2111.09626 [pdf, other]
Title: Enhancing the Insertion of NOP Instructions to Obfuscate Malware via Deep Reinforcement Learning
Journal-ref: Journal Computers & Security, Volume 113, 2022, 102543
Subjects: Cryptography and Security (cs.CR)
[134]  arXiv:2111.09632 [pdf, other]
Title: Pell hyperbolas in DLP-based cryptosystems
Comments: Pre-print
Subjects: Cryptography and Security (cs.CR); Algebraic Geometry (math.AG); Group Theory (math.GR); Number Theory (math.NT)
[135]  arXiv:2111.09699 [pdf, ps, other]
Title: Authentication of optical physical unclonable functions based on single-pixel detection
Comments: 12 pages, 11 figures
Journal-ref: 16, 054025 (2021)
Subjects: Cryptography and Security (cs.CR); Applied Physics (physics.app-ph); Optics (physics.optics)
[136]  arXiv:2111.09863 [pdf, ps, other]
Title: A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain
Authors: Dimitrios Miltiadou (1), Stamatis Pitsios (1), Dimitrios Spyropoulos (1), Dimitrios Alexandrou (1), Fenareti Lampathaki (2), Domenico Messina (3), Konstantinos Perakis (1) ((1) UBITECH, (2) Suite5, (3) ENGINEERING Ingegneria Informatica S.p.A.)
Journal-ref: LNICST (2021), volume 344, pp 120-134
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[137]  arXiv:2111.09872 [pdf, ps, other]
Title: A big data intelligence marketplace and secure analytics experimentation platform for the aviation industry
Authors: Dimitrios Miltiadou (1), Stamatis Pitsios (1), Dimitrios Spyropoulos (1), Dimitrios Alexandrou (1), Fenareti Lampathaki (2), Domenico Messina (3), Konstantinos Perakis (1) ((1) UBITECH, (2) Suite5, (3) ENGINEERING Ingegneria Informatica S.p.A.)
Journal-ref: LNICST (2021), volume 371, pp 48-62
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[138]  arXiv:2111.09934 [pdf, other]
Title: Constraint-based Diversification of JOP Gadgets
Comments: arXiv admin note: substantial text overlap with arXiv:2007.08955
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[139]  arXiv:2111.09961 [pdf, other]
Title: A Review of Adversarial Attack and Defense for Classification Methods
Journal-ref: The American Statistician. 0 (2021) 1-44
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[140]  arXiv:2111.09975 [src]
Title: Malfustection: Obfuscated Malware Detection and Malware Classification with Data Shortage by Combining Semi-Supervised and Contrastive Learning
Comments: We are changing the method
Subjects: Cryptography and Security (cs.CR)
[141]  arXiv:2111.10085 [pdf, other]
Title: Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors
Comments: Accepted at ESEC/FSE 2023. this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[142]  arXiv:2111.10090 [pdf, other]
Title: Quantifying Cybersecurity Effectiveness of Software Diversity
Subjects: Cryptography and Security (cs.CR)
[143]  arXiv:2111.10091 [pdf, other]
Title: A Voting-Based Blockchain Interoperability Oracle
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[144]  arXiv:2111.10153 [pdf, other]
Title: Blockchain for Genomics: A Systematic Literature Review
Comments: Literature review updated to cover recently published papers on blockchain and genomics
Subjects: Cryptography and Security (cs.CR)
[145]  arXiv:2111.10226 [pdf, ps, other]
Title: An Alternative Approach for Computing Discrete Logarithms in Compressed SIDH
Comments: 20 pages
Subjects: Cryptography and Security (cs.CR)
[146]  arXiv:2111.10280 [pdf, ps, other]
Title: A Hybrid Approach for an Interpretable and Explainable Intrusion Detection System
Comments: 11 pages, 5 figures, 1 table, ISDA conference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[147]  arXiv:2111.10400 [pdf, other]
Title: RacketStore: Measurements of ASO Deception in Google Play via Mobile and App Usage
Journal-ref: ACM IMC Internet Measurement Conference (2021)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Social and Information Networks (cs.SI)
[148]  arXiv:2111.10458 [pdf, other]
Title: INCHE: High-Performance Encoding for Relational Databases through Incrementally Homomorphic Encryption
Authors: Dongfang Zhao
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[149]  arXiv:2111.10491 [pdf, other]
Title: Malicious Selling Strategies in E-Commerce Livestream: A Case Study of Alibaba's Taobao and ByteDance's TikTok
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[150]  arXiv:2111.10642 [pdf, other]
Title: TOUCAN: A proTocol tO secUre Controller Area Network
Subjects: Cryptography and Security (cs.CR)
[151]  arXiv:2111.10645 [pdf, other]
Title: You Overtrust Your Printer
Subjects: Cryptography and Security (cs.CR)
[152]  arXiv:2111.10753 [pdf, other]
Title: Secure Linear Aggregation Using Decentralized Threshold Additive Homomorphic Encryption For Federated Learning
Subjects: Cryptography and Security (cs.CR)
[153]  arXiv:2111.10876 [pdf, ps, other]
Title: Domain Page-Table Isolation
Subjects: Cryptography and Security (cs.CR)
[154]  arXiv:2111.10991 [pdf, other]
Title: Backdoor Attack through Frequency Domain
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[155]  arXiv:2111.11000 [pdf, other]
Title: PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks
Journal-ref: IEEE Transactions on Dependable and Secure Computing, 2023
Subjects: Cryptography and Security (cs.CR)
[156]  arXiv:2111.11157 [pdf, other]
Title: NTD: Non-Transferability Enabled Backdoor Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[157]  arXiv:2111.11158 [pdf, other]
Title: Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability
Comments: 18 Pages, 9 Figures, 1 Table Conference
Subjects: Cryptography and Security (cs.CR)
[158]  arXiv:2111.11161 [pdf, other]
Title: Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security
Comments: 17 Pages, 3 Tables, 7 Figures, Conference
Subjects: Cryptography and Security (cs.CR)
[159]  arXiv:2111.11169 [pdf, other]
Title: Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages
Comments: To appear in USENIX Security Symposium 2023
Subjects: Cryptography and Security (cs.CR)
[160]  arXiv:2111.11390 [pdf, other]
Title: Survey of Control-Flow Integrity Techniques for Embedded and Real-Time Embedded Systems
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2111.11475 [pdf, other]
Title: Threat Modeling and Security Analysis of Containers: A Survey
Subjects: Cryptography and Security (cs.CR)
[162]  arXiv:2111.11487 [pdf, other]
Title: A Comparison of State-of-the-Art Techniques for Generating Adversarial Malware Binaries
Comments: 18 pages, 7 figures; summer project report from NREIP internship at Naval Research Laboratory
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[163]  arXiv:2111.11534 [pdf, other]
Title: Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data
Comments: To appear in USENIX Security Symposium, 2022
Subjects: Cryptography and Security (cs.CR)
[164]  arXiv:2111.11612 [pdf, ps, other]
Title: Developments in Connected Vehicles and the Requirement for Increased Cybersecurity
Comments: Presented at the Irish Transport Research Network (ITRN) 2021 Conference, Limerick, Ireland. 26th & 27th August 2021. 7 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[165]  arXiv:2111.11661 [pdf, other]
Title: Optimum Noise Mechanism for Differentially Private Queries in Discrete Finite Sets
Comments: Accepted for publication in the journal Cybersecurity (this https URL)
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Systems and Control (eess.SY)
[166]  arXiv:2111.11714 [pdf, other]
Title: Challenges and Opportunities in Securing the Industrial Internet of Things
Comments: 12 pages, 2 figures, published in IEEE Transactions on Industrial Informatics
Journal-ref: IEEE Transactions on Industrial Informatics 17 (5), 2985-2996, 2021
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[167]  arXiv:2111.11730 [pdf, other]
Title: A Lightweight Encryption Scheme for IoT Devices in the Fog
Subjects: Cryptography and Security (cs.CR)
[168]  arXiv:2111.11732 [pdf, other]
Title: Towards an Integrated Penetration Testing Environment for the CAN Protocol
Subjects: Cryptography and Security (cs.CR)
[169]  arXiv:2111.11874 [pdf, other]
Title: Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines
Comments: Accepted - EAI MobiQuitous 2021 - 18th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[170]  arXiv:2111.11885 [pdf, other]
Title: SACRIFICE: A Secure Road Condition Monitoring Scheme over Fog-based VANETs
Comments: 9 pages, 6 figures, 6 tables. Accepted at 14th International Conference on COMmunication Systems & NETworkS (COMSNETS 2022)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[171]  arXiv:2111.11932 [pdf, other]
Title: Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception
Journal-ref: 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[172]  arXiv:2111.11933 [pdf, other]
Title: Disentangling Decentralized Finance (DeFi) Compositions
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[173]  arXiv:2111.12026 [pdf, other]
Title: CINNAMON: A Module for AUTOSAR Secure Onboard Communication
Journal-ref: G. Bella, P. Biondi, G. Costantino and I. Matteucci, "CINNAMON: A Module for AUTOSAR Secure Onboard Communication," 2020 16th European Dependable Computing Conference (EDCC), 2020, pp. 103-110
Subjects: Cryptography and Security (cs.CR)
[174]  arXiv:2111.12027 [pdf, other]
Title: Privacy and modern cars through a dual lens
Journal-ref: G. Bella, P. Biondi, M. D. Vincenzi and G. Tudisco, "Privacy and modern cars through a dual lens," 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2021, pp. 136-143
Subjects: Cryptography and Security (cs.CR)
[175]  arXiv:2111.12197 [pdf, other]
Title: Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the Age of AI-NIDS
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[176]  arXiv:2111.12241 [pdf, other]
Title: Hierarchical Federated Learning based Anomaly Detection using Digital Twins for Smart Healthcare
Subjects: Cryptography and Security (cs.CR)
[177]  arXiv:2111.12257 [pdf, ps, other]
Title: Post-Quantum Zero Knowledge, Revisited (or: How to Do Quantum Rewinding Undetectably)
Comments: 96 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[178]  arXiv:2111.12321 [pdf, other]
Title: SASH: Efficient Secure Aggregation Based on SHPRG For Federated Learning
Comments: 6 pages, 3 figures. The 38th Conference on Uncertainty in Artificial Intelligence. 2022
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[179]  arXiv:2111.12323 [pdf, other]
Title: Information Dispersal with Provable Retrievability for Rollups
Subjects: Cryptography and Security (cs.CR)
[180]  arXiv:2111.12332 [pdf, other]
Title: Longest Chain Consensus Under Bandwidth Constraint
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[181]  arXiv:2111.12372 [pdf, other]
Title: Privacy-Preserving Biometric Matching Using Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR)
[182]  arXiv:2111.12423 [pdf, other]
Title: xFuzz: Machine Learning Guided Cross-Contract Fuzzing
Comments: IEEE Transactions on Dependable and Secure Computing (2022)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[183]  arXiv:2111.12434 [pdf, other]
Title: The Evolving Path of "the Right to Be Left Alone" - When Privacy Meets Technology
Authors: Michela Iezzi
Comments: Accepted at IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications 2021 (IEEE TPS-ISA 2021)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[184]  arXiv:2111.12456 [pdf, other]
Title: SoK: Untangling File-based Encryption on Mobile Devices
Subjects: Cryptography and Security (cs.CR)
[185]  arXiv:2111.12472 [pdf, other]
Title: COVID-19 vaccination certificates in the Darkweb
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[186]  arXiv:2111.12528 [pdf, ps, other]
Title: Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
Subjects: Cryptography and Security (cs.CR)
[187]  arXiv:2111.12629 [pdf, other]
Title: WFDefProxy: Modularly Implementing and Empirically Evaluating Website Fingerprinting Defenses
Subjects: Cryptography and Security (cs.CR)
[188]  arXiv:2111.12746 [pdf, other]
Title: Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-code Files
Comments: To appear in IEEE Embedded Systems Letters
Subjects: Cryptography and Security (cs.CR)
[189]  arXiv:2111.12809 [pdf, ps, other]
Title: SoK: Plausibly Deniable Storage
Subjects: Cryptography and Security (cs.CR)
[190]  arXiv:2111.12965 [pdf, other]
Title: Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[191]  arXiv:2111.13149 [pdf, ps, other]
Title: A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection
Comments: 16 pages, 12 tables, 4 figures, FPS 2021 conference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[192]  arXiv:2111.13172 [pdf, ps, other]
Title: Security Threats and Cellular Network Procedures for Unmanned Aircraft Systems
Subjects: Cryptography and Security (cs.CR)
[193]  arXiv:2111.13189 [pdf, other]
Title: Humanode Whitepaper: You are [not] a bot
Subjects: Cryptography and Security (cs.CR)
[194]  arXiv:2111.13248 [pdf, ps, other]
Title: Heuristic Search of (Semi-)Bent Functions based on Cellular Automata
Comments: 29 pages, 2 figures, 2 tables, preprint submitted to Natural Computing
Subjects: Cryptography and Security (cs.CR)
[195]  arXiv:2111.13425 [pdf, other]
Title: Keep It Unbiased: A Comparison Between Estimation of Distribution Algorithms and Deep Learning for Human Interaction-Free Side-Channel Analysis
Subjects: Cryptography and Security (cs.CR)
[196]  arXiv:2111.13436 [pdf, ps, other]
Title: Towards a Secure and Reliable IT-Ecosystem in Seaports
Comments: Presented at the 29th Conference of the International Association of Maritime Economists, Rotterdam, November 2021
Subjects: Cryptography and Security (cs.CR)
[197]  arXiv:2111.13484 [pdf, ps, other]
Title: RLWE/PLWE equivalence for the maximal totally real subextension of the $2^rpq$-th cyclotomic field
Subjects: Cryptography and Security (cs.CR)
[198]  arXiv:2111.13525 [pdf, other]
Title: CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively
Comments: arXiv admin note: substantial text overlap with arXiv:2004.06911
Journal-ref: in IEEE Transactions on Network and Service Management, vol. 18, no. 3, pp. 3064-3078, Sept. 2021
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[199]  arXiv:2111.13538 [pdf, other]
Title: Fabric-SCF: A Blockchain-based Secure Storage and Access Control Scheme for Supply Chain Finance
Subjects: Cryptography and Security (cs.CR)
[200]  arXiv:2111.13597 [pdf, other]
Title: Graph-based Solutions with Residuals for Intrusion Detection: the Modified E-GraphSAGE and E-ResGAT Algorithms
Comments: 11 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[201]  arXiv:2111.13683 [pdf, other]
Title: A Survey of Blockchain Data Management Systems
Comments: 29 pages, 4 Postscript figures; This manuscript has been submitted to TECS and is under review
Subjects: Cryptography and Security (cs.CR)
[202]  arXiv:2111.13862 [pdf, other]
Title: The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World
Comments: IEEE Internet of Things Journal, May 2021
Subjects: Cryptography and Security (cs.CR)
[203]  arXiv:2111.13894 [pdf, other]
Title: Evading Malware Analysis Using Reverse Execution
Subjects: Cryptography and Security (cs.CR)
[204]  arXiv:2111.13910 [pdf, ps, other]
Title: Assessing the Effectiveness of YARA Rules for Signature-Based Malware Detection and Classification
Authors: Adam Lockett
Comments: 4 pages, 1 figure, 2 tables
Subjects: Cryptography and Security (cs.CR)
[205]  arXiv:2111.13978 [pdf, other]
Title: Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[ total of 338 entries: 1-100 | 6-105 | 106-205 | 206-305 | 306-338 ]
[ showing 100 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2405, contact, help  (Access key information)