Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- surveySeptember 2024JUST ACCEPTED
Survey on Quality Assurance of Smart Contracts
ACM Computing Surveys (CSUR), Just Accepted https://doi.org/10.1145/3695864As blockchain technology continues to advance, the secure deployment of smart contracts has become increasingly prevalent, underscoring the critical need for robust security measures. This surge in usage has led to a rise in security breaches, often ...
- research-articleSeptember 2024
Smart and Digital Healthcare. Advanced Technologies and Security Issues
CEEeGov '24: Proceedings of the Central and Eastern European eDem and eGov Days 2024September 2024, Pages 288–294https://doi.org/10.1145/3670243.3673857Smart and Digital healthcare is governed by ICT (Information and Communication Technology) and uses interconnected devices through communication networks to manage medical data, monitor patient status, manage hospitals and interact with government ...
- research-articleSeptember 2024
Improved Security for Multimedia Data Visualization using Hierarchical Clustering Algorithm
- Shitharth S.,
- Hariprasath Manoharan,
- Alaa O. Khadidos,
- Achyut Shankar,
- Carsten Maple,
- Adil O. Khadidos,
- Shahid Mumtaz
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 20, Issue 11Article No.: 335, Pages 1–21https://doi.org/10.1145/3610296In this paper, a realization technique is designed with a unique analytical model for transmitting multimedia data to appropriate end users. Transmission of multimedia data to all end users through a variety of visualization methods is the foundation of ...
- research-articleSeptember 2024
Robust Copyright Protection Technique with High-embedding Capacity for Color Images
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 20, Issue 11Article No.: 334, Pages 1–12https://doi.org/10.1145/3580502Copyright violation issues have a growing impact on applications of the digital era, especially images. It is not easy to guarantee the copyright protection of essential information. This paper presents a robust copyright protection technique with high ...
- ArticleSeptember 2024
Malware Detection Among Contact Tracing Apps with Deep Learning
Computational Collective IntelligenceSep 2024, Pages 137–150https://doi.org/10.1007/978-3-031-70819-0_11AbstractContact tracing has built into a cost-effective social tool, complementary for the prevention and containment of the coronavirus and similar pandemics. Especially these days that meningitis, influenza, but also streptococcus and respiratory ...
-
- research-articleSeptember 2024
A Survey of Ethereum Smart Contract Security: Attacks and Detection
Distributed Ledger Technologies: Research and Practice (DLT), Volume 3, Issue 3Article No.: 23, Pages 1–28https://doi.org/10.1145/3643895A smart contract is a computerised transaction agreement that carries out predefined terms without human involvement or third-party intermediaries. It serves as a trust intermediary in several industries, including finance, insurance, and supply chain ...
- research-articleSeptember 2024
`Baymax' or `RoboCop'? Exploring Different Feminine Avatar Personalities for Shared Automated Vehicles
MuC '24: Proceedings of Mensch und Computer 2024September 2024, Pages 256–268https://doi.org/10.1145/3670653.3670682Shared automated vehicles (SAVs) will offer a lot of benefits, from improving the overall mobility to environmental benefits. However, perceived security in SAVs is a major concern and may influence their acceptance and adoption negatively. To address ...
- research-articleAugust 2024
FedSecurity: A Benchmark for Attacks and Defenses in Federated Learning and Federated LLMs
- Shanshan Han,
- Baturalp Buyukates,
- Zijian Hu,
- Han Jin,
- Weizhao Jin,
- Lichao Sun,
- Xiaoyang Wang,
- Wenxuan Wu,
- Chulin Xie,
- Yuhang Yao,
- Kai Zhang,
- Qifan Zhang,
- Yuhui Zhang,
- Carlee Joe-Wong,
- Salman Avestimehr,
- Chaoyang He
KDD '24: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data MiningAugust 2024, Pages 5070–5081https://doi.org/10.1145/3637528.3671545This paper introduces FedSecurity, an end-to-end benchmark that serves as a supplementary component of the FedML library for simulating adversarial attacks and corresponding defense mechanisms in Federated Learning (FL). FedSecurity eliminates the need ...
- research-articleAugust 2024
Measuring Cyber Essentials Security Policies
CSET '24: Proceedings of the 17th Cyber Security Experimentation and Test WorkshopAugust 2024, Pages 17–26https://doi.org/10.1145/3675741.3675747The design and maintenance of high-level security policies is an important starting point governing the implementation of security controls for a business. The choice of which security controls to implement is inherently a cost-benefit analysis that ...
- research-articleAugust 2024
A Dynamic Threat Prevention Framework for Autonomous Vehicle Networks based on Ruin-theoretic Security Risk Assessment
ACM Journal on Autonomous Transportation Systems (JATS), Volume 1, Issue 4Article No.: 22, Pages 1–28https://doi.org/10.1145/3660527In recent years, Autonomous Vehicle Networks (AVNs) have gained significant attention for their potential to make transportation safer and more efficient. These networks rely on Vehicle-to-Vehicle (V2V) communication to exchange critical information, such ...
- research-articleSeptember 2024
X-IMM: Mixed-Signal Iterative Montgomery Modular Multiplication
ISLPED '24: Proceedings of the 29th ACM/IEEE International Symposium on Low Power Electronics and DesignAugust 2024, Pages 1–6https://doi.org/10.1145/3665314.3670849In this paper, we present a mixed-signal implementation of iterative Montgomery multiplication algorithm (called X-IMM) for using in large arithmetic word size (LAWS) computations. LAWS is mainly utilized in security applications such as lattice-based ...
- ArticleAugust 2024
PBIM: Paired Backdoor Injection Method for Change Detection
Advanced Intelligent Computing Technology and ApplicationsAug 2024, Pages 331–343https://doi.org/10.1007/978-981-97-5588-2_28AbstractRecent studies on backdoor attack have demonstrated that classification, object detection, and segmentation models are vulnerable when facing malicious attacks. However, the destructiveness of backdoor attack has not been explored in change ...
- research-articleJuly 2024
Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments
- Mohammad Reza Nosouhi,
- Zubair Baig,
- Robin Doss,
- Divyans Mahansaria,
- Debi Prasad Pati,
- Praveen Gauravaram,
- Lei Pan,
- Keshav Sood
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityJuly 2024, Article No.: 145, Pages 1–11https://doi.org/10.1145/3664476.3671411Implementing strong authentication methods in a network requires stable connectivity between the service providers deployed within the network (i.e., applications that users of the network need to access) and the Identity and Access Management (IAM) ...
- research-articleJuly 2024
Modeling Human Error Factors with Security Incidents in Industrial Control Systems: A Bayesian Belief Network Approach
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityJuly 2024, Article No.: 53, Pages 1–9https://doi.org/10.1145/3664476.3670875Industrial Control Systems (ICSs) are critical in automating and controlling industrial processes. Human errors within ICSs can significantly impact the system’s underlying processes and users’ safety. Thus, it is essential to understand the factors ...
- research-articleJuly 2024
SECURA: Unified Reference Architecture for Advanced Security and Trust in Safety Critical Infrastructures
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityJuly 2024, Article No.: 9, Pages 1–13https://doi.org/10.1145/3664476.3664513In the evolving landscape of safety-critical infrastructures, ensuring the integrity and security of systems has become paramount. Building upon a previously established security architecture tailored for the railway sector, this work introduces ...
- research-articleJuly 2024
SoK: How Artificial-Intelligence Incidents Can Jeopardize Safety and Security
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityJuly 2024, Article No.: 44, Pages 1–12https://doi.org/10.1145/3664476.3664510In the past years, a growing number of highly-automated systems has build on Artificial-Intelligence (AI) capabilities, for example, self-driving vehicles or predictive health-state diagnoses. As for any software system, there is a risk that misbehavior ...
- research-articleJuly 2024
A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityJuly 2024, Article No.: 4, Pages 1–12https://doi.org/10.1145/3664476.3664478HTTP client hints are a set of standardized HTTP request headers designed to modernize and potentially replace the traditional user agent string. While the user agent string exposes a wide range of information about the client’s browser and device, ...
- research-articleJuly 2024
Fighting with Firewalld: Architecting a Host-based Firewall Policy and the Challenges of Implementation
PEARC '24: Practice and Experience in Advanced Research Computing 2024: Human Powered ComputingJuly 2024, Article No.: 22, Pages 1–6https://doi.org/10.1145/3626203.3670523Host-based firewalling is an important part of a comprehensive security plan. This paper explores a robust solution that can be adapted and used at any institution, along with the challenges involved in its development. The solution implements custom ...
- surveyJuly 2024
Secure UAV (Drone) and the Great Promise of AI
ACM Computing Surveys (CSUR), Volume 56, Issue 11Article No.: 286, Pages 1–37https://doi.org/10.1145/3673225UAVs have found their applications in numerous applications from recreational activities to business in addition to military and strategic fields. However, research on UAVs is not going on as quickly as the technology. Especially, when it comes to the ...
- short-paperJuly 2024
Federated Learning Security: From Dusk to Dawn
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityJuly 2024, Page 1114https://doi.org/10.1145/3634737.3665025The evolution of machine learning (ML) as an enabling technology has opened a new era of possibilities and applications. Among these advancements, distributed learning, specifically federated learning (FL), emerges as a significant shift in collaborative ...