长垣产业园区科技文献服务平台

会议文集


文集名Computer Security - ESORICS 2023
会议名28th European Symposium on Research in Computer Security (ESORICS 2023)
中译名《第二十八届欧洲计算机安全研究专题研讨会,卷2》
会议日期September 25-29, 2023
会议地点The Hague, The Netherlands
出版年2024
馆藏号350877


题名作者出版年
Time Will Tell: Exploiting Timing Leaks Using HTTP Response HeadersVik Vanderlinden; Tom Van Goethem; Mathy Vanhoef2024
Peering into the Darkness: The Use of UTRS in Combating DDoS AttacksRadu Anghel; Swaathi Vetrivel; Elsa Turcios Rodriguez; Kaichi Sameshima; Daisuke Makita; Katsunari Yoshioka; Carlos Ganan; Yury Zhauniarovich2024
Protocol Dialects as Formal PatternsD. Galan; V. Garcia; S. Escobar; C. Meadows; J. Meseguer2024
ResolFuzz: Differential Fuzzing of DNS ResolversJonas Bushart; Christian Rossow2024
Fingerprinting of Cellular Infrastructure Based on Broadcast InformationAnup Kiran Bhattacharjee; Stefano Cecconello; Fernando Kuipers; Georgios Smaragdakis2024
One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion DetectionKonrad Wolsing; Dominik Kus; Eric Wagner; Jan Pennekamp; Klaus Wehrle; Martin Henze2024
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event MonitoringMd Nazmul Hoq; Jia Wei Yao; Suryadipta Majumdar; Luis Suarez; Lingyu Wang; Amine Boukhtouta; Makan Pourzandi; Mourad Debbabi2024
PrivMail: A Privacy-Preserving Framework for Secure EmailsGowri R. Chandran; Raine Nieminen; Thomas Schneider; Ajith Suresh2024
Towards Efficient Privacy-Preserving Deep Packet InspectionWeicheng Wang; Hyunwoo Lee; Yan Huang; Elisa Bertino; Ninghui Li2024
PANINI - Anonymous Anycast and an InstantiationChristoph Coijanovic; Christiane Weis; Thorsten Strufe2024
Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate ValidationYajun Teng; Wei Wang; Jun Shao; Huiqing Wan; Heqing Huang; Yong Liu; Jingqiang Lin2024
Malware Classification Using Open Set Recognition and HTTP Protocol RequestsPiotr Bialczak; Wojciech Mazurczyk2024
Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware DetectionYifan Xia; Ping He; Xuhong Zhang; Peiyu Liu; Shouling Ji; Wenhai Wang2024
A New Model for Testing IPv6 Fragment HandlingEdoardo Di Paolo; Enrico Bassetti; Angelo Spognardi2024
Trajectory Hiding and Sharing for Supply Chains with Differential PrivacyTianyu Li; Li Xu; Zekeriya Erkin; Reginald L. Lagendijk2024
A User-Centric Approach to API Delegations: Enforcing Privacy Policies on OAuth DelegationsShirin Kalantari; Pieter Philippaerts; Yana Dimova; Danny Hughes; Wouter Joosen; Bart De Decker2024
Traffic Analysis by Adversaries with Partial VisibilityIness Ben Guirat; Claudia Diaz; Karim Eldefrawy; Hadas Zeilberger2024
Learning Markov Chain Models from Sequential Data Under Local Differential PrivacyEfehan Guner; M. Emre Gursoy2024
Achilles' Heels: Vulnerable Record Identification in Synthetic Data PublishingMatthieu Meeus; Florent Guepin; Ana-Maria Cretu; Yves-Alexandre de Montjoye2024
Enforcing the GDPRFrancois Hublet; David Basin; Srdan Krstic2024
12