Vrizlynn L. L. Thing

Orcid: 0000-0003-4424-8596

According to our database1, Vrizlynn L. L. Thing authored at least 104 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Exploring Emerging Trends in 5G Malicious Traffic Analysis and Incremental Learning Intrusion Detection Strategies.
CoRR, 2024

CPE-Identifier: Automated CPE Identification and CVE Summaries Annotation with Deep Learning and NLP.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Toward a Universal and Sustainable Privacy Protection Framework.
Digit. Gov. Res. Pract., December, 2023

Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms.
Comput. Secur., May, 2023

An adversarial attack approach for eXplainable AI evaluation on deepfake detection models.
CoRR, 2023

A Public Key Infrastructure for 5G Service-Based Architecture.
CoRR, 2023

Few-shot weakly-supervised cybersecurity anomaly detection.
Comput. Secur., 2023

RAPTOR: Advanced Persistent Threat Detection in Industrial IoT via Attack Stage Correlation.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

FaceLivePlus: A Unified System for Face Liveness Detection and Face Verification.
Proceedings of the 2023 ACM International Conference on Multimedia Retrieval, 2023

Malicious Lateral Movement in 5G Core With Network Slicing And Its Detection.
Proceedings of the 33rd International Telecommunication Networks and Applications Conference, 2023

Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Towards Effective Cybercrime Intervention.
CoRR, 2022

Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study.
Comput. Secur., 2022

PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection.
Proceedings of the 7th International Conference on Internet of Things, 2022

"How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Malware Detector.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022

A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022

IEEE Big Data Cup 2022: Privacy Preserving Matching of Encrypted Images with Deep Learning.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
"How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector.
CoRR, 2021

Three decades of deception techniques in active cyber defense - Retrospect and outlook.
Comput. Secur., 2021

Clustering based opcode graph generation for malware variant detection.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Data Privacy in Multi-Cloud: An Enhanced Data Fragmentation Framework.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Intrusion Detection in Internet of Things using Convolutional Neural Networks.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

2020
A Novel Video Forgery Detection Model Based on Triangular Polarity Feature Classification.
Int. J. Digit. Crime Forensics, 2020

2019
A survey on image tampering and its detection in real-world photos.
J. Vis. Commun. Image Represent., 2019

PowerNet: Neural Power Demand Forecasting in Smart Grid.
CoRR, 2019

A scalable and extensible framework for android malware detection and family attribution.
Comput. Secur., 2019

Securing Intelligent Transportation System: A Blockchain-Based Approach with Attack Mitigation.
Proceedings of the Smart Blockchain - Second International Conference, 2019

Coverless Image Steganography Framework with Increased Payload Capacity.
Proceedings of the IEEE International Symposium on Multimedia, 2019

2018
Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic.
IEEE/ACM Trans. Netw., 2018

A semi-feature learning approach for tampered region localization across multi-format images.
Multim. Tools Appl., 2018

A survey of Android exploits in the wild.
Comput. Secur., 2018

Autonomous vehicle ultrasonic sensor vulnerability and impact assessment.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

Assisting Vulnerability Detection by Prioritizing Crashes with Incremental Learning.
Proceedings of the TENCON 2018, 2018

Progressive Control Flow Obfuscation for Android Applications.
Proceedings of the TENCON 2018, 2018

Face Spoofing Video Detection Using Spatio-Temporal Statistical Binary Pattern.
Proceedings of the TENCON 2018, 2018

Automated Botnet Traffic Detection via Machine Learning.
Proceedings of the TENCON 2018, 2018

Towards Building a Remote Anti-spoofing Face Authentication System.
Proceedings of the TENCON 2018, 2018

BIFF: A Blockchain-based IoT Forensics Framework with Identity Privacy.
Proceedings of the TENCON 2018, 2018

Predicting vulnerability discovery rate using past versions of a software.
Proceedings of the 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Singpapore, Singapore, July 31, 2018

Privacy preserving IP traceback.
Proceedings of the IEEE 4th International Conference on Identity, 2018

2017
FACT: A Framework for Authentication in Cloud-Based IP Traceback.
IEEE Trans. Inf. Forensics Secur., 2017

Insider threat detection and its future directions.
Int. J. Secur. Networks, 2017

Time-of-recording estimation for audio recordings.
Digit. Investig., 2017

Evidence gathering for network security and forensics.
Digit. Investig., 2017

REX: Resilient and efficient data structure for tracking network flows.
Comput. Networks, 2017

On Practical Issues of Electric Network Frequency Based Audio Forensics.
IEEE Access, 2017

IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification.
Proceedings of the A Systems Approach to Cyber Security, 2017

Low-Dimensional Bigram Analysis for Mobile Data Fragment Classification.
Proceedings of the A Systems Approach to Cyber Security, 2017

Chat-App Decryption Key Extraction Through Information Flow Analysis.
Proceedings of the A Systems Approach to Cyber Security, 2017

Understanding multi-layer perceptrons on spatial image steganalysis features.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

An Empirical Study on Collective Online Behaviors of Extremist Supporters.
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017

PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network.
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017

2016
Audio Authentication by Exploring the Absolute-Error-Map of ENF Signals.
IEEE Trans. Inf. Forensics Secur., 2016

Fingerprint Liveness Detection From Single Image Using Low-Level Features and Shape Analysis.
IEEE Trans. Inf. Forensics Secur., 2016

Opportunistic Piggyback Marking for IP Traceback.
IEEE Trans. Inf. Forensics Secur., 2016

Twenty years of digital audio watermarking - a comprehensive review.
Signal Process., 2016

Control flow obfuscation for Android applications.
Comput. Secur., 2016

Image Region Forgery Detection: A Deep Learning Approach.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Accurate in-network file-type classification.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Autonomous Vehicle Security: A Taxonomy of Attacks and Defences.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

2015
Cepstral Analysis for the Application of Echo-Based Audio Watermark Detection.
IEEE Trans. Inf. Forensics Secur., 2015

Time-Spread Echo-Based Audio Watermarking With Optimized Imperceptibility and Robustness.
IEEE ACM Trans. Audio Speech Lang. Process., 2015

A hybrid evolutionary algorithm for feature and ensemble selection in image tampering detection.
Int. J. Electron. Secur. Digit. Forensics, 2015

Securing Android: A Survey, Taxonomy, and Challenges.
ACM Comput. Surv., 2015

SLIC: Self-Learning Intelligent Classifier for network traffic.
Comput. Networks, 2015

Accurate Specification for Robust Detection of Malicious Behavior in Mobile Environments.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
A Dynamic Matching Algorithm for Audio Timestamp Identification Using the ENF Criterion.
IEEE Trans. Inf. Forensics Secur., 2014

Conditional Weighted Transaction Aggregation for Credit Card Fraud Detection.
Proceedings of the Advances in Digital Forensics X, 2014

2013
Image content analysis for sector-wise JPEG fragment classification.
J. Vis. Commun. Image Represent., 2013

A Lightweight Algorithm for Automated Forum Information Processing.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Content-centric Age and Gender Profiling Notebook for PAN at CLEF 2013.
Proceedings of the Working Notes for CLEF 2013 Conference , 2013

2012
A Generalized Links and Text Properties Based Forum Crawler.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Enhanced Dictionary Based Rainbow Table.
Proceedings of the Information Security and Privacy Research, 2012

An Improved Double Compression Detection Method for JPEG Image Forensics.
Proceedings of the 2012 IEEE International Symposium on Multimedia, 2012

Logo Classification with Edge-Based DAISY Descriptor.
Proceedings of the 2012 IEEE International Symposium on Multimedia, 2012

Using Low Level Gradient Channels for Computationally Efficient Object Detection and Its Application in Logo Detection.
Proceedings of the 2012 IEEE International Symposium on Multimedia, 2012

Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

An enhanced intelligent forum crawler.
Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 2012

2011
Content based JPEG fragmentation point detection.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

Design of a Modular Framework for Noisy Logo Classification in Fraud Detection.
Proceedings of the Security Technology, 2011

A Noise-Tolerant Enhanced Classification Method for Logo Detection and Brand Classification.
Proceedings of the Security Technology, 2011

Design of a Digital Forensics Evidence Reconstruction System for Complex and Obscure Fragmented File Carving.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Live memory forensics of mobile phones.
Digit. Investig., 2010

Virtual Expansion of Rainbow Tables.
Proceedings of the Advances in Digital Forensics VI, 2010

Optimal Path Construction for Fragmented File Carving.
Proceedings of the South African Information Security Multi-Conference, 2010

A Novel Support Vector Machine Approach to High Entropy Data Fragment Classification.
Proceedings of the South African Information Security Multi-Conference, 2010

A Novel Inequality-Based Fragmented File Carving Technique.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

2009
Locating network domain entry and exit point/path for DDoS attack traffic.
IEEE Trans. Netw. Serv. Manag., 2009

A novel time-memory trade-off method for password recovery.
Digit. Investig., 2009

Adaptive response system for distributed denial-of-service attacks.
Proceedings of the Integrated Network Management, 2009

2008
Adaptive Response System for Distributed Denial-of-Service Attacks.
PhD thesis, 2008

Network domain entrypoint/path determination for DDoS attacks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

2007
A Survey of Bots Used for Distributed Denial of Service Attacks.
Proceedings of the New Approaches for Security, 2007

Non-intrusive IP traceback for DDoS attacks.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2005
Traffic Redirection Attack Protection System (TRAPS) - A Full-Fledged Adaptive DoS/DDoS Attack Mitigation Scheme.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

2004
Bandwidth-efficient WDM channel allocation for four-wave mixing-effect minimization.
IEEE Trans. Commun., 2004

2003
Performance Evaluation of Hop-by-Hop Local Mobility Agents Probing for Mobile IPv6.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

On the Issues of IP Traceback for IPv6 and Mobile IPv6.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

A local mobility agent selection algorithm for mobile networks.
Proceedings of IEEE International Conference on Communications, 2003

2002
Designs and analysis of local mobility agents discovery, selection and failure detection for Mobile IPv6.
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002


  Loading...