skip to main content
Volume 5, Issue 2June 2024Current Issue
Editor:
  • A. Lakhotia,
  • Leigh Metcalf
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
EISSN:2576-5337
Bibliometrics
Skip Table Of Content Section
SECTION: Special Issue on ACSAC 2022
introduction
Open Access
Introduction to the ACSAC’22 Special Issue
Article No.: 13, Pages 1–2https://doi.org/10.1145/3659210
research-article
Open Access
Spacelord: Private and Secure Smart Space Sharing
Article No.: 14, Pages 1–27https://doi.org/10.1145/3637879

Space sharing services like vacation rentals and meeting rooms are being equipped with smart devices such as cameras, door locks and many other sensors. However, the sharing of such devices poses privacy and security problems, as there is typically no ...

research-article
Open Access
Unveiling the Threat: Investigating Distributed and Centralized Backdoor Attacks in Federated Graph Neural Networks
Article No.: 15, Pages 1–29https://doi.org/10.1145/3633206

Graph neural networks (GNNs) have gained significant popularity as powerful deep learning methods for processing graph data. However, centralized GNNs face challenges in data-sensitive scenarios due to privacy concerns and regulatory restrictions. ...

research-article
Open Access
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors Using Machine Learning
Article No.: 16, Pages 1–51https://doi.org/10.1145/3638253

Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks that break every ML model or defenses that withstand most attacks. Unfortunately, little consideration is given to the actual feasibility of the attack or the ...

SECTION: Regular Papers
research-article
Open Access
Counter Measures to Combat Money Laundering in the New Digital Age
Article No.: 17, Pages 1–13https://doi.org/10.1145/3626826

Money Laundering has been a significant concern for governments, law enforcement agencies, and financial institutions worldwide. With the advancement of technology, money laundering techniques have evolved in the digital age, presenting new challenges for ...

research-article
Open Access
A Survey on Network Attack Surface Mapping
Article No.: 18, Pages 1–25https://doi.org/10.1145/3640019

Network services are processes running on a system with network exposure. A key activity for any network defender, penetration tester, or red team is network attack surface mapping, the act of detecting and categorizing those services through which a ...

research-article
Open Access
A Machine Learning and Optimization Framework for Efficient Alert Management in a Cybersecurity Operations Center
Article No.: 19, Pages 1–23https://doi.org/10.1145/3644393

Cybersecurity operations centers (CSOCs) protect organizations by monitoring network traffic and detecting suspicious activities in the form of alerts. The security response team within CSOCs is responsible for investigating and mitigating alerts. However,...

research-article
Open Access
Web Application Security: A Pragmatic Exposé
Article No.: 20, Pages 1–9https://doi.org/10.1145/3644394

Many individuals, organizations, and industries rely on web applications for the daily operations of their businesses. With the increasing deployment and dependence on these applications, significant attention has been directed toward developing more ...

Subjects

Comments