default search action
4th CNS 2016: Philadelphia, PA, USA
- 2016 IEEE Conference on Communications and Network Security, CNS 2016, Philadelphia, PA, USA, October 17-19, 2016. IEEE 2016, ISBN 978-1-5090-3065-1
- Yanyan Li, Mengjun Xie, Jiang Bian:
SEGAUTH: A segment-based approach to behavioral biometric authentication. 1-9 - Eunsang Cho, Minkyung Park, Ted Taekyoung Kwon:
TwinPeaks: A new approach for certificateless public key distribution. 10-18 - Sandeep Pisharody, Ankur Chowdhary, Dijiang Huang:
Security policy checking in distributed SDN based clouds. 19-27 - Kuan-yin Chen, Anudeep Reddy Junuthula, Ishant Kumar Siddhrau, Yang Xu, H. Jonathan Chao:
SDNShield: Towards more comprehensive defense against DDoS attacks on SDN control plane. 28-36 - Wei Peng, Tianchong Gao, Devkishen Sisodia, Tanay Kumar Saha, Feng Li, Mohammad Al Hasan:
ACTS: Extracting Android App topologiCal signature through graphleT Sampling. 37-45 - Bahman Rashidi, Carol J. Fung:
XDroid: An Android permission control using Hidden Markov chain and online learning. 46-54 - Longfei Wu, Benjamin Brandt, Xiaojiang Du, Bo Ji:
Analysis of clickjacking attacks and an effective defense scheme for Android devices. 55-63 - Xiaoyan Sun, Jun Dai, Peng Liu, Anoop Singhal, John Yen:
Towards probabilistic identification of zero-day attack paths. 64-72 - Chengyu Zheng, Mila Dalla Preda, Jorge Granjal, Stefano Zanero, Federico Maggi:
On-chip system call tracing: A feasibility study and open prototype. 73-81 - Allen T. Webb, A. L. Narasima Reddy:
Finding proxy users at the service using anomaly detection. 82-90 - Liangxiao Xin, David Starobinski, Guevara Noubir:
Cascading denial of service attacks on Wi-Fi networks. 91-99 - Monireh Dabaghchian, Amir Alipour-Fanid, Kai Zeng, Qingsi Wang:
Online learning-based optimal primary user emulation attacks in cognitive radio networks. 100-108 - Amr Abdelaziz, Can Emre Koksal, Hesham El Gamal:
On the security of Angle of Arrival estimation. 109-117 - Hanif Rahbari, Marwan Krunz:
Rolling preambles: Mitigating stealthy FO estimation attacks in OFDM-based 802.11 systems. 118-126 - Amirali Sanatinia, Guevara Noubir:
Honey Onions: A framework for characterizing and identifying misbehaving Tor HSDirs. 127-135 - Per A. Hallgren, Martín Ochoa, Andrei Sabelfeld:
MaxPace: Speed-constrained location queries. 136-144 - Jian Lin, Dejun Yang, Ming Li, Jia Xu, Guoliang Xue:
BidGuard: A framework for privacy-preserving crowdsensing incentive mechanisms. 145-153 - Wentao Chang, Songqing Chen:
ExtensionGuard: Towards runtime browser extension information leakage detection. 154-162 - Moreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti, Radha Poovendran:
Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters. 163-171 - Bo Tang, Jun Yan, Steven Kay, Haibo He:
Detection of false data injection attacks in smart grid under colored Gaussian noise. 172-179 - Mujahid Mohsin, Zahid Anwar, Ghaith Husari, Ehab Al-Shaer, Mohammad Ashiqur Rahman:
IoTSAT: A formal framework for security analysis of the internet of things (IoT). 180-188 - Jason Gionta, William Enck, Per Larsen:
Preventing kernel code-reuse attacks through disclosure resistant code diversification. 189-197 - Sridhar Venkatesan, Massimiliano Albanese, Kareem Amin, Sushil Jajodia, Mason Wright:
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures. 198-206 - Marcus Märtens, Hadi Asghari, Michel van Eeten, Piet Van Mieghem:
A time-dependent SIS-model for long-term computer worm evolution. 207-215 - Hatem Ismail, Daniel Germanus, Neeraj Suri:
Malicious peers eviction for P2P overlays. 216-224 - Steffen Haas, Shankar Karuppayah, Selvakumar Manickam, Max Mühlhäuser, Mathias Fischer:
On the resilience of P2P-based botnet graphs. 225-233 - Carsten Büttner, Sorin A. Huss:
Attribute-based authorization tickets for Car-to-X communication. 234-242 - Mohammad Ashiqur Rahman, Abdullah Al Farooq, Amarjit Datta, Ehab Al-Shaer:
Automated synthesis of resiliency configurations for cyber networks. 243-251 - Candace Suh-Lee, Ju-Yeon Jo, Yoohwan Kim:
Text mining for security threat detection discovering hidden information in unstructured log messages. 252-260 - Curtis R. Taylor, Craig A. Shue:
Validating security protocols with cloud-based middleboxes. 261-269 - Azeem Aqil, Ahmed Osama Fathy Atya, Srikanth V. Krishnamurthy, Paul L. Yu, Ananthram Swami, Jeff Rowe, Karl N. Levitt, Alexander Poylisher, Constantin Serban, Ritu Chadha:
Automated cross layer feature selection for effective intrusion detection in networked systems. 270-278 - Emmanouil Vasilomanolakis, Michael Stahn, Carlos Garcia Cordero, Max Mühlhäuser:
On probe-response attacks in Collaborative Intrusion Detection Systems. 279-286 - Christian Doerr, Mourad el Maouchi, Sille Kamoen, Jarno Moree:
Scan prediction and reconnaissance mitigation through commodity graphics cards. 287-295 - Ross K. Gegan, Vishal Ahuja, John D. Owens, Dipak Ghosal:
Real-time GPU-based timing channel detection using entropy. 296-305 - Yao Pan, Jules White, Yu Sun:
Assessing the threat of web worker distributed attacks. 306-314 - Dakun Shen, Ian D. Markwood, Dan Shen, Yao Liu:
Virtual Safe: Unauthorized movement detection for mobile devices. 315-323 - Depeng Li, Rui Zhang:
A framework to mitigate airliner risk in air traffic management. 324-332 - Tao Li, Rui Zhang, Yanchao Zhang:
PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access control. 333-341 - Rui Lu, Derek Chi-Wai Pao:
Optimized Aho-Corasick string matching algorithm for smart phones. 342-343 - Mee Lan Han, Hee Chan Han, Ah Reum Kang, Byung Il Kwak, Aziz Mohaisen, Huy Kang Kim:
WHAP: Web-hacking profiling using Case-Based Reasoning. 344-345 - Luping Zhang, Hong Wen, Huanhuan Song, Jie Tang, Yixin Jiang, Weihua Dong, Xiping Zhu:
The performance of the MIMO physical layer security system with imperfect CSI. 346-347 - Jinling Zhang, Hong Wen, Huanhuan Song, Yixin Jiang, Zhengguang Zhang, Luping Zhang, Xiping Zhu:
Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System. 348-349 - Zhengguang Zhang, Hong Wen, Huanhuan Song, Yixin Jiang, Jinling Zhang, Xiping Zhu:
A MIMO cross-layer secure communication scheme based on spatial modulation. 350-351 - Wenqian Yu, Weigang Li, Junyuan Wang, Changzheng Wei:
A study of HSM based key protection in encryption file system. 352-353 - Ah Reum Kang, Aziz Mohaisen:
Transparency of the new gTLD's centralized zone data service: A measurement study. 354-355 - Julian Chukwu, Ose Osamudiamen, Ashraf Matrawy:
IDSaaS in SDN: Intrusion Detection System as a service in software defined networks. 356-357 - Ah Reum Kang, Aziz Mohaisen:
Assessing DNS privacy under partial deployment of special-use Domain Names. 358-359 - Jeffrey Spaulding, Ah Reum Kang, Shambhu J. Upadhyaya, Aziz Mohaisen:
A user study of the effectiveness of typosquatting techniques. 360-361 - Ah Reum Kang, Aziz Mohaisen:
Automatic alerts annotation for improving DDoS mitigation systems. 362-363 - Daniel T. Martinez, Claire M. Cochrane, Chiu C. Tan:
Encryption-based privacy protection for police body-worn cameras. 364-365 - Yifan Tian, Jiawei Yuan, Shucheng Yu:
SBPA: Social behavior based cross Social Network phishing attacks. 366-367 - Jianli Huang, Yixin Jiang, Aidong Xu, Hong Wen, Huajun Chen, Xiaobin Guo, Zewu Guan, Zhiming Wang:
Joint beamforming and antenna subarray formation for secrecy capacity maximization in MIMO wiretap channels. 368-369 - Hassan Takabi:
Firewall for brain: Towards a privacy preserving ecosystem for BCI applications. 370-371 - Diana K. Anguiano Cervantes, Ghouri Mohammad Saaduddin, Yanyan Li, Mengjun Xie:
Comparison between fingerprint and behavioral biometric authentication using 2D and 3D gestures. 372-373 - Jonathan Ming, Mengjun Xie:
Remote live forensics for Android devices. 374-375 - Pooria Madani, Natalija Vlajic:
Towards sequencing malicious system calls. 376-377 - Brandon Dalton, Nitin Agarwal:
Analyzing deviant behaviors on social media using cyber forensics-based methodologies. 378-379 - Antwane Lewis, Yanyan Li, Mengjun Xie:
Real time motion-based authentication for smartwatch. 380-381 - Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac:
A framework for counterfeit smart grid device detection. 382-383 - Shan Suthaharan, Weining Shen:
Pairing of most relevant variables and bootstrap samples with ridge regression for data sharing. 384-385 - Mustafa Faisal, Alvaro A. Cárdenas, Avishai Wool:
Modeling Modbus TCP for intrusion detection. 386-390 - Parth Pradhan, Kyatsandra G. Nagananda, Parv Venkitasubramaniam, Shalinee Kishore, Rick S. Blum:
GPS spoofing attack characterization and detection in smart grids. 391-395 - Huan Yang, Liang Cheng, Mooi Choo Chuah:
Evaluation of utility-privacy trade-offs of data manipulation techniques for smart metering. 396-400 - Spencer Michaels, Kemal Akkaya, A. Selcuk Uluagac:
Inducing data loss in Zigbee networks via join/association handshake spoofing. 401-405 - Key-whan Chung, Valerio Formicola, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Alexander Withers, Adam J. Slagell:
Attacking supercomputers through targeted alteration of environmental control: A data driven case study. 406-410 - Woo-Hyun Ko, Bharadwaj Satchidanandan, P. R. Kumar:
Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems. 416-420 - Vivek Venugopalan, Cameron D. Patterson, Devu Manikantan Shila:
Detecting and thwarting hardware trojan attacks in cyber-physical systems. 421-425 - Shan Suthaharan:
A correlation-based subspace analysis for data confidentiality and classification as utility in CPS. 426-431 - SeongHan Shin, Kazukuni Kobara, Chia-Chuan Chuang, Weicheng Huang:
A security framework for MQTT. 432-436 - Brian Thompson, James R. Morris-King, Hasan Cam:
Effectiveness of proactive reset for mitigating impact of stealthy attacks on networks of autonomous systems. 437-441 - Nadim Badra, Jiaxin Yang, Ioannis N. Psaromiligkos, Benoît Champagne:
Robust and secure beamformer design for MIMO relaying with imperfect eavesdropper CSI. 442-449 - Zhexiong Wei, F. Richard Yu, Helen Tang, Chengehao Liang, Qiao Yan:
Securing cognitive radio vehicular Ad hoc networks with trusted lightweight cloud computing. 450-456 - Madushanka Soysa, Pamela C. Cosman, Laurence B. Milstein:
Video cognitive radio networks for tactical scenarios. 457-464 - Danda B. Rawat:
Analyzing energy efficient physical layer security in large-scale MIMO enabled CRN with QoS requirements. 465-471 - Yi Shi, Yalin E. Sagduyu:
Spectrum learning and access for cognitive satellite communications under jamming. 472-479 - Siddhant Deshmukh, Henry Carter, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler:
Efficient and secure template blinding for biometric authentication. 480-488 - Luan Huy Pham, Massimiliano Albanese, Sridhar Venkatesan:
A quantitative risk assessment framework for adaptive Intrusion Detection in the cloud. 489-497 - Eddy Caron, Arnaud Lefray, Jonathan Rouzaud-Cornabas:
Secured systems in Clouds with Model-Driven Orchestration. 498-506 - Florian Reimair, Bernd Prünster, Andreas Reiter, Christian Ertler:
Applied dynamic policy selection. 507-515 - Kevin Walsh:
TLS with trustworthy certificate authorities. 516-524 - Dominik Leibenger, Jonas Fortmann, Christoph Sorge:
EncFS goes multi-user: Adding access control to an encrypted file system. 525-533 - Giovanni Di Crescenzo:
Server-assisted fully homomorphic computation protocols. 534-542 - Florian Reimair, Christian Kollmann, Alexander Marsalek:
Emulating U2F authenticator devices. 543-551 - Lucas Schabhüser, Denise Demirel, Johannes Buchmann:
An unconditionally hiding auditing procedure for computations over distributed data. 552-560 - Shashank Arora, Gaurav Varshney, Pradeep K. Atrey, Manoj Mishra:
SecureCEdit: An approach for secure cloud-based document editing. 561-564 - Andrea Huszti, Norbert Olah:
A simple authentication scheme for clouds. 565-569 - M. Tarek Ibn Ziad, Amr Al-Anwar, Moustafa Alzantot, Mani B. Srivastava:
CryptoImg: Privacy preserving processing over encrypted images. 570-575 - Xiaoqi Yu, Nairen Cao, Jun Zhang, Siu-Ming Yiu:
Dynamic Proofs of Retrievability with improved worst case overhead. 576-580 - Kemal Bicakci, Davut Deniz Yavuz, Sezin Gurkan:
TwinCloud: Secure cloud sharing without explicit key management. 581-585 - Eric Asselin, Carlos Aguilar Melchor, Gentian Jakllari:
Anomaly detection for web server log reduction: A simple yet efficient crawling based approach. 586-590 - Ahmed S. Bendary, Yahya Z. Mohasseb, Hisham Dahshan:
On the secure Degrees of Freedom for the K-user symmetric MIMO Wiretap MAC channel. 591-595 - Wade Trappe, Andrey Garnaev:
Bargaining over secrecy and reliability for low SNR OFDM communications. 596-600 - Jaume del Olmo, Javier Rodríguez Fonollosa:
Strong secrecy on a class of Degraded Broadcast Channels using polar codes. 601-605 - Abdallah Fayed, Tamer Khattab, Lifeng Lai:
On secure communication over the Z-Channel. 606-610 - Ahmed S. Mansour, Holger Boche, Rafael F. Schaefer:
List decoding for arbitrarily varying wiretap channels. 611-615 - Moritz Wiese, Tobias J. Oechtering:
Secure distributed estimation of linear systems. 616-620 - Ahmed A. Zewail, Aylin Yener:
Coded caching for resolvable networks with security requirements. 621-625 - Pritam Mukherjee, Sennur Ulukus:
Covert bits through queues. 626-630 - Paul L. Yu, Jake B. Perazzone, Brian M. Sadler, Rick S. Blum:
Authenticated side channel via physical layer fingerprinting. 631-635 - Xuanxuan Wang, Rafael F. Schaefer, Lars Thiele, Thomas Haustein, Yongming Wang:
Ergodic secrecy sum rate for multiuser MIMO downlink systems using block diagonalization. 636-640 - Wenwen Tu, Mario Goldenbaum, Lifeng Lai, H. Vincent Poor:
Multiple key generation with restricted public discussion structure. 641-645
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.