default search action
2nd CNS 2014: San Francisco, CA, USA
- IEEE Conference on Communications and Network Security, CNS 2014, San Francisco, CA, USA, October 29-31, 2014. IEEE 2014
- Louis Sibomana, Hans-Jürgen Zepernick, Hung Tran:
Achievable secrecy capacity in an underlay cognitive radio network. 1-6 - C. Carlson, Vieny Nguyen, Seth D. Hitefield, Timothy J. O'Shea, T. Charles Clancy:
Measuring smart jammer strategy efficacy over the air. 7-13 - Aleksi Marttinen, Alexander M. Wyglinski, Riku Jäntti:
Moving-target defense mechanisms against source-selective jamming attacks in tactical cognitive radio MANETs. 14-20 - Yu Seung Kim, Bruce DeBruhl, Patrick Tague:
JADE: Jamming-averse routing on cognitive radio mesh networks. 21-28 - Shabnam Sodagari:
Secure distributed spectrum sensing in cognitive radio networks using multi-armed bandits. 29-34 - Andrey Garnaev, Wade Trappe:
Bandwidth scanning involving a Bayesian approach to adapting the belief of an adversary's presence. 35-43 - Zituo Jin, J. P. Morgan, Santhanakrishnan Anand, K. P. Subbalakshmi:
NEAT: A NEighbor AssisTed spectrum decision protocol for resilience against PUEA. 44-52 - Ji Wang, Ing-Ray Chen:
Trust-based data fusion mechanism design in cognitive radio networks. 53-59 - Seth D. Hitefield, Vieny Nguyen, C. Carlson, Timothy J. O'Shea, T. Charles Clancy:
Demonstrated LLC-layer attack and defense strategies for wireless communication systems. 60-66 - Changmin Lee, Luca Zappaterra, Kwanghee Choi, Hyeong-Ah Choi:
Securing smart home: Technologies, security challenges, and security requirements. 67-72 - Jana Krimmling, Steffen Peter:
Integration and evaluation of intrusion detection for CoAP in smart city applications. 73-78 - Sukhvir Notra, Muhammad Siddiqi, Hassan Habibi Gharakheili, Vijay Sivaraman, Roksana Boreli:
An experimental study of security and privacy risks with emerging household appliances. 79-84 - Suleyman Uludag, King-Shan Lui, Wenyu Ren, Klara Nahrstedt:
Practical and secure Machine-to-Machine data collection protocol in Smart Grid. 85-90 - Francisco Corella, Karen Pomian Lewison:
Identity-based protocol design patterns for machine-to-machine secure channels. 91-96 - Onur Güngör, Can Emre Koksal:
RF-fingerprint based authentication: Exponents and achievable rates. 97-102 - Xiaofan He, Huaiyu Dai, Yufan Huang, Dong Wang, Wenbo Shen, Peng Ning:
The security of link signature: A view from channel models. 103-108 - Rafael F. Schaefer, H. Vincent Poor:
On secure communication over multiple access wiretap channels under channel uncertainty. 109-114 - Willie K. Harrison, Parker Boyce:
Parity modifications and stopping sets in high-rate codes for physical-layer security. 115-120 - Pin-Hsun Lin, Eduard A. Jorswieck:
On the fading Gaussian wiretap channel with statistical channel state information at transmitter. 121-126 - Remi A. Chou, Matthieu R. Bloch:
Uniform distributed source coding for the multiple access wiretap channel. 127-132 - Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai, Yao Liu:
MCR Decoding: A MIMO approach for defending against wireless jamming attacks. 133-138 - Kan Chen, Balasubramaniam Natarajan, Steve Shattil:
Relay-based secret key generation in LTE-A. 139-144 - Chaofeng Wang, Zhaohui Wang, Saeid Nooshabadi:
Signal alignment for secure underwater coordinated multipoint transmissions. 145-150 - Saeed Ur Rehman, Kevin W. Sowerby, Shafiq Alam, Iman Tabatabaei Ardekani:
Portability of an RF fingerprint of a wireless transmitter. 151-156 - Adam L. Young, Moti Yung:
The drunk motorcyclist protocol for anonymous communication. 157-165 - Félix Iglesias, Tanja Zseby:
Modelling IP darkspace traffic by means of clustering techniques. 166-174 - AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot:
Location verification on the Internet: Towards enforcing location-aware access policies over Internet clients. 175-183 - Lujo Bauer, Shaoying Cai, Limin Jia, Timothy Passaro, Yuan Tian:
Analyzing the dangers posed by Chrome extensions. 184-192 - Jun Li, Shad Stafford:
Detecting smart, self-propagating Internet worms. 193-201 - Kexiong Curtis Zeng, Sreeraksha Kondaji Ramesh, Yaling Yang:
Location spoofing attack and its countermeasures in database-driven cognitive radio networks. 202-210 - Xiuyuan Zheng, Chen Wang, Yingying Chen, Jie Yang:
Accurate rogue access point localization leveraging fine-grained channel information. 211-219 - Longquan Li, Sencun Zhu, Don J. Torrieri, Sushil Jajodia:
Self-healing wireless networks under insider jamming attacks. 220-228 - Biru Cui, Shanchieh Jay Yang:
NRE: Suppress Selective Forwarding attacks in Wireless Sensor Networks. 229-237 - Hossen Asiful Mustafa, Wenyuan Xu:
CETAD: Detecting evil twin access point attacks in wireless hotspots. 238-246 - Elaheh Biglar Beigi Samani, Hossein Hadian Jazi, Natalia Stakhanova, Ali A. Ghorbani:
Towards effective feature selection in machine learning-based botnet detection approaches. 247-255 - Mohammed Noraden Alsaleh, Ehab Al-Shaer:
Security configuration analytics using video games. 256-264 - Li Xu, Zhenxin Zhan, Shouhuai Xu, Keying Ye:
An evasion and counter-evasion study in malicious websites detection. 265-273 - Matthew J. Probst, Jun Cheol Park, Sneha Kumar Kasera:
Exploiting altruism in social networks for friend-to-friend malware detection. 274-282 - Aziz Mohaisen, Andrew G. West, Allison Mankin, Omar Alrawi:
Chatter: Classifying malware families using system event ordering. 283-291 - Muhammad Qasim Ali, Reza Yousefian, Ehab Al-Shaer, Sukumar Kamalasadan, Quanyan Zhu:
Two-tier data-driven intrusion detection for automatic generation control in smart grid. 292-300 - A. Selcuk Uluagac, Venkatachalam Subramanian, Raheem A. Beyah:
Sensory channel threats to Cyber Physical Systems: A wake-up call. 301-309 - Fábio Borges, Leonardo A. Martucci:
iKUP keeps users' privacy in the Smart Grid. 310-318 - Jianxia Ning, Indrajeet Singh, Harsha V. Madhyastha, Srikanth V. Krishnamurthy, Guohong Cao, Prasant Mohapatra:
Secret message sharing using online social media. 319-327 - Filipe Beato, Mauro Conti, Bart Preneel, Dario Vettore:
VirtualFriendship: Hiding interactions on Online Social Networks. 328-336 - Boyang Wang, Ming Li, Sherman S. M. Chow, Hui Li:
A tale of two clouds: Computing on data encrypted under multiple keys. 337-345 - Fei Chen, Tao Xiang, Xinwen Fu, Wei Yu:
Towards verifiable file search on the cloud. 346-354 - Ning Zhang, Wenjing Lou, Xuxian Jiang, Y. Thomas Hou:
Enabling Trusted Data-intensive execution in cloud computing. 355-363 - Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
Integrity for distributed queries. 364-372 - Young-Hoon Park, Eun-Dong Lee, Seung-Woo Seo:
Lightweight (k, n)-file sharing scheme for distributed storages with diverse communication capacities. 373-381 - Gerard Draper-Gil, Josep Lluís Ferrer-Gomila, M. Francisca Hinarejos, Arne Tauber:
An optimistic certified e-mail protocol for the current Internet e-mail architecture. 382-390 - Bing Li, Ashwin Prabhu Verleker, Dijiang Huang, Zhijie Wang, Yan Zhu:
Attribute-based access control for ICN naming scheme. 391-399 - Daniel Germanus, Stefanie Roos, Thorsten Strufe, Neeraj Suri:
Mitigating Eclipse attacks in Peer-To-Peer networks. 400-408 - Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong:
Reroute on loop in anonymous peer-to-peer content sharing networks. 409-417 - Wenji Chen, Yong Guan:
Identifying global hot items in distributed dynamic data streams. 418-426 - Yu Seung Kim, Yuan Tian, Le T. Nguyen, Patrick Tague:
LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks. 427-435 - Jingchao Sun, Rui Zhang, Jinxue Zhang, Yanchao Zhang:
TouchIn: Sightless two-factor authentication on multi-touch mobile devices. 436-444 - Rong Jin, Liu Shi, Kai Zeng, Amit Pande, Prasant Mohapatra:
MagPairing: Exploiting magnetometers for pairing smartphones in close proximity. 445-453 - Xiaoyan Lu, Michael Zuba, Jun-Hong Cui, Zhijie Jerry Shi:
Uncooperative localization improves attack performance in Underwater Acoustic Networks. 454-462 - Santosh Chandrasekhar, Mukesh Singhal:
Multi-trapdoor hash functions and their applications in network security. 463-471 - Massimiliano Albanese, Ermanno Battista, Sushil Jajodia, Valentina Casola:
Manipulating the attacker's view of a system's attack surface. 472-480 - Jorge Blasco Alís, Roberto Di Pietro, Agustín Orfila, Alessandro Sorniotti:
A tunable proof of ownership scheme for deduplication using Bloom filters. 481-489 - Dusan Stevanovic, Natalija Vlajic:
Application-layer DDoS in dynamic Web-domains: Building defenses against next-generation attack behavior. 490-491 - Mengyin Ren, Yixin Jiang, Xiaobin Guo, Qiyi Han, Hong Wen, Bin Wu, Zhen Chen:
P2P networks monitoring based on the social network analysis and the topological potential. 492-493 - Ting Ma, Yixin Jiang, Hong Wen, Bin Wu, Xiaobin Guo, Zhen Chen:
Physical Layer Assist Mutual Authentication scheme for smart meter system. 494-495 - Saeed Ur Rehman, Kevin W. Sowerby, Shafiq Alam, Iman Tabatabaei Ardekani:
Radio frequency fingerprinting and its challenges. 496-497 - Jonghoon Kwon, Jihwan Jeong, Jehyun Lee, Heejo Lee:
DroidGraph: discovering Android malware by analyzing semantic behavior. 498-499 - Jie Tang, Huanhuan Song, Fei Pan, Hong Wen, Bin Wu, Yixin Jiang, Xiaobin Guo, Zhen Chen:
A MIMO cross-layer precoding security communication system. 500-501 - Ahmed Refaey, Raheleh Niati, Xianbin Wang, Jean-Yves Chouinard:
Blind detection approach for LDPC, convolutional, and turbo codes in non-noisy environment. 502-503 - A. Selcuk Uluagac, Wenyi Liu, Raheem A. Beyah:
A multi-factor re-authentication framework with user privacy. 504-505 - Hiro Onishi:
Approaches for vehicle cyber security. 506-507 - Fábio Borges, Johannes Buchmann, Max Mühlhäuser:
Introducing asymmetric DC-Nets. 508-509 - Johannes Braun:
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication. 510-511 - Yiyang Shao, Luoshi Zhang, Xiaoxian Chen, Yibo Xue:
Towards time-varying classification based on traffic pattern. 512-513 - Sang Wu Kim:
Physical integrity check in wireless relay networks. 514-515 - Pietro Marchetta, Valerio Persico, Antonio Pescapè:
The Greenhouse Effect Attack. 516-517 - Giselle Font, Javier Bustos-Jiménez, Sebastian Blasco, Alejandro Hevia:
Location privacy for a quality of access to mobile Internet monitoring system. 518-519 - Cecilia Saint-Pierre, Francisco Cifuentes, Javier Bustos-Jiménez:
Detecting anomalies in DNS protocol traces via Passive Testing and Process Mining. 520-521 - Melesio Calderon Munoz, Melody Moh, Teng-Sheng Moh:
Improving smart grid security using Merkle Trees. 522-523
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.