


default search action
2nd CNS 2014: San Francisco, CA, USA
- IEEE Conference on Communications and Network Security, CNS 2014, San Francisco, CA, USA, October 29-31, 2014. IEEE 2014

- Louis Sibomana, Hans-Jürgen Zepernick

, Hung Tran:
Achievable secrecy capacity in an underlay cognitive radio network. 1-6 - C. Carlson, Vieny Nguyen, Seth D. Hitefield, Timothy J. O'Shea, T. Charles Clancy:

Measuring smart jammer strategy efficacy over the air. 7-13 - Aleksi Marttinen, Alexander M. Wyglinski

, Riku Jäntti
:
Moving-target defense mechanisms against source-selective jamming attacks in tactical cognitive radio MANETs. 14-20 - Yu Seung Kim, Bruce DeBruhl, Patrick Tague

:
JADE: Jamming-averse routing on cognitive radio mesh networks. 21-28 - Shabnam Sodagari:

Secure distributed spectrum sensing in cognitive radio networks using multi-armed bandits. 29-34 - Andrey Garnaev, Wade Trappe:

Bandwidth scanning involving a Bayesian approach to adapting the belief of an adversary's presence. 35-43 - Zituo Jin, J. P. Morgan, Santhanakrishnan Anand, K. P. Subbalakshmi

:
NEAT: A NEighbor AssisTed spectrum decision protocol for resilience against PUEA. 44-52 - Ji Wang, Ing-Ray Chen:

Trust-based data fusion mechanism design in cognitive radio networks. 53-59 - Seth D. Hitefield, Vieny Nguyen, C. Carlson, Timothy J. O'Shea, T. Charles Clancy:

Demonstrated LLC-layer attack and defense strategies for wireless communication systems. 60-66 - Changmin Lee, Luca Zappaterra, Kwanghee Choi, Hyeong-Ah Choi:

Securing smart home: Technologies, security challenges, and security requirements. 67-72 - Jana Krimmling, Steffen Peter:

Integration and evaluation of intrusion detection for CoAP in smart city applications. 73-78 - Sukhvir Notra, Muhammad Siddiqi, Hassan Habibi Gharakheili

, Vijay Sivaraman, Roksana Boreli:
An experimental study of security and privacy risks with emerging household appliances. 79-84 - Suleyman Uludag

, King-Shan Lui, Wenyu Ren, Klara Nahrstedt:
Practical and secure Machine-to-Machine data collection protocol in Smart Grid. 85-90 - Francisco Corella, Karen Pomian Lewison:

Identity-based protocol design patterns for machine-to-machine secure channels. 91-96 - Onur Güngör, Can Emre Koksal:

RF-fingerprint based authentication: Exponents and achievable rates. 97-102 - Xiaofan He, Huaiyu Dai, Yufan Huang, Dong Wang, Wenbo Shen, Peng Ning:

The security of link signature: A view from channel models. 103-108 - Rafael F. Schaefer, H. Vincent Poor:

On secure communication over multiple access wiretap channels under channel uncertainty. 109-114 - Willie K. Harrison, Parker Boyce:

Parity modifications and stopping sets in high-rate codes for physical-layer security. 115-120 - Pin-Hsun Lin, Eduard A. Jorswieck

:
On the fading Gaussian wiretap channel with statistical channel state information at transmitter. 121-126 - Remi A. Chou

, Matthieu R. Bloch:
Uniform distributed source coding for the multiple access wiretap channel. 127-132 - Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai, Yao Liu:

MCR Decoding: A MIMO approach for defending against wireless jamming attacks. 133-138 - Kan Chen, Balasubramaniam Natarajan

, Steve Shattil:
Relay-based secret key generation in LTE-A. 139-144 - Chaofeng Wang, Zhaohui Wang, Saeid Nooshabadi:

Signal alignment for secure underwater coordinated multipoint transmissions. 145-150 - Saeed Ur Rehman

, Kevin W. Sowerby, Shafiq Alam
, Iman Tabatabaei Ardekani
:
Portability of an RF fingerprint of a wireless transmitter. 151-156 - Adam L. Young, Moti Yung:

The drunk motorcyclist protocol for anonymous communication. 157-165 - Félix Iglesias

, Tanja Zseby:
Modelling IP darkspace traffic by means of clustering techniques. 166-174 - AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot

:
Location verification on the Internet: Towards enforcing location-aware access policies over Internet clients. 175-183 - Lujo Bauer

, Shaoying Cai, Limin Jia
, Timothy Passaro, Yuan Tian:
Analyzing the dangers posed by Chrome extensions. 184-192 - Jun Li, Shad Stafford:

Detecting smart, self-propagating Internet worms. 193-201 - Kexiong Curtis Zeng, Sreeraksha Kondaji Ramesh, Yaling Yang:

Location spoofing attack and its countermeasures in database-driven cognitive radio networks. 202-210 - Xiuyuan Zheng, Chen Wang, Yingying Chen

, Jie Yang:
Accurate rogue access point localization leveraging fine-grained channel information. 211-219 - Longquan Li, Sencun Zhu, Don J. Torrieri, Sushil Jajodia

:
Self-healing wireless networks under insider jamming attacks. 220-228 - Biru Cui, Shanchieh Jay Yang:

NRE: Suppress Selective Forwarding attacks in Wireless Sensor Networks. 229-237 - Hossen Asiful Mustafa

, Wenyuan Xu:
CETAD: Detecting evil twin access point attacks in wireless hotspots. 238-246 - Elaheh Biglar Beigi Samani, Hossein Hadian Jazi, Natalia Stakhanova, Ali A. Ghorbani:

Towards effective feature selection in machine learning-based botnet detection approaches. 247-255 - Mohammed Noraden Alsaleh, Ehab Al-Shaer:

Security configuration analytics using video games. 256-264 - Li Xu, Zhenxin Zhan, Shouhuai Xu, Keying Ye

:
An evasion and counter-evasion study in malicious websites detection. 265-273 - Matthew J. Probst, Jun Cheol Park, Sneha Kumar Kasera:

Exploiting altruism in social networks for friend-to-friend malware detection. 274-282 - Aziz Mohaisen, Andrew G. West, Allison Mankin, Omar Alrawi:

Chatter: Classifying malware families using system event ordering. 283-291 - Muhammad Qasim Ali, Reza Yousefian, Ehab Al-Shaer, Sukumar Kamalasadan

, Quanyan Zhu:
Two-tier data-driven intrusion detection for automatic generation control in smart grid. 292-300 - A. Selcuk Uluagac

, Venkatachalam Subramanian, Raheem A. Beyah
:
Sensory channel threats to Cyber Physical Systems: A wake-up call. 301-309 - Fábio Borges

, Leonardo A. Martucci:
iKUP keeps users' privacy in the Smart Grid. 310-318 - Jianxia Ning, Indrajeet Singh, Harsha V. Madhyastha, Srikanth V. Krishnamurthy

, Guohong Cao, Prasant Mohapatra:
Secret message sharing using online social media. 319-327 - Filipe Beato, Mauro Conti

, Bart Preneel
, Dario Vettore:
VirtualFriendship: Hiding interactions on Online Social Networks. 328-336 - Boyang Wang, Ming Li, Sherman S. M. Chow

, Hui Li:
A tale of two clouds: Computing on data encrypted under multiple keys. 337-345 - Fei Chen, Tao Xiang

, Xinwen Fu
, Wei Yu
:
Towards verifiable file search on the cloud. 346-354 - Ning Zhang, Wenjing Lou, Xuxian Jiang, Y. Thomas Hou

:
Enabling Trusted Data-intensive execution in cloud computing. 355-363 - Sabrina De Capitani di Vimercati

, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
Integrity for distributed queries. 364-372 - Young-Hoon Park, Eun-Dong Lee, Seung-Woo Seo:

Lightweight (k, n)-file sharing scheme for distributed storages with diverse communication capacities. 373-381 - Gerard Draper-Gil, Josep Lluís Ferrer-Gomila

, M. Francisca Hinarejos
, Arne Tauber:
An optimistic certified e-mail protocol for the current Internet e-mail architecture. 382-390 - Bing Li, Ashwin Prabhu Verleker, Dijiang Huang

, Zhijie Wang, Yan Zhu
:
Attribute-based access control for ICN naming scheme. 391-399 - Daniel Germanus, Stefanie Roos, Thorsten Strufe, Neeraj Suri

:
Mitigating Eclipse attacks in Peer-To-Peer networks. 400-408 - Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong:

Reroute on loop in anonymous peer-to-peer content sharing networks. 409-417 - Wenji Chen, Yong Guan:

Identifying global hot items in distributed dynamic data streams. 418-426 - Yu Seung Kim, Yuan Tian, Le T. Nguyen, Patrick Tague

:
LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks. 427-435 - Jingchao Sun, Rui Zhang, Jinxue Zhang, Yanchao Zhang:

TouchIn: Sightless two-factor authentication on multi-touch mobile devices. 436-444 - Rong Jin, Liu Shi, Kai Zeng, Amit Pande, Prasant Mohapatra:

MagPairing: Exploiting magnetometers for pairing smartphones in close proximity. 445-453 - Xiaoyan Lu, Michael Zuba, Jun-Hong Cui, Zhijie Jerry Shi:

Uncooperative localization improves attack performance in Underwater Acoustic Networks. 454-462 - Santosh Chandrasekhar, Mukesh Singhal:

Multi-trapdoor hash functions and their applications in network security. 463-471 - Massimiliano Albanese

, Ermanno Battista, Sushil Jajodia
, Valentina Casola
:
Manipulating the attacker's view of a system's attack surface. 472-480 - Jorge Blasco Alís, Roberto Di Pietro

, Agustín Orfila, Alessandro Sorniotti:
A tunable proof of ownership scheme for deduplication using Bloom filters. 481-489 - Dusan Stevanovic, Natalija Vlajic:

Application-layer DDoS in dynamic Web-domains: Building defenses against next-generation attack behavior. 490-491 - Mengyin Ren, Yixin Jiang, Xiaobin Guo, Qiyi Han, Hong Wen, Bin Wu, Zhen Chen:

P2P networks monitoring based on the social network analysis and the topological potential. 492-493 - Ting Ma, Yixin Jiang, Hong Wen, Bin Wu, Xiaobin Guo, Zhen Chen:

Physical Layer Assist Mutual Authentication scheme for smart meter system. 494-495 - Saeed Ur Rehman

, Kevin W. Sowerby, Shafiq Alam
, Iman Tabatabaei Ardekani
:
Radio frequency fingerprinting and its challenges. 496-497 - Jonghoon Kwon

, Jihwan Jeong, Jehyun Lee, Heejo Lee:
DroidGraph: discovering Android malware by analyzing semantic behavior. 498-499 - Jie Tang, Huanhuan Song, Fei Pan, Hong Wen, Bin Wu, Yixin Jiang, Xiaobin Guo, Zhen Chen:

A MIMO cross-layer precoding security communication system. 500-501 - Ahmed Refaey, Raheleh Niati, Xianbin Wang

, Jean-Yves Chouinard:
Blind detection approach for LDPC, convolutional, and turbo codes in non-noisy environment. 502-503 - A. Selcuk Uluagac

, Wenyi Liu, Raheem A. Beyah
:
A multi-factor re-authentication framework with user privacy. 504-505 - Hiro Onishi:

Approaches for vehicle cyber security. 506-507 - Fábio Borges

, Johannes Buchmann, Max Mühlhäuser
:
Introducing asymmetric DC-Nets. 508-509 - Johannes Braun:

Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication. 510-511 - Yiyang Shao, Luoshi Zhang, Xiaoxian Chen, Yibo Xue:

Towards time-varying classification based on traffic pattern. 512-513 - Sang Wu Kim:

Physical integrity check in wireless relay networks. 514-515 - Pietro Marchetta, Valerio Persico

, Antonio Pescapè:
The Greenhouse Effect Attack. 516-517 - Giselle Font, Javier Bustos-Jiménez, Sebastian Blasco, Alejandro Hevia:

Location privacy for a quality of access to mobile Internet monitoring system. 518-519 - Cecilia Saint-Pierre, Francisco Cifuentes, Javier Bustos-Jiménez:

Detecting anomalies in DNS protocol traces via Passive Testing and Process Mining. 520-521 - Melesio Calderon Munoz, Melody Moh, Teng-Sheng Moh

:
Improving smart grid security using Merkle Trees. 522-523

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














