


default search action
4th CNS 2016: Philadelphia, PA, USA
- 2016 IEEE Conference on Communications and Network Security, CNS 2016, Philadelphia, PA, USA, October 17-19, 2016. IEEE 2016, ISBN 978-1-5090-3065-1

- Yanyan Li, Mengjun Xie

, Jiang Bian:
SEGAUTH: A segment-based approach to behavioral biometric authentication. 1-9 - Eunsang Cho

, Minkyung Park
, Ted Taekyoung Kwon:
TwinPeaks: A new approach for certificateless public key distribution. 10-18 - Sandeep Pisharody

, Ankur Chowdhary
, Dijiang Huang
:
Security policy checking in distributed SDN based clouds. 19-27 - Kuan-yin Chen

, Anudeep Reddy Junuthula, Ishant Kumar Siddhrau, Yang Xu
, H. Jonathan Chao:
SDNShield: Towards more comprehensive defense against DDoS attacks on SDN control plane. 28-36 - Wei Peng, Tianchong Gao, Devkishen Sisodia, Tanay Kumar Saha

, Feng Li
, Mohammad Al Hasan:
ACTS: Extracting Android App topologiCal signature through graphleT Sampling. 37-45 - Bahman Rashidi, Carol J. Fung:

XDroid: An Android permission control using Hidden Markov chain and online learning. 46-54 - Longfei Wu

, Benjamin Brandt, Xiaojiang Du, Bo Ji
:
Analysis of clickjacking attacks and an effective defense scheme for Android devices. 55-63 - Xiaoyan Sun, Jun Dai

, Peng Liu, Anoop Singhal, John Yen:
Towards probabilistic identification of zero-day attack paths. 64-72 - Chengyu Zheng, Mila Dalla Preda, Jorge Granjal

, Stefano Zanero
, Federico Maggi:
On-chip system call tracing: A feasibility study and open prototype. 73-81 - Allen T. Webb, A. L. Narasima Reddy:

Finding proxy users at the service using anomaly detection. 82-90 - Liangxiao Xin, David Starobinski, Guevara Noubir:

Cascading denial of service attacks on Wi-Fi networks. 91-99 - Monireh Dabaghchian

, Amir Alipour-Fanid, Kai Zeng, Qingsi Wang:
Online learning-based optimal primary user emulation attacks in cognitive radio networks. 100-108 - Amr Abdelaziz

, Can Emre Koksal, Hesham El Gamal:
On the security of Angle of Arrival estimation. 109-117 - Hanif Rahbari

, Marwan Krunz:
Rolling preambles: Mitigating stealthy FO estimation attacks in OFDM-based 802.11 systems. 118-126 - Amirali Sanatinia, Guevara Noubir:

Honey Onions: A framework for characterizing and identifying misbehaving Tor HSDirs. 127-135 - Per A. Hallgren, Martín Ochoa

, Andrei Sabelfeld:
MaxPace: Speed-constrained location queries. 136-144 - Jian Lin, Dejun Yang

, Ming Li, Jia Xu, Guoliang Xue:
BidGuard: A framework for privacy-preserving crowdsensing incentive mechanisms. 145-153 - Wentao Chang, Songqing Chen:

ExtensionGuard: Towards runtime browser extension information leakage detection. 154-162 - Moreno Ambrosin

, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti
, Radha Poovendran
:
Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters. 163-171 - Bo Tang, Jun Yan, Steven Kay, Haibo He:

Detection of false data injection attacks in smart grid under colored Gaussian noise. 172-179 - Mujahid Mohsin, Zahid Anwar, Ghaith Husari, Ehab Al-Shaer, Mohammad Ashiqur Rahman

:
IoTSAT: A formal framework for security analysis of the internet of things (IoT). 180-188 - Jason Gionta, William Enck

, Per Larsen:
Preventing kernel code-reuse attacks through disclosure resistant code diversification. 189-197 - Sridhar Venkatesan, Massimiliano Albanese

, Kareem Amin, Sushil Jajodia
, Mason Wright:
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures. 198-206 - Marcus Märtens

, Hadi Asghari, Michel van Eeten
, Piet Van Mieghem:
A time-dependent SIS-model for long-term computer worm evolution. 207-215 - Hatem Ismail, Daniel Germanus, Neeraj Suri

:
Malicious peers eviction for P2P overlays. 216-224 - Steffen Haas, Shankar Karuppayah, Selvakumar Manickam

, Max Mühlhäuser, Mathias Fischer:
On the resilience of P2P-based botnet graphs. 225-233 - Carsten Büttner, Sorin A. Huss:

Attribute-based authorization tickets for Car-to-X communication. 234-242 - Mohammad Ashiqur Rahman

, Abdullah Al Farooq, Amarjit Datta, Ehab Al-Shaer:
Automated synthesis of resiliency configurations for cyber networks. 243-251 - Candace Suh-Lee

, Ju-Yeon Jo, Yoohwan Kim:
Text mining for security threat detection discovering hidden information in unstructured log messages. 252-260 - Curtis R. Taylor

, Craig A. Shue:
Validating security protocols with cloud-based middleboxes. 261-269 - Azeem Aqil, Ahmed Osama Fathy Atya, Srikanth V. Krishnamurthy

, Paul L. Yu, Ananthram Swami, Jeff Rowe, Karl N. Levitt, Alexander Poylisher, Constantin Serban, Ritu Chadha:
Automated cross layer feature selection for effective intrusion detection in networked systems. 270-278 - Emmanouil Vasilomanolakis

, Michael Stahn, Carlos Garcia Cordero
, Max Mühlhäuser:
On probe-response attacks in Collaborative Intrusion Detection Systems. 279-286 - Christian Doerr, Mourad el Maouchi, Sille Kamoen, Jarno Moree:

Scan prediction and reconnaissance mitigation through commodity graphics cards. 287-295 - Ross K. Gegan, Vishal Ahuja, John D. Owens, Dipak Ghosal:

Real-time GPU-based timing channel detection using entropy. 296-305 - Yao Pan, Jules White, Yu Sun:

Assessing the threat of web worker distributed attacks. 306-314 - Dakun Shen, Ian D. Markwood, Dan Shen, Yao Liu:

Virtual Safe: Unauthorized movement detection for mobile devices. 315-323 - Depeng Li, Rui Zhang:

A framework to mitigate airliner risk in air traffic management. 324-332 - Tao Li, Rui Zhang, Yanchao Zhang:

PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access control. 333-341 - Rui Lu, Derek Chi-Wai Pao:

Optimized Aho-Corasick string matching algorithm for smart phones. 342-343 - Mee Lan Han

, Hee Chan Han, Ah Reum Kang
, Byung Il Kwak, Aziz Mohaisen, Huy Kang Kim
:
WHAP: Web-hacking profiling using Case-Based Reasoning. 344-345 - Luping Zhang, Hong Wen, Huanhuan Song, Jie Tang, Yixin Jiang, Weihua Dong, Xiping Zhu:

The performance of the MIMO physical layer security system with imperfect CSI. 346-347 - Jinling Zhang, Hong Wen, Huanhuan Song, Yixin Jiang, Zhengguang Zhang

, Luping Zhang, Xiping Zhu:
Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System. 348-349 - Zhengguang Zhang

, Hong Wen, Huanhuan Song, Yixin Jiang, Jinling Zhang, Xiping Zhu:
A MIMO cross-layer secure communication scheme based on spatial modulation. 350-351 - Wenqian Yu, Weigang Li, Junyuan Wang, Changzheng Wei:

A study of HSM based key protection in encryption file system. 352-353 - Ah Reum Kang

, Aziz Mohaisen:
Transparency of the new gTLD's centralized zone data service: A measurement study. 354-355 - Julian Chukwu, Ose Osamudiamen, Ashraf Matrawy:

IDSaaS in SDN: Intrusion Detection System as a service in software defined networks. 356-357 - Ah Reum Kang

, Aziz Mohaisen
:
Assessing DNS privacy under partial deployment of special-use Domain Names. 358-359 - Jeffrey Spaulding, Ah Reum Kang

, Shambhu J. Upadhyaya, Aziz Mohaisen
:
A user study of the effectiveness of typosquatting techniques. 360-361 - Ah Reum Kang

, Aziz Mohaisen:
Automatic alerts annotation for improving DDoS mitigation systems. 362-363 - Daniel T. Martinez, Claire M. Cochrane, Chiu C. Tan:

Encryption-based privacy protection for police body-worn cameras. 364-365 - Yifan Tian, Jiawei Yuan, Shucheng Yu

:
SBPA: Social behavior based cross Social Network phishing attacks. 366-367 - Jianli Huang, Yixin Jiang, Aidong Xu, Hong Wen, Huajun Chen, Xiaobin Guo, Zewu Guan, Zhiming Wang:

Joint beamforming and antenna subarray formation for secrecy capacity maximization in MIMO wiretap channels. 368-369 - Hassan Takabi:

Firewall for brain: Towards a privacy preserving ecosystem for BCI applications. 370-371 - Diana K. Anguiano Cervantes, Ghouri Mohammad Saaduddin, Yanyan Li, Mengjun Xie

:
Comparison between fingerprint and behavioral biometric authentication using 2D and 3D gestures. 372-373 - Jonathan Ming, Mengjun Xie

:
Remote live forensics for Android devices. 374-375 - Pooria Madani

, Natalija Vlajic:
Towards sequencing malicious system calls. 376-377 - Brandon Dalton, Nitin Agarwal:

Analyzing deviant behaviors on social media using cyber forensics-based methodologies. 378-379 - Antwane Lewis, Yanyan Li, Mengjun Xie

:
Real time motion-based authentication for smartwatch. 380-381 - Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac

:
A framework for counterfeit smart grid device detection. 382-383 - Shan Suthaharan

, Weining Shen
:
Pairing of most relevant variables and bootstrap samples with ridge regression for data sharing. 384-385 - Mustafa Faisal, Alvaro A. Cárdenas, Avishai Wool

:
Modeling Modbus TCP for intrusion detection. 386-390 - Parth Pradhan, Kyatsandra G. Nagananda, Parv Venkitasubramaniam, Shalinee Kishore, Rick S. Blum

:
GPS spoofing attack characterization and detection in smart grids. 391-395 - Huan Yang, Liang Cheng

, Mooi Choo Chuah:
Evaluation of utility-privacy trade-offs of data manipulation techniques for smart metering. 396-400 - Spencer Michaels, Kemal Akkaya, A. Selcuk Uluagac

:
Inducing data loss in Zigbee networks via join/association handshake spoofing. 401-405 - Key-whan Chung

, Valerio Formicola
, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Alexander Withers, Adam J. Slagell:
Attacking supercomputers through targeted alteration of environmental control: A data driven case study. 406-410 - Woo-Hyun Ko, Bharadwaj Satchidanandan

, P. R. Kumar:
Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems. 416-420 - Vivek Venugopalan

, Cameron D. Patterson, Devu Manikantan Shila:
Detecting and thwarting hardware trojan attacks in cyber-physical systems. 421-425 - Shan Suthaharan

:
A correlation-based subspace analysis for data confidentiality and classification as utility in CPS. 426-431 - SeongHan Shin, Kazukuni Kobara, Chia-Chuan Chuang, Weicheng Huang:

A security framework for MQTT. 432-436 - Brian Thompson, James R. Morris-King, Hasan Cam:

Effectiveness of proactive reset for mitigating impact of stealthy attacks on networks of autonomous systems. 437-441 - Nadim Badra, Jiaxin Yang, Ioannis N. Psaromiligkos, Benoît Champagne:

Robust and secure beamformer design for MIMO relaying with imperfect eavesdropper CSI. 442-449 - Zhexiong Wei, F. Richard Yu

, Helen Tang, Chengehao Liang, Qiao Yan:
Securing cognitive radio vehicular Ad hoc networks with trusted lightweight cloud computing. 450-456 - Madushanka Soysa, Pamela C. Cosman

, Laurence B. Milstein:
Video cognitive radio networks for tactical scenarios. 457-464 - Danda B. Rawat

:
Analyzing energy efficient physical layer security in large-scale MIMO enabled CRN with QoS requirements. 465-471 - Yi Shi

, Yalin E. Sagduyu:
Spectrum learning and access for cognitive satellite communications under jamming. 472-479 - Siddhant Deshmukh, Henry Carter

, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler
:
Efficient and secure template blinding for biometric authentication. 480-488 - Luan Huy Pham, Massimiliano Albanese

, Sridhar Venkatesan:
A quantitative risk assessment framework for adaptive Intrusion Detection in the cloud. 489-497 - Eddy Caron, Arnaud Lefray, Jonathan Rouzaud-Cornabas:

Secured systems in Clouds with Model-Driven Orchestration. 498-506 - Florian Reimair, Bernd Prünster

, Andreas Reiter, Christian Ertler:
Applied dynamic policy selection. 507-515 - Kevin Walsh:

TLS with trustworthy certificate authorities. 516-524 - Dominik Leibenger, Jonas Fortmann, Christoph Sorge:

EncFS goes multi-user: Adding access control to an encrypted file system. 525-533 - Giovanni Di Crescenzo:

Server-assisted fully homomorphic computation protocols. 534-542 - Florian Reimair, Christian Kollmann, Alexander Marsalek:

Emulating U2F authenticator devices. 543-551 - Lucas Schabhüser, Denise Demirel, Johannes Buchmann:

An unconditionally hiding auditing procedure for computations over distributed data. 552-560 - Shashank Arora, Gaurav Varshney, Pradeep K. Atrey, Manoj Mishra:

SecureCEdit: An approach for secure cloud-based document editing. 561-564 - Andrea Huszti

, Norbert Olah
:
A simple authentication scheme for clouds. 565-569 - M. Tarek Ibn Ziad

, Amr Al-Anwar
, Moustafa Alzantot, Mani B. Srivastava
:
CryptoImg: Privacy preserving processing over encrypted images. 570-575 - Xiaoqi Yu, Nairen Cao, Jun Zhang, Siu-Ming Yiu:

Dynamic Proofs of Retrievability with improved worst case overhead. 576-580 - Kemal Bicakci

, Davut Deniz Yavuz, Sezin Gurkan:
TwinCloud: Secure cloud sharing without explicit key management. 581-585 - Eric Asselin, Carlos Aguilar Melchor, Gentian Jakllari

:
Anomaly detection for web server log reduction: A simple yet efficient crawling based approach. 586-590 - Ahmed S. Bendary

, Yahya Z. Mohasseb
, Hisham Dahshan:
On the secure Degrees of Freedom for the K-user symmetric MIMO Wiretap MAC channel. 591-595 - Wade Trappe, Andrey Garnaev:

Bargaining over secrecy and reliability for low SNR OFDM communications. 596-600 - Jaume del Olmo, Javier Rodríguez Fonollosa

:
Strong secrecy on a class of Degraded Broadcast Channels using polar codes. 601-605 - Abdallah Fayed, Tamer Khattab

, Lifeng Lai:
On secure communication over the Z-Channel. 606-610 - Ahmed S. Mansour, Holger Boche, Rafael F. Schaefer:

List decoding for arbitrarily varying wiretap channels. 611-615 - Moritz Wiese, Tobias J. Oechtering:

Secure distributed estimation of linear systems. 616-620 - Ahmed A. Zewail, Aylin Yener:

Coded caching for resolvable networks with security requirements. 621-625 - Pritam Mukherjee, Sennur Ulukus:

Covert bits through queues. 626-630 - Paul L. Yu, Jake B. Perazzone, Brian M. Sadler

, Rick S. Blum
:
Authenticated side channel via physical layer fingerprinting. 631-635 - Xuanxuan Wang, Rafael F. Schaefer, Lars Thiele, Thomas Haustein, Yongming Wang:

Ergodic secrecy sum rate for multiuser MIMO downlink systems using block diagonalization. 636-640 - Wenwen Tu, Mario Goldenbaum, Lifeng Lai, H. Vincent Poor:

Multiple key generation with restricted public discussion structure. 641-645

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














