


default search action
16th SecureComm 2020: Washington, DC, USA
- Noseong Park, Kun Sun, Sara Foresti, Kevin R. B. Butler, Nitesh Saxena:
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 336, Springer 2020, ISBN 978-3-030-63094-2 - Ruming Tang, Cheng Huang, Yanti Zhou, Haoxian Wu, Xianglin Lu, Yongqian Sun, Qi Li, Jinjin Li, Weiyao Huang, Siyuan Sun, Dan Pei
:
A Practical Machine Learning-Based Framework to Detect DNS Covert Communication in Enterprises. 1-21 - Mingkui Wei
, Khaled Rabieh
, Faisal Kaleem
:
CacheLoc: Leveraging CDN Edge Servers for User Geolocation. 22-40 - Md Ariful Haque, Sachin Shetty
, Charles A. Kamhoua, Kimberly Gold:
Modeling Mission Impact of Cyber Attacks on Energy Delivery Systems. 41-61 - Yu Wang
, Zhenzhen Li, Gaopeng Gou, Gang Xiong
, Chencheng Wang, Zhen Li:
Identifying DApps and User Behaviors on Ethereum via Encrypted Traffic. 62-83 - Candong Rong, Gaopeng Gou, Mingxin Cui, Gang Xiong, Zhen Li, Li Guo:
TransNet: Unseen Malware Variants Detection Using Deep Transfer Learning. 84-101 - Muhammad Ihsan Haikal Sukmana
, Kennedy Aondona Torkura, Sezi Dwi Sagarianti Prasetyo, Feng Cheng, Christoph Meinel:
A Brokerage Approach for Secure Multi-Cloud Storage Resource Management. 102-119 - Jaehyun Han
, Zhiqiang Lin, Donald E. Porter:
On the Effectiveness of Behavior-Based Ransomware Detection. 120-140 - Golam Dastoger Bashar, Alejandro Anzola Avila, Gaby G. Dagher:
PoQ: A Consensus Protocol for Private Blockchains Using Intel SGX. 141-160 - Sang-Yoon Chang:
Share Withholding in Blockchain Mining. 161-187 - Jiahui Zhang, Qian Lu, Ruobing Jiang
, Haipeng Qu:
PEDR: A Novel Evil Twin Attack Detection Scheme Based on Phase Error Drift Range. 188-207 - Xuebin Ma, Jingyu Yang, Shengyi Guan:
Differentially Private Social Graph Publishing for Community Detection. 208-214 - Syed Akib Anwar Hridoy, Mohammad Zulkernine:
LaaCan: A Lightweight Authentication Architecture for Vehicle Controller Area Network. 215-234 - Javier I. Campos, Kristen Johnson, Jonathan Neeley, Staci Roesch, Farha Jahan, Quamar Niyaz, Khair Al Shamaileh:
A Machine Learning Based Smartphone App for GPS Spoofing Detection. 235-241 - Yu Jiang, Ruixuan Li, Junwei Tang, Ali Davanian, Heng Yin
:
AOMDroid: Detecting Obfuscation Variants of Android Malware Using Transfer Learning. 242-253 - Ayush Kumar
, Mrinalini Shridhar, Sahithya Swaminathan, Teng Joon Lim:
ML-Based Early Detection of IoT Botnets. 254-260 - Quentin M. Kniep, Wolf Müller, Jens-Peter Redlich:
Post-Quantum Cryptography in WireGuard VPN. 261-267 - Rafal Leszczyna
:
Evaluating the Cost of Personnel Activities in Cybersecurity Management: A Case Study. 268-274 - Songsong Liu, Qiyang Song, Kun Sun, Qi Li:
SGX-Cube: An SGX-Enhanced Single Sign-On System Against Server-Side Credential Leakage. 275-290 - Nilanjan Sen, Ram Dantu, Kirill Morozov:
EW256357: A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications' Security. 291-310 - Xinxin Fan
, Zhi Zhong, Qi Chai, Dong Guo:
Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System. 311-323 - Chunling Han, Rui Xue:
Private Global Generator Aggregation from Different Types of Local Models. 324-335 - Pinchen Cui, David A. Umphress:
Perturbing Smart Contract Execution Through the Underlying Runtime. 336-349 - Mingyue Li
, Chunfu Jia, Wei Shao:
Blockchain Based Multi-keyword Similarity Search Scheme over Encrypted Data. 350-371 - Andreas Zdziarstek
, Willi Brekenfelder
, Felix Eibisch
:
Using the Physical Layer to Detect Attacks on Building Automation Networks. 372-390 - Mohammad Saidur Rahman, Ibrahim Khalil, Abdelaziz Bouras:
Formalizing Dynamic Behaviors of Smart Contract Workflow in Smart Healthcare Supply Chain. 391-402 - Liting Deng, Hui Wen, Mingfeng Xin, Yue Sun, Limin Sun, Hongsong Zhu:
Malware Classification Using Attention-Based Transductive Learning Network. 403-418 - Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Jingxuan Ma, Pascal Urien
:
COOB: Hybrid Secure Device Pairing Scheme in a Hostile Environment. 419-438 - Liangjia Li, Yuling Luo, Junxiu Liu, Senhui Qiu, Lanhang Li:
A Robust Watermarking Scheme with High Security and Low Computational Complexity. 439-454 - Immanuel Kunz, Christian Banse, Philipp Stephanow:
Selecting Privacy Enhancing Technologies for IoT-Based Services. 455-474 - Friedrich Doku
, Ethan Doku
:
Khopesh - Contact Tracing Without Sacrificing Privacy. 475-486

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
