Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cns/cns2014.bht:"
@inproceedings{DBLP:conf/cns/0001S14, author = {Jun Li and Shad Stafford}, title = {Detecting smart, self-propagating Internet worms}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {193--201}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997486}, doi = {10.1109/CNS.2014.6997486}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/0001S14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AbdouMO14, author = {AbdelRahman Abdou and Ashraf Matrawy and Paul C. van Oorschot}, title = {Location verification on the Internet: Towards enforcing location-aware access policies over Internet clients}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {175--183}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997484}, doi = {10.1109/CNS.2014.6997484}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AbdouMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlbaneseBJC14, author = {Massimiliano Albanese and Ermanno Battista and Sushil Jajodia and Valentina Casola}, title = {Manipulating the attacker's view of a system's attack surface}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {472--480}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997517}, doi = {10.1109/CNS.2014.6997517}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlbaneseBJC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AliYAKZ14, author = {Muhammad Qasim Ali and Reza Yousefian and Ehab Al{-}Shaer and Sukumar Kamalasadan and Quanyan Zhu}, title = {Two-tier data-driven intrusion detection for automatic generation control in smart grid}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {292--300}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997497}, doi = {10.1109/CNS.2014.6997497}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AliYAKZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlisPOS14, author = {Jorge Blasco Al{\'{\i}}s and Roberto Di Pietro and Agust{\'{\i}}n Orfila and Alessandro Sorniotti}, title = {A tunable proof of ownership scheme for deduplication using Bloom filters}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {481--489}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997518}, doi = {10.1109/CNS.2014.6997518}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlisPOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlsalehA14, author = {Mohammed Noraden Alsaleh and Ehab Al{-}Shaer}, title = {Security configuration analytics using video games}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {256--264}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997493}, doi = {10.1109/CNS.2014.6997493}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlsalehA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BauerCJPT14, author = {Lujo Bauer and Shaoying Cai and Limin Jia and Timothy Passaro and Yuan Tian}, title = {Analyzing the dangers posed by Chrome extensions}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {184--192}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997485}, doi = {10.1109/CNS.2014.6997485}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BauerCJPT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BeatoCPV14, author = {Filipe Beato and Mauro Conti and Bart Preneel and Dario Vettore}, title = {VirtualFriendship: Hiding interactions on Online Social Networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {328--336}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997501}, doi = {10.1109/CNS.2014.6997501}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BeatoCPV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BorgesBM14, author = {F{\'{a}}bio Borges and Johannes Buchmann and Max M{\"{u}}hlh{\"{a}}user}, title = {Introducing asymmetric DC-Nets}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {508--509}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997528}, doi = {10.1109/CNS.2014.6997528}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/BorgesBM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BorgesM14, author = {F{\'{a}}bio Borges and Leonardo A. Martucci}, title = {iKUP keeps users' privacy in the Smart Grid}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {310--318}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997499}, doi = {10.1109/CNS.2014.6997499}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BorgesM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Braun14, author = {Johannes Braun}, title = {Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {510--511}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997529}, doi = {10.1109/CNS.2014.6997529}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Braun14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CarlsonNHOC14, author = {C. Carlson and Vieny Nguyen and Seth D. Hitefield and Timothy J. O'Shea and T. Charles Clancy}, title = {Measuring smart jammer strategy efficacy over the air}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {7--13}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997459}, doi = {10.1109/CNS.2014.6997459}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CarlsonNHOC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChandrasekharS14, author = {Santosh Chandrasekhar and Mukesh Singhal}, title = {Multi-trapdoor hash functions and their applications in network security}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {463--471}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997516}, doi = {10.1109/CNS.2014.6997516}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChandrasekharS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenG14, author = {Wenji Chen and Yong Guan}, title = {Identifying global hot items in distributed dynamic data streams}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {418--426}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997511}, doi = {10.1109/CNS.2014.6997511}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChenG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenNS14, author = {Kan Chen and Balasubramaniam Natarajan and Steve Shattil}, title = {Relay-based secret key generation in {LTE-A}}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {139--144}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997479}, doi = {10.1109/CNS.2014.6997479}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChenNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenXFY14, author = {Fei Chen and Tao Xiang and Xinwen Fu and Wei Yu}, title = {Towards verifiable file search on the cloud}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {346--354}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997503}, doi = {10.1109/CNS.2014.6997503}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ChenXFY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChouB14, author = {Remi A. Chou and Matthieu R. Bloch}, title = {Uniform distributed source coding for the multiple access wiretap channel}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {127--132}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997477}, doi = {10.1109/CNS.2014.6997477}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChouB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CorellaL14, author = {Francisco Corella and Karen Pomian Lewison}, title = {Identity-based protocol design patterns for machine-to-machine secure channels}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {91--96}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997471}, doi = {10.1109/CNS.2014.6997471}, timestamp = {Mon, 02 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CorellaL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CuiY14, author = {Biru Cui and Shanchieh Jay Yang}, title = {{NRE:} Suppress Selective Forwarding attacks in Wireless Sensor Networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {229--237}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997490}, doi = {10.1109/CNS.2014.6997490}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CuiY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Draper-GilFHT14, author = {Gerard Draper{-}Gil and Josep Llu{\'{\i}}s Ferrer{-}Gomila and M. Francisca Hinarejos and Arne Tauber}, title = {An optimistic certified e-mail protocol for the current Internet e-mail architecture}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {382--390}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997507}, doi = {10.1109/CNS.2014.6997507}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/Draper-GilFHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FontBBH14, author = {Giselle Font and Javier Bustos{-}Jim{\'{e}}nez and Sebastian Blasco and Alejandro Hevia}, title = {Location privacy for a quality of access to mobile Internet monitoring system}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {518--519}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997533}, doi = {10.1109/CNS.2014.6997533}, timestamp = {Tue, 12 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/FontBBH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GarnaevT14, author = {Andrey Garnaev and Wade Trappe}, title = {Bandwidth scanning involving a Bayesian approach to adapting the belief of an adversary's presence}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {35--43}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997463}, doi = {10.1109/CNS.2014.6997463}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GarnaevT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GermanusRSS14, author = {Daniel Germanus and Stefanie Roos and Thorsten Strufe and Neeraj Suri}, title = {Mitigating Eclipse attacks in Peer-To-Peer networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {400--408}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997509}, doi = {10.1109/CNS.2014.6997509}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GermanusRSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GungorK14, author = {Onur G{\"{u}}ng{\"{o}}r and Can Emre Koksal}, title = {RF-fingerprint based authentication: Exponents and achievable rates}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {97--102}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997472}, doi = {10.1109/CNS.2014.6997472}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GungorK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HarrisonB14, author = {Willie K. Harrison and Parker Boyce}, title = {Parity modifications and stopping sets in high-rate codes for physical-layer security}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {115--120}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997475}, doi = {10.1109/CNS.2014.6997475}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HarrisonB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HeDHWSN14, author = {Xiaofan He and Huaiyu Dai and Yufan Huang and Dong Wang and Wenbo Shen and Peng Ning}, title = {The security of link signature: {A} view from channel models}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {103--108}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997473}, doi = {10.1109/CNS.2014.6997473}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HeDHWSN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HitefieldNCOC14, author = {Seth D. Hitefield and Vieny Nguyen and C. Carlson and Timothy J. O'Shea and T. Charles Clancy}, title = {Demonstrated LLC-layer attack and defense strategies for wireless communication systems}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {60--66}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997466}, doi = {10.1109/CNS.2014.6997466}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HitefieldNCOC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/IglesiasZ14, author = {F{\'{e}}lix Iglesias and Tanja Zseby}, title = {Modelling {IP} darkspace traffic by means of clustering techniques}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {166--174}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997483}, doi = {10.1109/CNS.2014.6997483}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/IglesiasZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JinMAS14, author = {Zituo Jin and J. P. Morgan and Santhanakrishnan Anand and K. P. Subbalakshmi}, title = {{NEAT:} {A} NEighbor AssisTed spectrum decision protocol for resilience against {PUEA}}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {44--52}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997464}, doi = {10.1109/CNS.2014.6997464}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/JinMAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JinSZPM14, author = {Rong Jin and Liu Shi and Kai Zeng and Amit Pande and Prasant Mohapatra}, title = {MagPairing: Exploiting magnetometers for pairing smartphones in close proximity}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {445--453}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997514}, doi = {10.1109/CNS.2014.6997514}, timestamp = {Thu, 16 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/JinSZPM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Kim14, author = {Sang Wu Kim}, title = {Physical integrity check in wireless relay networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {514--515}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997531}, doi = {10.1109/CNS.2014.6997531}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Kim14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KimDT14, author = {Yu Seung Kim and Bruce DeBruhl and Patrick Tague}, title = {{JADE:} Jamming-averse routing on cognitive radio mesh networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {21--28}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997461}, doi = {10.1109/CNS.2014.6997461}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KimDT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KimTNT14, author = {Yu Seung Kim and Yuan Tian and Le T. Nguyen and Patrick Tague}, title = {LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {427--435}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997512}, doi = {10.1109/CNS.2014.6997512}, timestamp = {Wed, 08 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KimTNT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KrimmlingP14, author = {Jana Krimmling and Steffen Peter}, title = {Integration and evaluation of intrusion detection for CoAP in smart city applications}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {73--78}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997468}, doi = {10.1109/CNS.2014.6997468}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KrimmlingP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KwonJLL14, author = {Jonghoon Kwon and Jihwan Jeong and Jehyun Lee and Heejo Lee}, title = {DroidGraph: discovering Android malware by analyzing semantic behavior}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {498--499}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997523}, doi = {10.1109/CNS.2014.6997523}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KwonJLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LeeZCC14, author = {Changmin Lee and Luca Zappaterra and Kwanghee Choi and Hyeong{-}Ah Choi}, title = {Securing smart home: Technologies, security challenges, and security requirements}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {67--72}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997467}, doi = {10.1109/CNS.2014.6997467}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LeeZCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiVHWZ14, author = {Bing Li and Ashwin Prabhu Verleker and Dijiang Huang and Zhijie Wang and Yan Zhu}, title = {Attribute-based access control for {ICN} naming scheme}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {391--399}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997508}, doi = {10.1109/CNS.2014.6997508}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiVHWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiZTJ14, author = {Longquan Li and Sencun Zhu and Don J. Torrieri and Sushil Jajodia}, title = {Self-healing wireless networks under insider jamming attacks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {220--228}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997489}, doi = {10.1109/CNS.2014.6997489}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiZTJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LinJ14, author = {Pin{-}Hsun Lin and Eduard A. Jorswieck}, title = {On the fading Gaussian wiretap channel with statistical channel state information at transmitter}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {121--126}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997476}, doi = {10.1109/CNS.2014.6997476}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LinJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LuZCS14, author = {Xiaoyan Lu and Michael Zuba and Jun{-}Hong Cui and Zhijie Jerry Shi}, title = {Uncooperative localization improves attack performance in Underwater Acoustic Networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {454--462}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997515}, doi = {10.1109/CNS.2014.6997515}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LuZCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MaJWWGC14, author = {Ting Ma and Yixin Jiang and Hong Wen and Bin Wu and Xiaobin Guo and Zhen Chen}, title = {Physical Layer Assist Mutual Authentication scheme for smart meter system}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {494--495}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997521}, doi = {10.1109/CNS.2014.6997521}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MaJWWGC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MarchettaPP14, author = {Pietro Marchetta and Valerio Persico and Antonio Pescap{\`{e}}}, title = {The Greenhouse Effect Attack}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {516--517}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997532}, doi = {10.1109/CNS.2014.6997532}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/MarchettaPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MarttinenWJ14, author = {Aleksi Marttinen and Alexander M. Wyglinski and Riku J{\"{a}}ntti}, title = {Moving-target defense mechanisms against source-selective jamming attacks in tactical cognitive radio MANETs}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {14--20}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997460}, doi = {10.1109/CNS.2014.6997460}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MarttinenWJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MohaisenWMA14, author = {Aziz Mohaisen and Andrew G. West and Allison Mankin and Omar Alrawi}, title = {Chatter: Classifying malware families using system event ordering}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {283--291}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997496}, doi = {10.1109/CNS.2014.6997496}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MohaisenWMA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MunozMM14, author = {Melesio Calderon Munoz and Melody Moh and Teng{-}Sheng Moh}, title = {Improving smart grid security using Merkle Trees}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {522--523}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997535}, doi = {10.1109/CNS.2014.6997535}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MunozMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MustafaX14, author = {Hossen Asiful Mustafa and Wenyuan Xu}, title = {{CETAD:} Detecting evil twin access point attacks in wireless hotspots}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {238--246}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997491}, doi = {10.1109/CNS.2014.6997491}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MustafaX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/NingSMKCM14, author = {Jianxia Ning and Indrajeet Singh and Harsha V. Madhyastha and Srikanth V. Krishnamurthy and Guohong Cao and Prasant Mohapatra}, title = {Secret message sharing using online social media}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {319--327}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997500}, doi = {10.1109/CNS.2014.6997500}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/NingSMKCM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/NotraSGSB14, author = {Sukhvir Notra and Muhammad Siddiqi and Hassan Habibi Gharakheili and Vijay Sivaraman and Roksana Boreli}, title = {An experimental study of security and privacy risks with emerging household appliances}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {79--84}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997469}, doi = {10.1109/CNS.2014.6997469}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/NotraSGSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Onishi14, author = {Hiro Onishi}, title = {Approaches for vehicle cyber security}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {506--507}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997527}, doi = {10.1109/CNS.2014.6997527}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Onishi14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ParkLS14, author = {Young{-}Hoon Park and Eun{-}Dong Lee and Seung{-}Woo Seo}, title = {Lightweight (k, n)-file sharing scheme for distributed storages with diverse communication capacities}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {373--381}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997506}, doi = {10.1109/CNS.2014.6997506}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ParkLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ProbstPK14, author = {Matthew J. Probst and Jun Cheol Park and Sneha Kumar Kasera}, title = {Exploiting altruism in social networks for friend-to-friend malware detection}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {274--282}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997495}, doi = {10.1109/CNS.2014.6997495}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ProbstPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RefaeyNWC14, author = {Ahmed Refaey and Raheleh Niati and Xianbin Wang and Jean{-}Yves Chouinard}, title = {Blind detection approach for LDPC, convolutional, and turbo codes in non-noisy environment}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {502--503}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997525}, doi = {10.1109/CNS.2014.6997525}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/RefaeyNWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RehmanSAA14, author = {Saeed Ur Rehman and Kevin W. Sowerby and Shafiq Alam and Iman Tabatabaei Ardekani}, title = {Portability of an {RF} fingerprint of a wireless transmitter}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {151--156}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997481}, doi = {10.1109/CNS.2014.6997481}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/RehmanSAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RehmanSAA14a, author = {Saeed Ur Rehman and Kevin W. Sowerby and Shafiq Alam and Iman Tabatabaei Ardekani}, title = {Radio frequency fingerprinting and its challenges}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {496--497}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997522}, doi = {10.1109/CNS.2014.6997522}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/RehmanSAA14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RenJGHWWC14, author = {Mengyin Ren and Yixin Jiang and Xiaobin Guo and Qiyi Han and Hong Wen and Bin Wu and Zhen Chen}, title = {{P2P} networks monitoring based on the social network analysis and the topological potential}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {492--493}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997520}, doi = {10.1109/CNS.2014.6997520}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/RenJGHWWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Saint-PierreCB14, author = {Cecilia Saint{-}Pierre and Francisco Cifuentes and Javier Bustos{-}Jim{\'{e}}nez}, title = {Detecting anomalies in {DNS} protocol traces via Passive Testing and Process Mining}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {520--521}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997534}, doi = {10.1109/CNS.2014.6997534}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Saint-PierreCB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SamaniJSG14, author = {Elaheh Biglar Beigi Samani and Hossein Hadian Jazi and Natalia Stakhanova and Ali A. Ghorbani}, title = {Towards effective feature selection in machine learning-based botnet detection approaches}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {247--255}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997492}, doi = {10.1109/CNS.2014.6997492}, timestamp = {Mon, 14 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SamaniJSG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SchaeferP14, author = {Rafael F. Schaefer and H. Vincent Poor}, title = {On secure communication over multiple access wiretap channels under channel uncertainty}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {109--114}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997474}, doi = {10.1109/CNS.2014.6997474}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SchaeferP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShaoZCX14, author = {Yiyang Shao and Luoshi Zhang and Xiaoxian Chen and Yibo Xue}, title = {Towards time-varying classification based on traffic pattern}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {512--513}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997530}, doi = {10.1109/CNS.2014.6997530}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ShaoZCX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShenNHDL14, author = {Wenbo Shen and Peng Ning and Xiaofan He and Huaiyu Dai and Yao Liu}, title = {{MCR} Decoding: {A} {MIMO} approach for defending against wireless jamming attacks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {133--138}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997478}, doi = {10.1109/CNS.2014.6997478}, timestamp = {Sat, 24 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ShenNHDL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SibomanaZT14, author = {Louis Sibomana and Hans{-}J{\"{u}}rgen Zepernick and Hung Tran}, title = {Achievable secrecy capacity in an underlay cognitive radio network}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997458}, doi = {10.1109/CNS.2014.6997458}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SibomanaZT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Sodagari14, author = {Shabnam Sodagari}, title = {Secure distributed spectrum sensing in cognitive radio networks using multi-armed bandits}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {29--34}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997462}, doi = {10.1109/CNS.2014.6997462}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Sodagari14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/StevanovicV14, author = {Dusan Stevanovic and Natalija Vlajic}, title = {Application-layer DDoS in dynamic Web-domains: Building defenses against next-generation attack behavior}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {490--491}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997519}, doi = {10.1109/CNS.2014.6997519}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/StevanovicV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Sun0ZZ14, author = {Jingchao Sun and Rui Zhang and Jinxue Zhang and Yanchao Zhang}, title = {TouchIn: Sightless two-factor authentication on multi-touch mobile devices}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {436--444}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997513}, doi = {10.1109/CNS.2014.6997513}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Sun0ZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TangSPWWJGC14, author = {Jie Tang and Huanhuan Song and Fei Pan and Hong Wen and Bin Wu and Yixin Jiang and Xiaobin Guo and Zhen Chen}, title = {A {MIMO} cross-layer precoding security communication system}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {500--501}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997524}, doi = {10.1109/CNS.2014.6997524}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TangSPWWJGC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TianDBD14, author = {Guanyu Tian and Zhenhai Duan and Todd Baumeister and Yingfei Dong}, title = {Reroute on loop in anonymous peer-to-peer content sharing networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {409--417}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997510}, doi = {10.1109/CNS.2014.6997510}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TianDBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/UluagacLB14, author = {A. Selcuk Uluagac and Wenyi Liu and Raheem A. Beyah}, title = {A multi-factor re-authentication framework with user privacy}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {504--505}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997526}, doi = {10.1109/CNS.2014.6997526}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/UluagacLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/UluagacSB14, author = {A. Selcuk Uluagac and Venkatachalam Subramanian and Raheem A. Beyah}, title = {Sensory channel threats to Cyber Physical Systems: {A} wake-up call}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {301--309}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997498}, doi = {10.1109/CNS.2014.6997498}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/UluagacSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/UludagLRN14, author = {Suleyman Uludag and King{-}Shan Lui and Wenyu Ren and Klara Nahrstedt}, title = {Practical and secure Machine-to-Machine data collection protocol in Smart Grid}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {85--90}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997470}, doi = {10.1109/CNS.2014.6997470}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/UludagLRN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/VimercatiFJLPS14, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Stefano Paraboschi and Pierangela Samarati}, title = {Integrity for distributed queries}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {364--372}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997505}, doi = {10.1109/CNS.2014.6997505}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/VimercatiFJLPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangC14, author = {Ji Wang and Ing{-}Ray Chen}, title = {Trust-based data fusion mechanism design in cognitive radio networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {53--59}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997465}, doi = {10.1109/CNS.2014.6997465}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangLC014, author = {Boyang Wang and Ming Li and Sherman S. M. Chow and Hui Li}, title = {A tale of two clouds: Computing on data encrypted under multiple keys}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {337--345}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997502}, doi = {10.1109/CNS.2014.6997502}, timestamp = {Wed, 19 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/WangLC014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangWN14, author = {Chaofeng Wang and Zhaohui Wang and Saeid Nooshabadi}, title = {Signal alignment for secure underwater coordinated multipoint transmissions}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {145--150}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997480}, doi = {10.1109/CNS.2014.6997480}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangWN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XuZXY14, author = {Li Xu and Zhenxin Zhan and Shouhuai Xu and Keying Ye}, title = {An evasion and counter-evasion study in malicious websites detection}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {265--273}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997494}, doi = {10.1109/CNS.2014.6997494}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/XuZXY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YoungY14, author = {Adam L. Young and Moti Yung}, title = {The drunk motorcyclist protocol for anonymous communication}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {157--165}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997482}, doi = {10.1109/CNS.2014.6997482}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YoungY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZengRY14, author = {Kexiong Curtis Zeng and Sreeraksha Kondaji Ramesh and Yaling Yang}, title = {Location spoofing attack and its countermeasures in database-driven cognitive radio networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {202--210}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997487}, doi = {10.1109/CNS.2014.6997487}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZengRY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangLJH14, author = {Ning Zhang and Wenjing Lou and Xuxian Jiang and Y. Thomas Hou}, title = {Enabling Trusted Data-intensive execution in cloud computing}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {355--363}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997504}, doi = {10.1109/CNS.2014.6997504}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhangLJH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhengWC014, author = {Xiuyuan Zheng and Chen Wang and Yingying Chen and Jie Yang}, title = {Accurate rogue access point localization leveraging fine-grained channel information}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {211--219}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997488}, doi = {10.1109/CNS.2014.6997488}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhengWC014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cns/2014, title = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6982337/proceeding}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.