Search dblp for Publications

export results for "toc:db/conf/cns/cns2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cns/0001S14,
  author       = {Jun Li and
                  Shad Stafford},
  title        = {Detecting smart, self-propagating Internet worms},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {193--201},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997486},
  doi          = {10.1109/CNS.2014.6997486},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/0001S14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AbdouMO14,
  author       = {AbdelRahman Abdou and
                  Ashraf Matrawy and
                  Paul C. van Oorschot},
  title        = {Location verification on the Internet: Towards enforcing location-aware
                  access policies over Internet clients},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {175--183},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997484},
  doi          = {10.1109/CNS.2014.6997484},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AbdouMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlbaneseBJC14,
  author       = {Massimiliano Albanese and
                  Ermanno Battista and
                  Sushil Jajodia and
                  Valentina Casola},
  title        = {Manipulating the attacker's view of a system's attack surface},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {472--480},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997517},
  doi          = {10.1109/CNS.2014.6997517},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlbaneseBJC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AliYAKZ14,
  author       = {Muhammad Qasim Ali and
                  Reza Yousefian and
                  Ehab Al{-}Shaer and
                  Sukumar Kamalasadan and
                  Quanyan Zhu},
  title        = {Two-tier data-driven intrusion detection for automatic generation
                  control in smart grid},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {292--300},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997497},
  doi          = {10.1109/CNS.2014.6997497},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AliYAKZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlisPOS14,
  author       = {Jorge Blasco Al{\'{\i}}s and
                  Roberto Di Pietro and
                  Agust{\'{\i}}n Orfila and
                  Alessandro Sorniotti},
  title        = {A tunable proof of ownership scheme for deduplication using Bloom
                  filters},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {481--489},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997518},
  doi          = {10.1109/CNS.2014.6997518},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlisPOS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlsalehA14,
  author       = {Mohammed Noraden Alsaleh and
                  Ehab Al{-}Shaer},
  title        = {Security configuration analytics using video games},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {256--264},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997493},
  doi          = {10.1109/CNS.2014.6997493},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlsalehA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BauerCJPT14,
  author       = {Lujo Bauer and
                  Shaoying Cai and
                  Limin Jia and
                  Timothy Passaro and
                  Yuan Tian},
  title        = {Analyzing the dangers posed by Chrome extensions},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {184--192},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997485},
  doi          = {10.1109/CNS.2014.6997485},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BauerCJPT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BeatoCPV14,
  author       = {Filipe Beato and
                  Mauro Conti and
                  Bart Preneel and
                  Dario Vettore},
  title        = {VirtualFriendship: Hiding interactions on Online Social Networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {328--336},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997501},
  doi          = {10.1109/CNS.2014.6997501},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BeatoCPV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BorgesBM14,
  author       = {F{\'{a}}bio Borges and
                  Johannes Buchmann and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {Introducing asymmetric DC-Nets},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {508--509},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997528},
  doi          = {10.1109/CNS.2014.6997528},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/BorgesBM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BorgesM14,
  author       = {F{\'{a}}bio Borges and
                  Leonardo A. Martucci},
  title        = {iKUP keeps users' privacy in the Smart Grid},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {310--318},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997499},
  doi          = {10.1109/CNS.2014.6997499},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BorgesM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Braun14,
  author       = {Johannes Braun},
  title        = {Ubiquitous support of multi path probing: Preventing man in the middle
                  attacks on Internet communication},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {510--511},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997529},
  doi          = {10.1109/CNS.2014.6997529},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Braun14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CarlsonNHOC14,
  author       = {C. Carlson and
                  Vieny Nguyen and
                  Seth D. Hitefield and
                  Timothy J. O'Shea and
                  T. Charles Clancy},
  title        = {Measuring smart jammer strategy efficacy over the air},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {7--13},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997459},
  doi          = {10.1109/CNS.2014.6997459},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CarlsonNHOC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChandrasekharS14,
  author       = {Santosh Chandrasekhar and
                  Mukesh Singhal},
  title        = {Multi-trapdoor hash functions and their applications in network security},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {463--471},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997516},
  doi          = {10.1109/CNS.2014.6997516},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChandrasekharS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenG14,
  author       = {Wenji Chen and
                  Yong Guan},
  title        = {Identifying global hot items in distributed dynamic data streams},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {418--426},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997511},
  doi          = {10.1109/CNS.2014.6997511},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChenG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenNS14,
  author       = {Kan Chen and
                  Balasubramaniam Natarajan and
                  Steve Shattil},
  title        = {Relay-based secret key generation in {LTE-A}},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {139--144},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997479},
  doi          = {10.1109/CNS.2014.6997479},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChenNS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenXFY14,
  author       = {Fei Chen and
                  Tao Xiang and
                  Xinwen Fu and
                  Wei Yu},
  title        = {Towards verifiable file search on the cloud},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {346--354},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997503},
  doi          = {10.1109/CNS.2014.6997503},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ChenXFY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChouB14,
  author       = {Remi A. Chou and
                  Matthieu R. Bloch},
  title        = {Uniform distributed source coding for the multiple access wiretap
                  channel},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {127--132},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997477},
  doi          = {10.1109/CNS.2014.6997477},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChouB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CorellaL14,
  author       = {Francisco Corella and
                  Karen Pomian Lewison},
  title        = {Identity-based protocol design patterns for machine-to-machine secure
                  channels},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {91--96},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997471},
  doi          = {10.1109/CNS.2014.6997471},
  timestamp    = {Mon, 02 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CorellaL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CuiY14,
  author       = {Biru Cui and
                  Shanchieh Jay Yang},
  title        = {{NRE:} Suppress Selective Forwarding attacks in Wireless Sensor Networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {229--237},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997490},
  doi          = {10.1109/CNS.2014.6997490},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CuiY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Draper-GilFHT14,
  author       = {Gerard Draper{-}Gil and
                  Josep Llu{\'{\i}}s Ferrer{-}Gomila and
                  M. Francisca Hinarejos and
                  Arne Tauber},
  title        = {An optimistic certified e-mail protocol for the current Internet e-mail
                  architecture},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {382--390},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997507},
  doi          = {10.1109/CNS.2014.6997507},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/Draper-GilFHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FontBBH14,
  author       = {Giselle Font and
                  Javier Bustos{-}Jim{\'{e}}nez and
                  Sebastian Blasco and
                  Alejandro Hevia},
  title        = {Location privacy for a quality of access to mobile Internet monitoring
                  system},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {518--519},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997533},
  doi          = {10.1109/CNS.2014.6997533},
  timestamp    = {Tue, 12 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/FontBBH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GarnaevT14,
  author       = {Andrey Garnaev and
                  Wade Trappe},
  title        = {Bandwidth scanning involving a Bayesian approach to adapting the belief
                  of an adversary's presence},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {35--43},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997463},
  doi          = {10.1109/CNS.2014.6997463},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GarnaevT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GermanusRSS14,
  author       = {Daniel Germanus and
                  Stefanie Roos and
                  Thorsten Strufe and
                  Neeraj Suri},
  title        = {Mitigating Eclipse attacks in Peer-To-Peer networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {400--408},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997509},
  doi          = {10.1109/CNS.2014.6997509},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GermanusRSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GungorK14,
  author       = {Onur G{\"{u}}ng{\"{o}}r and
                  Can Emre Koksal},
  title        = {RF-fingerprint based authentication: Exponents and achievable rates},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {97--102},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997472},
  doi          = {10.1109/CNS.2014.6997472},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GungorK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HarrisonB14,
  author       = {Willie K. Harrison and
                  Parker Boyce},
  title        = {Parity modifications and stopping sets in high-rate codes for physical-layer
                  security},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {115--120},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997475},
  doi          = {10.1109/CNS.2014.6997475},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HarrisonB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HeDHWSN14,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Yufan Huang and
                  Dong Wang and
                  Wenbo Shen and
                  Peng Ning},
  title        = {The security of link signature: {A} view from channel models},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {103--108},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997473},
  doi          = {10.1109/CNS.2014.6997473},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HeDHWSN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HitefieldNCOC14,
  author       = {Seth D. Hitefield and
                  Vieny Nguyen and
                  C. Carlson and
                  Timothy J. O'Shea and
                  T. Charles Clancy},
  title        = {Demonstrated LLC-layer attack and defense strategies for wireless
                  communication systems},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {60--66},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997466},
  doi          = {10.1109/CNS.2014.6997466},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HitefieldNCOC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/IglesiasZ14,
  author       = {F{\'{e}}lix Iglesias and
                  Tanja Zseby},
  title        = {Modelling {IP} darkspace traffic by means of clustering techniques},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {166--174},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997483},
  doi          = {10.1109/CNS.2014.6997483},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/IglesiasZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JinMAS14,
  author       = {Zituo Jin and
                  J. P. Morgan and
                  Santhanakrishnan Anand and
                  K. P. Subbalakshmi},
  title        = {{NEAT:} {A} NEighbor AssisTed spectrum decision protocol for resilience
                  against {PUEA}},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {44--52},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997464},
  doi          = {10.1109/CNS.2014.6997464},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/JinMAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JinSZPM14,
  author       = {Rong Jin and
                  Liu Shi and
                  Kai Zeng and
                  Amit Pande and
                  Prasant Mohapatra},
  title        = {MagPairing: Exploiting magnetometers for pairing smartphones in close
                  proximity},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {445--453},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997514},
  doi          = {10.1109/CNS.2014.6997514},
  timestamp    = {Thu, 16 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/JinSZPM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Kim14,
  author       = {Sang Wu Kim},
  title        = {Physical integrity check in wireless relay networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {514--515},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997531},
  doi          = {10.1109/CNS.2014.6997531},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Kim14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KimDT14,
  author       = {Yu Seung Kim and
                  Bruce DeBruhl and
                  Patrick Tague},
  title        = {{JADE:} Jamming-averse routing on cognitive radio mesh networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {21--28},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997461},
  doi          = {10.1109/CNS.2014.6997461},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KimDT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KimTNT14,
  author       = {Yu Seung Kim and
                  Yuan Tian and
                  Le T. Nguyen and
                  Patrick Tague},
  title        = {LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi
                  networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {427--435},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997512},
  doi          = {10.1109/CNS.2014.6997512},
  timestamp    = {Wed, 08 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KimTNT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KrimmlingP14,
  author       = {Jana Krimmling and
                  Steffen Peter},
  title        = {Integration and evaluation of intrusion detection for CoAP in smart
                  city applications},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {73--78},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997468},
  doi          = {10.1109/CNS.2014.6997468},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KrimmlingP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KwonJLL14,
  author       = {Jonghoon Kwon and
                  Jihwan Jeong and
                  Jehyun Lee and
                  Heejo Lee},
  title        = {DroidGraph: discovering Android malware by analyzing semantic behavior},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {498--499},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997523},
  doi          = {10.1109/CNS.2014.6997523},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KwonJLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LeeZCC14,
  author       = {Changmin Lee and
                  Luca Zappaterra and
                  Kwanghee Choi and
                  Hyeong{-}Ah Choi},
  title        = {Securing smart home: Technologies, security challenges, and security
                  requirements},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {67--72},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997467},
  doi          = {10.1109/CNS.2014.6997467},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LeeZCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiVHWZ14,
  author       = {Bing Li and
                  Ashwin Prabhu Verleker and
                  Dijiang Huang and
                  Zhijie Wang and
                  Yan Zhu},
  title        = {Attribute-based access control for {ICN} naming scheme},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {391--399},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997508},
  doi          = {10.1109/CNS.2014.6997508},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiVHWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiZTJ14,
  author       = {Longquan Li and
                  Sencun Zhu and
                  Don J. Torrieri and
                  Sushil Jajodia},
  title        = {Self-healing wireless networks under insider jamming attacks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {220--228},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997489},
  doi          = {10.1109/CNS.2014.6997489},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiZTJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LinJ14,
  author       = {Pin{-}Hsun Lin and
                  Eduard A. Jorswieck},
  title        = {On the fading Gaussian wiretap channel with statistical channel state
                  information at transmitter},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {121--126},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997476},
  doi          = {10.1109/CNS.2014.6997476},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LinJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LuZCS14,
  author       = {Xiaoyan Lu and
                  Michael Zuba and
                  Jun{-}Hong Cui and
                  Zhijie Jerry Shi},
  title        = {Uncooperative localization improves attack performance in Underwater
                  Acoustic Networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {454--462},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997515},
  doi          = {10.1109/CNS.2014.6997515},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LuZCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MaJWWGC14,
  author       = {Ting Ma and
                  Yixin Jiang and
                  Hong Wen and
                  Bin Wu and
                  Xiaobin Guo and
                  Zhen Chen},
  title        = {Physical Layer Assist Mutual Authentication scheme for smart meter
                  system},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {494--495},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997521},
  doi          = {10.1109/CNS.2014.6997521},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MaJWWGC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MarchettaPP14,
  author       = {Pietro Marchetta and
                  Valerio Persico and
                  Antonio Pescap{\`{e}}},
  title        = {The Greenhouse Effect Attack},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {516--517},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997532},
  doi          = {10.1109/CNS.2014.6997532},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/MarchettaPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MarttinenWJ14,
  author       = {Aleksi Marttinen and
                  Alexander M. Wyglinski and
                  Riku J{\"{a}}ntti},
  title        = {Moving-target defense mechanisms against source-selective jamming
                  attacks in tactical cognitive radio MANETs},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {14--20},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997460},
  doi          = {10.1109/CNS.2014.6997460},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MarttinenWJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MohaisenWMA14,
  author       = {Aziz Mohaisen and
                  Andrew G. West and
                  Allison Mankin and
                  Omar Alrawi},
  title        = {Chatter: Classifying malware families using system event ordering},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {283--291},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997496},
  doi          = {10.1109/CNS.2014.6997496},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MohaisenWMA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MunozMM14,
  author       = {Melesio Calderon Munoz and
                  Melody Moh and
                  Teng{-}Sheng Moh},
  title        = {Improving smart grid security using Merkle Trees},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {522--523},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997535},
  doi          = {10.1109/CNS.2014.6997535},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MunozMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MustafaX14,
  author       = {Hossen Asiful Mustafa and
                  Wenyuan Xu},
  title        = {{CETAD:} Detecting evil twin access point attacks in wireless hotspots},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {238--246},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997491},
  doi          = {10.1109/CNS.2014.6997491},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MustafaX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/NingSMKCM14,
  author       = {Jianxia Ning and
                  Indrajeet Singh and
                  Harsha V. Madhyastha and
                  Srikanth V. Krishnamurthy and
                  Guohong Cao and
                  Prasant Mohapatra},
  title        = {Secret message sharing using online social media},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {319--327},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997500},
  doi          = {10.1109/CNS.2014.6997500},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/NingSMKCM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/NotraSGSB14,
  author       = {Sukhvir Notra and
                  Muhammad Siddiqi and
                  Hassan Habibi Gharakheili and
                  Vijay Sivaraman and
                  Roksana Boreli},
  title        = {An experimental study of security and privacy risks with emerging
                  household appliances},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {79--84},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997469},
  doi          = {10.1109/CNS.2014.6997469},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/NotraSGSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Onishi14,
  author       = {Hiro Onishi},
  title        = {Approaches for vehicle cyber security},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {506--507},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997527},
  doi          = {10.1109/CNS.2014.6997527},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Onishi14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ParkLS14,
  author       = {Young{-}Hoon Park and
                  Eun{-}Dong Lee and
                  Seung{-}Woo Seo},
  title        = {Lightweight (k, n)-file sharing scheme for distributed storages with
                  diverse communication capacities},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {373--381},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997506},
  doi          = {10.1109/CNS.2014.6997506},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ParkLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ProbstPK14,
  author       = {Matthew J. Probst and
                  Jun Cheol Park and
                  Sneha Kumar Kasera},
  title        = {Exploiting altruism in social networks for friend-to-friend malware
                  detection},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {274--282},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997495},
  doi          = {10.1109/CNS.2014.6997495},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ProbstPK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RefaeyNWC14,
  author       = {Ahmed Refaey and
                  Raheleh Niati and
                  Xianbin Wang and
                  Jean{-}Yves Chouinard},
  title        = {Blind detection approach for LDPC, convolutional, and turbo codes
                  in non-noisy environment},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {502--503},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997525},
  doi          = {10.1109/CNS.2014.6997525},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RefaeyNWC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RehmanSAA14,
  author       = {Saeed Ur Rehman and
                  Kevin W. Sowerby and
                  Shafiq Alam and
                  Iman Tabatabaei Ardekani},
  title        = {Portability of an {RF} fingerprint of a wireless transmitter},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {151--156},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997481},
  doi          = {10.1109/CNS.2014.6997481},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RehmanSAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RehmanSAA14a,
  author       = {Saeed Ur Rehman and
                  Kevin W. Sowerby and
                  Shafiq Alam and
                  Iman Tabatabaei Ardekani},
  title        = {Radio frequency fingerprinting and its challenges},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {496--497},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997522},
  doi          = {10.1109/CNS.2014.6997522},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RehmanSAA14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RenJGHWWC14,
  author       = {Mengyin Ren and
                  Yixin Jiang and
                  Xiaobin Guo and
                  Qiyi Han and
                  Hong Wen and
                  Bin Wu and
                  Zhen Chen},
  title        = {{P2P} networks monitoring based on the social network analysis and
                  the topological potential},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {492--493},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997520},
  doi          = {10.1109/CNS.2014.6997520},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RenJGHWWC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Saint-PierreCB14,
  author       = {Cecilia Saint{-}Pierre and
                  Francisco Cifuentes and
                  Javier Bustos{-}Jim{\'{e}}nez},
  title        = {Detecting anomalies in {DNS} protocol traces via Passive Testing and
                  Process Mining},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {520--521},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997534},
  doi          = {10.1109/CNS.2014.6997534},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Saint-PierreCB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SamaniJSG14,
  author       = {Elaheh Biglar Beigi Samani and
                  Hossein Hadian Jazi and
                  Natalia Stakhanova and
                  Ali A. Ghorbani},
  title        = {Towards effective feature selection in machine learning-based botnet
                  detection approaches},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {247--255},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997492},
  doi          = {10.1109/CNS.2014.6997492},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SamaniJSG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SchaeferP14,
  author       = {Rafael F. Schaefer and
                  H. Vincent Poor},
  title        = {On secure communication over multiple access wiretap channels under
                  channel uncertainty},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {109--114},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997474},
  doi          = {10.1109/CNS.2014.6997474},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SchaeferP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShaoZCX14,
  author       = {Yiyang Shao and
                  Luoshi Zhang and
                  Xiaoxian Chen and
                  Yibo Xue},
  title        = {Towards time-varying classification based on traffic pattern},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {512--513},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997530},
  doi          = {10.1109/CNS.2014.6997530},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ShaoZCX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShenNHDL14,
  author       = {Wenbo Shen and
                  Peng Ning and
                  Xiaofan He and
                  Huaiyu Dai and
                  Yao Liu},
  title        = {{MCR} Decoding: {A} {MIMO} approach for defending against wireless
                  jamming attacks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {133--138},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997478},
  doi          = {10.1109/CNS.2014.6997478},
  timestamp    = {Sat, 24 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ShenNHDL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SibomanaZT14,
  author       = {Louis Sibomana and
                  Hans{-}J{\"{u}}rgen Zepernick and
                  Hung Tran},
  title        = {Achievable secrecy capacity in an underlay cognitive radio network},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997458},
  doi          = {10.1109/CNS.2014.6997458},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SibomanaZT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Sodagari14,
  author       = {Shabnam Sodagari},
  title        = {Secure distributed spectrum sensing in cognitive radio networks using
                  multi-armed bandits},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {29--34},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997462},
  doi          = {10.1109/CNS.2014.6997462},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Sodagari14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/StevanovicV14,
  author       = {Dusan Stevanovic and
                  Natalija Vlajic},
  title        = {Application-layer DDoS in dynamic Web-domains: Building defenses against
                  next-generation attack behavior},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {490--491},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997519},
  doi          = {10.1109/CNS.2014.6997519},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/StevanovicV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Sun0ZZ14,
  author       = {Jingchao Sun and
                  Rui Zhang and
                  Jinxue Zhang and
                  Yanchao Zhang},
  title        = {TouchIn: Sightless two-factor authentication on multi-touch mobile
                  devices},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {436--444},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997513},
  doi          = {10.1109/CNS.2014.6997513},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Sun0ZZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TangSPWWJGC14,
  author       = {Jie Tang and
                  Huanhuan Song and
                  Fei Pan and
                  Hong Wen and
                  Bin Wu and
                  Yixin Jiang and
                  Xiaobin Guo and
                  Zhen Chen},
  title        = {A {MIMO} cross-layer precoding security communication system},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {500--501},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997524},
  doi          = {10.1109/CNS.2014.6997524},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TangSPWWJGC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TianDBD14,
  author       = {Guanyu Tian and
                  Zhenhai Duan and
                  Todd Baumeister and
                  Yingfei Dong},
  title        = {Reroute on loop in anonymous peer-to-peer content sharing networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {409--417},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997510},
  doi          = {10.1109/CNS.2014.6997510},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TianDBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/UluagacLB14,
  author       = {A. Selcuk Uluagac and
                  Wenyi Liu and
                  Raheem A. Beyah},
  title        = {A multi-factor re-authentication framework with user privacy},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {504--505},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997526},
  doi          = {10.1109/CNS.2014.6997526},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/UluagacLB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/UluagacSB14,
  author       = {A. Selcuk Uluagac and
                  Venkatachalam Subramanian and
                  Raheem A. Beyah},
  title        = {Sensory channel threats to Cyber Physical Systems: {A} wake-up call},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {301--309},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997498},
  doi          = {10.1109/CNS.2014.6997498},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/UluagacSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/UludagLRN14,
  author       = {Suleyman Uludag and
                  King{-}Shan Lui and
                  Wenyu Ren and
                  Klara Nahrstedt},
  title        = {Practical and secure Machine-to-Machine data collection protocol in
                  Smart Grid},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {85--90},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997470},
  doi          = {10.1109/CNS.2014.6997470},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/UludagLRN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/VimercatiFJLPS14,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Giovanni Livraga and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Integrity for distributed queries},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {364--372},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997505},
  doi          = {10.1109/CNS.2014.6997505},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/VimercatiFJLPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangC14,
  author       = {Ji Wang and
                  Ing{-}Ray Chen},
  title        = {Trust-based data fusion mechanism design in cognitive radio networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {53--59},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997465},
  doi          = {10.1109/CNS.2014.6997465},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangLC014,
  author       = {Boyang Wang and
                  Ming Li and
                  Sherman S. M. Chow and
                  Hui Li},
  title        = {A tale of two clouds: Computing on data encrypted under multiple keys},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {337--345},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997502},
  doi          = {10.1109/CNS.2014.6997502},
  timestamp    = {Wed, 19 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/WangLC014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangWN14,
  author       = {Chaofeng Wang and
                  Zhaohui Wang and
                  Saeid Nooshabadi},
  title        = {Signal alignment for secure underwater coordinated multipoint transmissions},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {145--150},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997480},
  doi          = {10.1109/CNS.2014.6997480},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangWN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XuZXY14,
  author       = {Li Xu and
                  Zhenxin Zhan and
                  Shouhuai Xu and
                  Keying Ye},
  title        = {An evasion and counter-evasion study in malicious websites detection},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {265--273},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997494},
  doi          = {10.1109/CNS.2014.6997494},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XuZXY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YoungY14,
  author       = {Adam L. Young and
                  Moti Yung},
  title        = {The drunk motorcyclist protocol for anonymous communication},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {157--165},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997482},
  doi          = {10.1109/CNS.2014.6997482},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YoungY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZengRY14,
  author       = {Kexiong Curtis Zeng and
                  Sreeraksha Kondaji Ramesh and
                  Yaling Yang},
  title        = {Location spoofing attack and its countermeasures in database-driven
                  cognitive radio networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {202--210},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997487},
  doi          = {10.1109/CNS.2014.6997487},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZengRY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangLJH14,
  author       = {Ning Zhang and
                  Wenjing Lou and
                  Xuxian Jiang and
                  Y. Thomas Hou},
  title        = {Enabling Trusted Data-intensive execution in cloud computing},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {355--363},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997504},
  doi          = {10.1109/CNS.2014.6997504},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangLJH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhengWC014,
  author       = {Xiuyuan Zheng and
                  Chen Wang and
                  Yingying Chen and
                  Jie Yang},
  title        = {Accurate rogue access point localization leveraging fine-grained channel
                  information},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {211--219},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997488},
  doi          = {10.1109/CNS.2014.6997488},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhengWC014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2014,
  title        = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6982337/proceeding},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics