Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/iccns/iccns2016.bht:"
@inproceedings{DBLP:conf/iccns/0001BS16, author = {Monika Singh and Divya Bansal and Sanjeev Sofat}, title = {A Novel Technique to Characterize Social Network Users: Comparative Study}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {75--79}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017977}, doi = {10.1145/3017971.3017977}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/0001BS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/AhmadWG16, author = {Muhammad Aminu Ahmad and Steve Woodhead and Diane Gan}, title = {A Safeguard against Fast Self-propagating Malware}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {65--69}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017974}, doi = {10.1145/3017971.3017974}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/AhmadWG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChaimaaNH16, author = {Belbergui Chaimaa and Elkamoun Najib and Rachid Hilal}, title = {A Dynamic Access Control Model for Cloud Computing Environments}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {21--29}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017979}, doi = {10.1145/3017971.3017979}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChaimaaNH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChangJYRL16, author = {Rui Chang and Liehui Jiang and Qing Yin and Lu Ren and Qingfeng Liu}, title = {An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {6--10}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017973}, doi = {10.1145/3017971.3017973}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChangJYRL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/HasanJLC16, author = {A. S. M. Touhidul Hasan and Qingshan Jiang and Chengming Li and Lifei Chen}, title = {An Effective Model for Anonymizing Personal Location Trajectory}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {35--39}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017986}, doi = {10.1145/3017971.3017986}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/HasanJLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/IkeS16, author = {Moses Ike and Kamil Sara{\c{c}}}, title = {{PPEP:} {A} Deployable Privacy Preserving E-Commerce Protocol for Electronic Goods}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {104--112}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017983}, doi = {10.1145/3017971.3017983}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/IkeS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Jin0S16, author = {Cancan Jin and Xinyu Feng and Qingni Shen}, title = {Fully Secure Hidden Ciphertext Policy Attribute-Based Encryption with Short Ciphertext Size}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {91--98}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017981}, doi = {10.1145/3017971.3017981}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Jin0S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiuD16, author = {Qiming Liu and Changsong Deng}, title = {An Computer Virus Spreading Model with Delayed Quarantine in Internet}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {1--5}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017972}, doi = {10.1145/3017971.3017972}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiuD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LonkarS16, author = {Bhupesh B. Lonkar and Manoj R. Sayankar}, title = {Design and Implementation of Automatic Vehicle Tracker System for Accidental Emergency}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {46--50}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017988}, doi = {10.1145/3017971.3017988}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LonkarS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/MaHLL16, author = {Xiangjun Ma and Lei Huang and Ye Lu and Chuanqi Li}, title = {Channel Estimation Algorithm based on Distance Judgement and Remainder Compensation in {OFDM} System}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {40--45}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017987}, doi = {10.1145/3017971.3017987}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/MaHLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/MadhusudhanS16, author = {R. Madhusudhan and Shashidhara}, title = {An Efficient and Secure Authentication Scheme With User Anonymity for Roaming Service in Global Mobile Networks}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {119--126}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3024085}, doi = {10.1145/3017971.3024085}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/MadhusudhanS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/MohanYFO16, author = {Ratish Mohan and Anis Yazidi and Boning Feng and B. John Oommen}, title = {Dynamic Ordering of Firewall Rules Using a Novel Swapping Window-based Paradigm}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {11--20}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017975}, doi = {10.1145/3017971.3017975}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/MohanYFO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/RajeshS16, author = {Harsha Mittemari Rajesh and Insu Song}, title = {E-Commerce Websites/blogs - Hassles and Predicaments}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {56--61}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017990}, doi = {10.1145/3017971.3017990}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/RajeshS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ShangCWA016, author = {Wenli Shang and Junrong Cui and Ming Wan and Panfeng An and Peng Zeng}, title = {Modbus Communication Behavior Modeling and {SVM} Intrusion Detection Method}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {80--85}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017978}, doi = {10.1145/3017971.3017978}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ShangCWA016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/SinghBS16, author = {Amardeep Singh and Divya Bansal and Sanjeev Sofat}, title = {A Novel Approach to Evade Attacks in Online Social Networks}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {70--74}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017976}, doi = {10.1145/3017971.3017976}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/SinghBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/VanHT16, author = {Nguyen Thanh Van and Bao Ho and Tran Ngoc Thinh}, title = {An Anomaly-based Intrusion Detection Architecture Integrated on OpenFlow Switch}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {99--103}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017982}, doi = {10.1145/3017971.3017982}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/VanHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/VanithaU16, author = {C. N. Vanitha and M. Usha}, title = {Eliminating Route Modifiers by Pattern Synthesis Process in Wireless Sensor Networks}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {51--55}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017989}, doi = {10.1145/3017971.3017989}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/VanithaU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WangZYQ16, author = {Zhilong Wang and Tao Zhang and Yu Yang and Haipeng Qu}, title = {Comparison of Security Frameworks for Governmental Clouds between United States and European Union}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {30--34}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017985}, doi = {10.1145/3017971.3017985}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WangZYQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WibowoB16, author = {Andreyadi Wibowo and Ari Moesriami Barmawi}, title = {Improving {NORMALS} Using Modified Baudot-Murray Code}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {113--118}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017984}, doi = {10.1145/3017971.3017984}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WibowoB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/XuS016, author = {Jia{-}Chang Xu and Kilho Shin and Yu{-}Lu Liu}, title = {Detecting Fake Sites based on {HTML} Structure Analysis}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {86--90}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017980}, doi = {10.1145/3017971.3017980}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/XuS016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccns/2016, title = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971}, doi = {10.1145/3017971}, isbn = {978-1-4503-4783-9}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.