Search dblp for Publications

export results for "toc:db/conf/iccns/iccns2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iccns/0001BS16,
  author       = {Monika Singh and
                  Divya Bansal and
                  Sanjeev Sofat},
  title        = {A Novel Technique to Characterize Social Network Users: Comparative
                  Study},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {75--79},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017977},
  doi          = {10.1145/3017971.3017977},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/0001BS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/AhmadWG16,
  author       = {Muhammad Aminu Ahmad and
                  Steve Woodhead and
                  Diane Gan},
  title        = {A Safeguard against Fast Self-propagating Malware},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {65--69},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017974},
  doi          = {10.1145/3017971.3017974},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/AhmadWG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChaimaaNH16,
  author       = {Belbergui Chaimaa and
                  Elkamoun Najib and
                  Rachid Hilal},
  title        = {A Dynamic Access Control Model for Cloud Computing Environments},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {21--29},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017979},
  doi          = {10.1145/3017971.3017979},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChaimaaNH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChangJYRL16,
  author       = {Rui Chang and
                  Liehui Jiang and
                  Qing Yin and
                  Lu Ren and
                  Qingfeng Liu},
  title        = {An Effective Usage and Access Control Scheme for Preventing Permission
                  Leak in a Trusted Execution Environment},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {6--10},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017973},
  doi          = {10.1145/3017971.3017973},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChangJYRL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/HasanJLC16,
  author       = {A. S. M. Touhidul Hasan and
                  Qingshan Jiang and
                  Chengming Li and
                  Lifei Chen},
  title        = {An Effective Model for Anonymizing Personal Location Trajectory},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {35--39},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017986},
  doi          = {10.1145/3017971.3017986},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/HasanJLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/IkeS16,
  author       = {Moses Ike and
                  Kamil Sara{\c{c}}},
  title        = {{PPEP:} {A} Deployable Privacy Preserving E-Commerce Protocol for
                  Electronic Goods},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {104--112},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017983},
  doi          = {10.1145/3017971.3017983},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/IkeS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Jin0S16,
  author       = {Cancan Jin and
                  Xinyu Feng and
                  Qingni Shen},
  title        = {Fully Secure Hidden Ciphertext Policy Attribute-Based Encryption with
                  Short Ciphertext Size},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {91--98},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017981},
  doi          = {10.1145/3017971.3017981},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Jin0S16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiuD16,
  author       = {Qiming Liu and
                  Changsong Deng},
  title        = {An Computer Virus Spreading Model with Delayed Quarantine in Internet},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {1--5},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017972},
  doi          = {10.1145/3017971.3017972},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiuD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LonkarS16,
  author       = {Bhupesh B. Lonkar and
                  Manoj R. Sayankar},
  title        = {Design and Implementation of Automatic Vehicle Tracker System for
                  Accidental Emergency},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {46--50},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017988},
  doi          = {10.1145/3017971.3017988},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LonkarS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/MaHLL16,
  author       = {Xiangjun Ma and
                  Lei Huang and
                  Ye Lu and
                  Chuanqi Li},
  title        = {Channel Estimation Algorithm based on Distance Judgement and Remainder
                  Compensation in {OFDM} System},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {40--45},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017987},
  doi          = {10.1145/3017971.3017987},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/MaHLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/MadhusudhanS16,
  author       = {R. Madhusudhan and
                  Shashidhara},
  title        = {An Efficient and Secure Authentication Scheme With User Anonymity
                  for Roaming Service in Global Mobile Networks},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {119--126},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3024085},
  doi          = {10.1145/3017971.3024085},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/MadhusudhanS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/MohanYFO16,
  author       = {Ratish Mohan and
                  Anis Yazidi and
                  Boning Feng and
                  B. John Oommen},
  title        = {Dynamic Ordering of Firewall Rules Using a Novel Swapping Window-based
                  Paradigm},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017975},
  doi          = {10.1145/3017971.3017975},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/MohanYFO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/RajeshS16,
  author       = {Harsha Mittemari Rajesh and
                  Insu Song},
  title        = {E-Commerce Websites/blogs - Hassles and Predicaments},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {56--61},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017990},
  doi          = {10.1145/3017971.3017990},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/RajeshS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ShangCWA016,
  author       = {Wenli Shang and
                  Junrong Cui and
                  Ming Wan and
                  Panfeng An and
                  Peng Zeng},
  title        = {Modbus Communication Behavior Modeling and {SVM} Intrusion Detection
                  Method},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {80--85},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017978},
  doi          = {10.1145/3017971.3017978},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ShangCWA016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/SinghBS16,
  author       = {Amardeep Singh and
                  Divya Bansal and
                  Sanjeev Sofat},
  title        = {A Novel Approach to Evade Attacks in Online Social Networks},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {70--74},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017976},
  doi          = {10.1145/3017971.3017976},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/SinghBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/VanHT16,
  author       = {Nguyen Thanh Van and
                  Bao Ho and
                  Tran Ngoc Thinh},
  title        = {An Anomaly-based Intrusion Detection Architecture Integrated on OpenFlow
                  Switch},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {99--103},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017982},
  doi          = {10.1145/3017971.3017982},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/VanHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/VanithaU16,
  author       = {C. N. Vanitha and
                  M. Usha},
  title        = {Eliminating Route Modifiers by Pattern Synthesis Process in Wireless
                  Sensor Networks},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {51--55},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017989},
  doi          = {10.1145/3017971.3017989},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/VanithaU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WangZYQ16,
  author       = {Zhilong Wang and
                  Tao Zhang and
                  Yu Yang and
                  Haipeng Qu},
  title        = {Comparison of Security Frameworks for Governmental Clouds between
                  United States and European Union},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {30--34},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017985},
  doi          = {10.1145/3017971.3017985},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WangZYQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WibowoB16,
  author       = {Andreyadi Wibowo and
                  Ari Moesriami Barmawi},
  title        = {Improving {NORMALS} Using Modified Baudot-Murray Code},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {113--118},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017984},
  doi          = {10.1145/3017971.3017984},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WibowoB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/XuS016,
  author       = {Jia{-}Chang Xu and
                  Kilho Shin and
                  Yu{-}Lu Liu},
  title        = {Detecting Fake Sites based on {HTML} Structure Analysis},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {86--90},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017980},
  doi          = {10.1145/3017971.3017980},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/XuS016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccns/2016,
  title        = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971},
  doi          = {10.1145/3017971},
  isbn         = {978-1-4503-4783-9},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics