default search action
11th NSS 2017: Helsinki, Finland
- Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola:
Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings. Lecture Notes in Computer Science 10394, Springer 2017, ISBN 978-3-319-64700-5
Cloud and IoT Security
- Keita Emura:
A Generic Construction of Secure-Channel Free Searchable Encryption with Multiple Keywords. 3-18 - Ian Oliver, Silke Holtmanns, Yoan Miche, Shankar Lal, Leo Hippeläinen, Aapo Kalliola, Sowmya Ravidas:
Experiences in Trusted Cloud Computing. 19-30 - Sara Ramezanian, Tommi Meskanen, Masoud Naderpour, Valtteri Niemi:
Private Membership Test Protocol with Low Communication Complexity. 31-45 - Leyou Zhang, Qing Wu:
Adaptively Secure Hierarchical Identity-Based Encryption over Lattice. 46-58 - Igor Kabashkin:
Risk Modelling of Blockchain Ecosystem. 59-70
Network Security
- Ahmad M. K. Nasser, Di Ma, Sam Lauzon:
Exploiting AUTOSAR Safety Mechanisms to Launch Security Attacks. 73-86 - Somanath Tripathy, Praveen Kumar:
CookiesWall: Preventing Session Hijacking Attacks Using Client Side Proxy. 87-98 - Fannv He, Yuqing Zhang, Donghang Liu, Ying Dong, Caiyun Liu, Chensi Wu:
Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent Analysis. 99-111 - Saeed Shafieian, Daniel Smith, Mohammad Zulkernine:
Detecting DNS Tunneling Using Ensemble Learning. 112-127 - Hanlu Chen, Yulong Fu, Zheng Yan:
Survey on Big Data Analysis Algorithms for Network Security Measurement. 128-142
Platform and Hardware Security
- Donghai Tian, Dingjun Qi, Li Zhan, Yuhang Yin, Changzhen Hu, Jingfeng Xue:
A Practical Method to Confine Sensitive API Invocations on Commodity Hardware. 145-159 - Patrick Eitschberger, Jörg Keller, Simon Holmbacka:
Hardware and Software Support for Transposition of Bit Matrices in High-Speed Encryption. 160-168 - Jiayuan Zhang, Yao Yao, Xiaoqi Li, Jian Xie, Gaofei Wu:
An Android Vulnerability Detection System. 169-183 - Amirhossein Gharib, Ali A. Ghorbani:
DNA-Droid: A Real-Time Android Ransomware Detection Framework. 184-198 - Lijun Jiang, Weizhi Meng, Yu Wang, Chunhua Su, Jin Li:
Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study. 199-213
Crypto and Others
- Lihua Wang, Takuya Hayashi, Yoshinori Aono, Le Trieu Phong:
A Generic yet Efficient Method for Secure Inner Product. 217-232 - Elena Reshetova, Filippo Bonazzi, N. Asokan:
Randomization Can't Stop BPF JIT Spray. 233-247 - Dang Nguyen, Dat Tran, Wanli Ma, Khoa Nguyen:
EEG-Based Random Number Generators. 248-256 - Tahmina Ahmed, Ravi S. Sandhu:
Safety of ABAC _\alpha Is Decidable. 257-272 - Naoki Nishikawa, Hideharu Amano, Keisuke Iwai:
Implementation of Bitsliced AES Encryption on CUDA-Enabled GPU. 273-287
Authentication and Key Management
- Jayaprakash Kar:
Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme. 291-300 - Joona Kannisto, Jarmo Harju:
The Time Will Tell on You: Exploring Information Leaks in SSH Public Key Authentication. 301-314 - Pinaki Sarkar:
Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS). 315-331 - Deepak Kumar Dalai, Dibyendu Roy:
A State Recovery Attack on ACORN-v1 and ACORN-v2. 332-345
International Workshop on Security Measurements of Cyber Networks (SMCN-2017)
- Yukun Zheng, Kun Lv, Changzhen Hu:
A Quantitative Method for Evaluating Network Security Based on Attack Graph. 349-358 - Rui Ma, Tianbao Zhu, Changzhen Hu, Chun Shan, Xiaolin Zhao:
SulleyEX: A Fuzzer for Stateful Network Protocol. 359-372 - Chun Shan, Shiyou Sun, Jingfeng Xue, Changzhen Hu, Hongjin Zhu:
A Detecting Method of Array Bounds Defects Based on Symbolic Execution. 373-385 - Yajie Dong, Zhenyan Liu, Yida Yan, Yong Wang, Tu Peng, Ji Zhang:
Machine Learning for Analyzing Malware. 386-398 - Yun Chen, Kun Lv, Changzhen Hu:
Optimal Attack Path Generation Based on Supervised Kohonen Neural Network. 399-412 - Rui Ma, Siyu Chen, Ke Ma, Changzhen Hu, Xiajing Wang:
Defenses Against Wormhole Attacks in Wireless Sensor Networks. 413-426 - Mohammed Al-Janabi, Peter Andras:
A Systematic Analysis of Random Forest Based Social Media Spam Classification. 427-438 - Chensi Wu, Yuqing Zhang, Ying Dong:
Application Research on Network Attacks and Defenses with Zachman Framework. 439-449 - Donghang Liu, Lihua Dong, Shaoqing Lv, Ying Dong, Fannv He, Chensi Wu, Yuqing Zhang, Hua Ma:
A Novel Approach to Network Security Situation Assessment Based on Attack Confidence. 450-463 - Roberto Saia:
A Discrete Wavelet Transform Approach to Fraud Detection. 464-474 - Hao Zhang, Kun Lv, Changzhen Hu:
An Automatic Vulnerabilities Classification Method Based on Their Relevance. 475-485 - Jing Li, Lihua Yin, Yunchuan Guo, Chao Li, Fenghua Li, Lihua Chen:
A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks. 486-496
International Workshop on Security in Big Data (SECBD-2017)
- Jialu Hao, Jian Liu, Hong Rong, Huimei Wang, Ming Xian:
OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating. 499-509 - Le Trieu Phong:
Privacy-Preserving Stochastic Gradient Descent with Multiple Distributed Trainers. 510-518
3rd International Workshop on 5G Security and Machine Learning (IW5GS-2017)
- Markku Vajaranta, Joona Kannisto, Jarmo Harju:
IPsec and IKE as Functions in SDN Controlled Network. 521-530 - Elena Ivannikova, Mikhail Zolotukhin, Timo Hämäläinen:
Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks. 531-543 - Mohsin Khan, Valtteri Niemi:
Concealing IMSI in 5G Network Using Identity Based Encryption. 544-554 - Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala:
A Formal Approach for Network Security Policy Relevancy Checking. 555-564 - Huiting Tan, Chaojing Tang, Chen Zhang, Shaolei Wang:
Area-Dividing Route Mutation in Moving Target Defense Based on SDN. 565-574 - Irina Mihai, Catalin Adrian Leordeanu, Alecsandru Patrascu:
Covert Channels Implementation and Detection in Virtual Environments. 575-584 - Silke Holtmanns, Yoan Miche, Ian Oliver:
Subscriber Profile Extraction and Modification via Diameter Interconnection. 585-594 - Lauri Isotalo:
5G Slicing as a Tool to Test User Equipment Against Advanced Persistent Threats. 595-603 - Tommi Meskanen, Masoud Naderpour, Valtteri Niemi:
Mind Your Right to Know: On De-anonymization Auditability in V2X Communications. 604-610
2nd International Workshop on Security of the Internet of Everything (SECIOE-2017)
- Lulu Liang, Kai Zheng, Qiankun Sheng, Wei Wang, Rong Fu, Xin Huang:
A Denial of Service Attack Method for IoT System in Photovoltaic Energy System. 613-622 - Chia-Mei Chen, Gu Hsin Lai, Yen-Chih Kuo, Tan-Ho Chang:
Improving Alert Accuracy for Smart Vehicles. 623-631 - Thomas W. Pieber, Thomas Ulz, Christian Steger, Rainer Matischek:
Hardware Secured, Password-based Authentication for Smart Sensors for the Industrial Internet of Things. 632-642 - Leo Hippelainen, Ian Oliver, Shankar Lal:
Towards Dependably Detecting Geolocation of Cloud Servers. 643-656 - Juha Nurmi, Mikko S. Niemelä:
Tor De-anonymisation Techniques. 657-671 - Michal Zima:
Coincer: Decentralised Trustless Platform for Exchanging Decentralised Cryptocurrencies. 672-682 - Deepak Kumar Dalai, Pinaki Sarkar:
Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet. 683-693 - Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle:
\mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems. 694-709 - Nian Xue, Chenglong Jiang, Xin Huang, Dawei Liu:
A Role-Based Access Control System for Intelligent Buildings. 710-720 - Smriti Bhatt, Farhan Patwa, Ravi S. Sandhu:
Access Control Model for AWS Internet of Things. 721-736 - Noria Foukia, David Billard, Eduardo Solana:
Privacy Verification Chains for IoT. 737-752 - Rendon Sánchez Angel Mecías, Octavio José Salcedo Parra, Correa Sánchez Lewys:
Platform for Detection of Holes in the Bogotá D.C. Road Network and Exposure of the Information in a Web Environment. 753-760
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.