default search action
10th CNS 2022: Austin, TX, USA
- 10th IEEE Conference on Communications and Network Security, CNS 2022, Austin, TX, USA, October 3-5, 2022. IEEE 2022, ISBN 978-1-6654-6255-6
- Md Shah Alam, Sarkar Marshia Hossain, Jared Oluoch, Junghwan Kim:
A Novel Secure Physical Layer Key Generation Method in Connected and Autonomous Vehicles (CAVs). 1-6 - Khan Reaz, Gerhard Wunder:
Expectation Entropy as a Password Strength Metric. 1-2 - Jay Chung, Natalija Vlajic:
Survey of Remote TLS Vulnerability Scanning Tools and Snapshot of TLS Use in Banking Sector. 1-2 - Rizwan Patan, Reza M. Parizi, Seyedamin Pouriyeh, Mohammad S. Khan, Amir H. Gandomi:
A Secured Certificateless Sign-encrypted Blockchain Communication for Intelligent Transport System. 1-7 - Daniel Brown, Gabriele Cianfarani, Natalija Vlajic:
Real World Snapshot of Trends in IoT Device and Protocol Deployment: IEEE CNS 22 Poster. 1-2 - Ehsan Olyaei Torshizi, Utkrist Uprety, Werner Henkel:
Highly Efficient FDD Secret Key Generation using ESPRIT and Jump Removal on Phase Differences. 1-6 - Haider Ali, Mohannad Al Ameedi, Ananthram Swami, Rui Ning, Jiang Li, Hongyi Wu, Jin-Hee Cho:
ACADIA: Efficient and Robust Adversarial Attacks Against Deep Reinforcement Learning. 1-9 - Bruno P. Leao, Jagannadh Vempati, Ulrich Münz, Shashank Shekhar, Amit Pandey, David Hingos, Siddharth Bhela, Jing Wang, Chris Bilby:
Machine Learning-based False Data Injection Attack Detection and Localization in Power Grids. 1-8 - Hao Liu, Wenhai Sun, Nan Niu, Boyang Wang:
MultiEvasion: Evasion Attacks Against Multiple Malware Detectors. 10-18 - Giorgio Severi, Matthew Jagielski, Gökberk Yar, Yuxuan Wang, Alina Oprea, Cristina Nita-Rotaru:
Network-Level Adversaries in Federated Learning. 19-27 - Yang Hu, Ning Wang, Yimin Chen, Wenjing Lou, Y. Thomas Hou:
Transferability of Adversarial Examples in Machine Learning-based Malware Detection. 28-36 - Jinghao Zhao, Qianru Li, Zengwen Yuan, Zhehui Zhang, Songwu Lu:
5G Messaging: System Insecurity and Defenses. 37-45 - Alejandro Cohen, Rafael G. L. D'Oliveira, Chia-Yi Yeh, Hichem Guerboukha, Rabi Shrestha, Zhaoji Fang, Edward W. Knightly, Muriel Médard, Daniel M. Mittleman:
Absolute Security in High-Frequency Wireless Links. 46-54 - Jiaqi Xu, Xingya Zhao, Arjun Bakshi, Kannan Srinivasan:
Learning-Based Radio Fingerprinting for RFID Secure Authentication Scheme. 55-63 - Naureen Hoque, Hanif Rahbari, Cullen Rezendes:
Systematically Analyzing Vulnerabilities in the Connection Establishment Phase of Wi-Fi Systems. 64-72 - Edwin Yang, Song Fang, Dakun Shen:
DASK: Driving-Assisted Secret Key Establishment. 73-81 - Chongqi Guan, Xianda Chen, Guohong Cao, Sencun Zhu, Thomas La Porta:
HoneyCam: Scalable High-Interaction Honeypot for IoT Cameras Based on 360-Degree Video. 82-90 - Yuanyi Sun, Sencun Zhu, Yan Zhao, Pengfei Sun:
A User-Friendly Two-Factor Authentication Method against Real-Time Phishing Attacks. 91-99 - Balachandar Gowrisankar, Daisuke Mashima, Wen Shei Ong, Quanqi Ye, Ertem Esiner, Binbin Chen, Zbigniew Kalbarczyk:
GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZone. 100-108 - Omar Adel Ibrahim, Gabriele Oligeri, Roberto Di Pietro:
Eolo: IoT Proximity-based Authentication via Pressure Correlated Variations. 109-117 - Stefan Gvozdenovic, Johannes K. Becker, John Mikulskis, David Starobinski:
Multi-Protocol IoT Network Reconnaissance. 118-126 - Yuanxiong Guo, Rui Hu, Yanmin Gong:
Agent-Level Differentially Private Federated Learning via Compressed Model Perturbation. 127-135 - Dominik Roy George, Savio Sciancalepore:
PRM - Private Interference Discovery for IEEE 802.15 4 Networks. 136-144 - Qi Li, Keyang Yu, Dong Chen, Mo Sha, Long Cheng:
TrafficSpy: Disaggregating VPN-encrypted IoT Network Traffic for User Privacy Inference. 145-153 - Yeongwoo Kim, György Dán:
An Active Learning Approach to Dynamic Alert Prioritization for Real-time Situational Awareness. 154-162 - Yu Mi, David Mohaisen, An Wang:
AutoDefense: Reinforcement Learning Based Autoreactive Defense Against Network Attacks. 163-171 - Thomas Papastergiou, Roberto Perdisci, Manos Antonakakis:
Returning to Port: Efficient Detection of Home Router Devices. 172-180 - Mir Mehedi Ahsan Pritom, Shouhuai Xu:
Supporting Law-Enforcement to Cope with Blacklisted Websites: Framework and Case Study. 181-189 - Haipeng Li, Kaustubh Gupta, Chenggang Wang, Nirnimesh Ghose, Boyang Wang:
RadioNet: Robust Deep-Learning Based Radio Fingerprinting. 190-198 - Usama Saeed, Lingjia Liu, Kai Zeng, A. Robert Calderbank:
Securing Wireless Channels: Reliable Shared Secret Extraction through OTFS. 199-207 - Shreya Gupta, Chia-Yi Yeh, Edward W. Knightly:
Stealthy Off-Target Coupled-Control-Plane Jamming. 208-216 - Christopher Brant, Tuba Yavuz:
A Study on the Testing of Android Security Patches. 217-225 - Eric Pauley, Gang Tan, Danfeng Zhang, Patrick D. McDaniel:
Performant Binary Fuzzing without Source Code using Static Instrumentation. 226-235 - Yunlong Xing, Jiahao Cao, Xinda Wang, Sadegh Torabi, Kun Sun, Fei Yan, Qi Li:
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images. 236-244 - Daniel Olszewski, Weidong Zhu, Sandeep Sathyanarayana, Kevin R. B. Butler, Patrick Traynor:
HallMonitor: A Framework for Identifying Network Policy Violations in Software. 245-253 - Lisa Liu, Gints Engelen, Timothy M. Lynar, Daryl Essam, Wouter Joosen:
Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018. 254-262 - Nadia Niknami, Jie Wu:
Enhancing Load Balancing by Intrusion Detection System Chain on SDN Data Plane. 264-272 - Martin Fejrskov, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
Detecting DNS hijacking by using NetFlow data. 273-280 - Stephan Kleber, Frank Kargl:
Refining Network Message Segmentation with Principal Component Analysis. 281-289 - Tao Hou, Shengping Bi, Mingkui Wei, Tao Wang, Zhuo Lu, Yao Liu:
When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet. 290-298 - Jiyu Chen, Yiwen Guo, Hao Chen, Neil Gong:
Membership Inference Attack in Face of Data Transformations. 299-307 - Kilian Becher, Mirko Schäfer, Axel Schröpfer, Thorsten Strufe:
Efficient Public Verification of Confidential Supply-Chain Transactions. 308-316 - Shan Wang, Ming Yang, Bryan Pearson, Tingjian Ge, Xinwen Fu, Wei Zhao:
On Security of Proof-of-Policy (PoP) in the Execute-Order-Validate Blockchain Paradigm. 317-325 - Christoph Sendner, Lukas Iffländer, Sebastian Schindler, Michael Jobst, Alexandra Dmitrienko, Samuel Kounev:
Ransomware Detection in Databases through Dynamic Analysis of Query Sequences. 326-334 - Leila Rashidi, Sogand SadrHaghighi, Majid Ghaderi, Cristina Nita-Rotaru, Reihaneh Safavi-Naini:
Securing Communication Against Leaky Switches. 335-343 - Neji Mensi, Danda B. Rawat, Chunmei Liu:
Security Analysis of Mixed RF-FSO Blockage Attack Over Generalized RF Fading and Atmospheric Turbulence. 344-352 - Michael Lefebvre, Daniel W. Engels, Suku Nair:
On SDPN: Integrating the Software-Defined Perimeter (SDP) and the Software-Defined Network (SDN) Paradigms. 353-358 - Yunfei Ge, Quanyan Zhu:
Trust Threshold Policy for Explainable and Adaptive Zero-Trust Defense in Enterprise Networks. 359-364 - Yalin E. Sagduyu:
Free-Rider Games for Federated Learning with Selfish Clients in NextG Wireless Networks. 365-370 - Yuhui Wang, Junaid Farooq:
Proactive and Resilient UAV Orchestration for QoS Driven Connectivity and Coverage of Ground Users. 371-376 - Shutian Liu, Quanyan Zhu:
On the Role of Risk Perceptions in Cyber Insurance Contracts. 377-382 - Mst. Shapna Akter, Hossain Shahriar:
Towards Unsupervised Learning based Denoising of Cyber Physical System Data to Mitigate Security Concerns. 1-6 - Zhengguang Zhang, Marwan Krunz:
SIGTAM: A Tampering Attack on Wi-Fi Preamble Signaling and Countermeasures. 1-9 - Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang:
Alexa Skills: Security Vulnerabilities and Countermeasures. 1-9 - Andrew Morin, Tyler Moore:
Towards Cost-Balanced Intrusion Detection in OT Environments. 1-6 - Michael Vierhauser, Rebekka Wohlrab, Stefan Rass:
Towards Cost-Benefit-Aware Adaptive Monitoring for Cyber-Physical Systems. 1-6 - Andrew Morin, Tyler Moore:
Towards Cost-Balanced Intrusion Detection in OT Environments. 1-6 - Afshin Zivi, Christian Doerr:
Adding Zero Trust in BYOD Environments through Network Inspection. 1-6 - Ranju Kumari, Faheed A. F. Alenezi, Sejun Song, Baek-Young Choi:
ML-AWARE: A Machine Learning Approach for Detecting Wormhole Attack Resonance. 1-6 - Jared Gaskin, Bechir Hamdaoui, Weng-Keen Wong:
Tweak: Towards Portable Deep Learning Models for Domain-Agnostic LoRa Device Authentication. 1-9 - Faysal Hossain Shezan, Yingjie Lao, Minlong Peng, Xin Wang, Mingming Sun, Ping Li:
NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language. 1-9
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.