default search action
1st CNS 2013: National Harbor, MD, USA
- IEEE Conference on Communications and Network Security, CNS 2013, National Harbor, MD, USA, October 14-16, 2013. IEEE 2013
- Sushil Jajodia, Wenjing Lou, Wade Trappe:
Welcome message. 1-2 - Xiaofan He, Huaiyu Dai, Peng Ning:
Dynamic adaptive anti-jamming via controlled mobility. 1-9 - Vireshwar Kumar, Jung-Min Park, T. Charles Clancy, Kaigui Bian:
PHY-layer authentication by introducing controlled inter symbol interference. 10-18 - Sunghyun Choi, Kang G. Shin:
Secure cooperative spectrum sensing in cognitive radio networks using interference signatures. 19-27 - Youngjune Gwon, Siamak Dastangoo, Carl Fossa, H. T. Kung:
Competing Mobile Network Game: Embracing antijamming and jamming strategies with reinforcement learning. 28-36 - Wei Peng, Feng Li, Keesook J. Han, Xukai Zou, Jie Wu:
T-dominance: Prioritized defense deployment for BYOD security. 37-45 - Jinxue Zhang, Rui Zhang, Yanchao Zhang, Guanhua Yan:
On the impact of social botnets for spam distribution and digital-influence manipulation. 46-54 - Shardul Vikram, Chao Yang, Guofei Gu:
NOMAD: Towards non-intrusive moving-target defense against web bots. 55-63 - Liyun Li, Suhas Mathur, Baris Coskun:
Gangs of the internet: Towards automatic discovery of peer-to-peer communities. 64-72 - Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Ehab Al-Shaer:
A game-theoretic approach for deceiving Remote Operating System Fingerprinting. 73-81 - Jason Gustafson, Jun Li:
Leveraging the crowds to disrupt phishing. 82-90 - Dong-Hoon Shin, Jinkyu Koo, Lei Yang, Xiaojun Lin, Saurabh Bagchi, Junshan Zhang:
Low-complexity secure protocols to defend cyber-physical systems against network isolation attacks. 91-99 - Zheng Yan, Mingjun Wang, Valtteri Niemi, Raimo Kantola:
Secure pervasive social networking based on multi-dimensional trust levels. 100-108 - Michael Zuba, Michael Fagan, Jun-Hong Cui, Zhijie Jerry Shi:
A vulnerability study of geographic routing in Underwater Acoustic Networks. 109-117 - Linke Guo, Chi Zhang, Yuguang Fang:
Privacy-preserving revocable content sharing in geosocial networks. 118-126 - Hongbo Liu, Yingying Chen, Mooi Choo Chuah, Jie Yang:
Towards self-healing smart grid via intelligent local controller switching under jamming. 127-135 - Boyang Wang, Baochun Li, Hui Li, Fenghua Li:
Certificateless public auditing for data integrity in the cloud. 136-144 - Jiawei Yuan, Shucheng Yu:
Secure and constant cost public cloud storage auditing with deduplication. 145-153 - Shun-Wen Hsiao, Yi-Ning Chen, Yeali S. Sun, Meng Chang Chen:
A cooperative botnet profiling and detection in virtualized environment. 154-162 - Gang Xu, George T. Amariucai, Yong Guan:
A lightweight argument system with efficient verifier. 163-171 - Huijun Xiong, Qingji Zheng, Xinwen Zhang, Danfeng Yao:
CloudSafe: Securing data processing within vulnerable virtualization environments in the cloud. 172-180 - Thomas R. Halford, Thomas A. Courtade, Keith M. Chugg:
Energy-efficient, secure group key agreement for ad hoc networks. 181-188 - Jun Zou, Arash Einolghozati, Faramarz Fekri:
Privacy-preserving item-based Collaborative Filtering using semi-distributed Belief Propagation. 189-197 - Yahya Sowti Khiabani, Shuangqing Wei:
Exponential secrecy against unbounded adversary using joint encryption and privacy amplification. 198-206 - Kyle Guan, Peter J. Winzer, Emina Soljanin, Antonia M. Tulino:
On the secrecy capacity of the space-division multiplexed fiber optical communication systems. 207-214 - Reihaneh Safavi-Naini, Pengwei Wang:
Efficient codes for Limited View adversarial channels. 215-223 - Amir Herzberg, Haya Schulmann:
Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org. 224-232 - Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
Secure hierarchical Virtual Private LAN Services for provider provisioned networks. 233-241 - Radia J. Perlman, Charlie Kaufman:
Byzantine robustness, hierarchy, and scalability. 242-250 - Huian Li, Yan Sui, Wei Peng, Xukai Zou, Feng Li:
A viewable e-voting scheme for environments with conflict of interest. 251-259 - Qi Duan, Ehab Al-Shaer, Jafar Haadi Jafarian:
Efficient Random Route Mutation considering flow and network constraints. 260-268 - Wei-Min Yao, Sonia Fahmy, Jiahong Zhu:
EasyScale: Easy mapping for large-scale network security experiments. 269-277 - Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Kun Sun:
A moving target defense mechanism for MANETs based on identity virtualization. 278-286 - Yang Liu, Wenji Chen, Yong Guan:
Identifying high-cardinality hosts from network-wide traffic measurements. 287-295 - Zhigang Chen, Xin Hu, Xiaoen Ju, Kang G. Shin:
LISA: Location information ScrAmbler for privacy protection on smartphones. 296-304 - A. Selcuk Uluagac, Sakthi V. Radhakrishnan, Cherita L. Corbett, Antony Baca, Raheem A. Beyah:
A passive technique for fingerprinting wireless devices with Wired-side Observations. 305-313 - Kekai Hu, Harikrishnan Chandrikakutty, Russell Tessier, Tilman Wolf:
Scalable hardware monitors to protect network processors from data plane attacks. 314-322 - Ziming Zhao, Gail-Joon Ahn:
Using instruction sequence abstraction for shellcode detection and attribution. 323-331 - Peter Mell, Richard E. Harang:
Limitations to threshold random walk scan detection and mitigating enhancements. 332-340 - Zhenlong Yuan, Yibo Xue, Yingfei Dong:
Harvesting unique characteristics in packet sequences for effective application classification. 341-349 - Christian Callegari, Alessandro Casella, Stefano Giordano, Michele Pagano, Teresa Pepe:
Sketch-based multidimensional IDS: A new approach for network anomaly detection. 350-358 - Stephen Moskal, Derek Kreider, Lydia Hays, Ben Wheeler, Shanchieh Jay Yang, Michael E. Kuhl:
Simulating attack behaviors in enterprise networks. 359-360 - Kriangkrai Limthong:
Performance of interval-based features for anomaly detection in network traffic. 361-362 - Björn Stelte:
ISP traceback - Attack path detection. 363-364 - Amir Herzberg, Haya Schulmann:
DNSSEC: Security and availability challenges. 365-366 - Christian S. Collberg, Aaron Gibson, Sam Martin, Nitin Shinde, Amir Herzberg, Haya Schulmann:
Provenance of exposure: Identifying sources of leaked documents. 367-368 - Hongyang Li, György Dán, Klara Nahrstedt:
FADEC: Fast authentication for dynamic electric vehicle charging. 369-370 - Pascal Urien:
Cloud of Secure Elements perspectives for mobile and cloud applications security. 371-372 - Hasen Nicanfar, Javad Hajipour, Farshid Agharebparast, Peyman TalebiFard, Victor C. M. Leung:
Privacy-preserving handover mechanism in 4G. 373-374 - Ray-Guang Cheng, Po-Yao Tsai, Ping-Chen Lin, Chia-Liang Lian, Tse-Han Liu, Hsien-Cheng Chou, Shiao-Li Tsao, Shanchieh Jay Yang:
Design and implementation of a Skype Protocol Analyzer. 375-376 - Xiaojing Liao, A. Selcuk Uluagac, Raheem A. Beyah:
S-Match: An efficient privacy-preserving profile matching scheme. 377-378 - Hong Wen, Xiaochun Zhang, Lei Cai, Jie Tang, Xiping Zhu, Yixin Jiang, Xiaobin Guo:
A novel detection scheme for malicious nodes in smart meter system. 379-380 - Yunus Sarikaya, Özgür Erçetin, Özgür Gürbüz:
Dynamic control for cooperative jamming with a non-altruistic node. 381-382 - Yuanpeng Xie, Jinsong Zhang, Ge Fu, Hong Wen, Qiyi Han, Xiping Zhu, Yixin Jiang, Xiaobin Guo:
The security issue of WSNs based on cloud computing. 383-384 - Juan A. Elices, Fernando Pérez-González:
Locating Tor hidden services through an interval-based traffic-correlation attack. 385-386 - Mansurul Bhuiyan, Aziz Mohaisen, Yannis Labrou, Mohammad Al Hasan:
Characterization of the dynamics and interactions of domain names and name server. 387-388 - Haitao Du, Shanchieh Jay Yang:
Sequential modeling for obfuscated network attack action sequences. 389-390 - Sriram Sankaran, Ramalingam Sridhar:
User-adaptive energy-aware security for mobile devices. 391-392 - Maurizio Talamo, Franco Arcieri, Christian H. Schunck, Andrea Callia D'Iddio:
Providing context-based security for inter-organizational electronic business processes. 393-394 - Qiyi Han, Lin Yu, Rui Zhang, Hong Wen, Yuanpeng Xie, Xiping Zhu, Yixin Jiang, Xiaobin Guo:
A P2P recommended trust nodes selection algorithm based on topological potential. 395-396 - Marcos Portnoi, Chien-Chung Shen:
Secure Zones: An Attribute-Based Encryption advisory system for safe firearms. 397-398 - Ahmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn:
ADAM: Automated detection and attribution of malicious webpages. 399-400 - Osman Kiraz, Albert Levi:
Maintaining trajectory privacy in mobile wireless sensor networks. 401-402 - Robert Koch, Mario Golling, Gabi Dreo Rodosek:
An architecture for supervising COTS products. 403-404 - Marcos Portnoi, Chien-Chung Shen:
Location-aware sign-on and key exchange using attribute-based encryption and Bluetooth beacons. 405-406 - Aziz Mohaisen, Omar Alrawi, Andrew G. West, Allison Mankin:
Babble: Identifying malware by its dialects. 407-408 - Robert Koch, Mario Golling, Gabi Dreo Rodosek:
Attracting sophisticated attacks to secure systems: A new honeypot architecture. 409-410 - Darrell M. Kienzle, Nathan S. Evans, Matthew C. Elder:
NICE: Network Introspection by Collaborating Endpoints. 411-412 - Yixin Jiang, Xiaobin Guo, Chao Li, Hong Wen, Cai Lei, Zhang Rui:
An efficient and secure search database scheme for cloud computing in smart grid. 413-414 - Michael Atighetchi, Nathaniel Soule, Partha P. Pal, Joseph P. Loyall, Asher Sinclair, Robert Grant:
Safe configuration of TLS connections. 415-422 - Aditi Gupta, Michael S. Kirkpatrick, Elisa Bertino:
A secure architecture design based on application isolation, code minimization and randomization. 423-429 - Amirali Sanatinia, Sashank Narain, Guevara Noubir:
Wireless spreading of WiFi APs infections using WPS flaws: An epidemiological and experimental study. 430-437 - Olgierd Pieczul, Simon N. Foley:
Discovering emergent norms in security logs. 438-445 - Christian Doerr:
Challenge tracing and mitigation under partial information and uncertainty. 446-453 - William M. Fitzgerald, Simon N. Foley:
Avoiding inconsistencies in the Security Content Automation Protocol. 454-461 - Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:
A framework for risk-aware role based access control. 462-469 - Mohammed Noraden Alsaleh, Saeed Al-Haj, Ehab Al-Shaer:
Objective metrics for firewall security: A holistic view. 470-477 - Jérôme François, Radu State, Thomas Engel:
Aggregated representations and metrics for scalable flow analysis. 478-482 - Hicham El Khoury, Romain Laborde, François Barrère, Abdelmalek Benzekri, Maroun Chamoun:
A specification method for analyzing fine grained network security mechanism configurations. 483-487 - Wei Yu, Guobin Xu, Zhijiang Chen, Paul Moulema:
A cloud computing based architecture for cyber security situation awareness. 488-492 - Yufeng Wang, Chiu C. Tan:
Looking at the overheads of transmitting encrypted data to the cloud. 493-497 - Xiongwei Xie, Weichao Wang:
Rootkit detection on virtual machines through deep information extraction at hypervisor-level. 498-503 - Boyang Wang, Ming Li, Sherman S. M. Chow, Hui Li:
Computing encrypted cloud data efficiently under multiple keys. 504-513 - Yue Tong, Jinyuan Sun, Sherman S. M. Chow, Pan Li:
Towards auditable cloud-assisted access of encrypted health data. 514-519 - Jiawei Yuan, Shucheng Yu:
Flexible and publicly verifiable aggregation query for outsourced databases in cloud. 520-524
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.