default search action
16th TrustCom / 11th BigDataSE / 14th ICESS 2017: Sydney, Australia
- 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-4906-6
The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2017)
TrustCom Security Track
- Tran Phuong Thao, Akira Yamada, Kosuke Murakami, Jumpei Urakawa, Yukiko Sawaya, Ayumu Kubota:
Classification of Landing and Distribution Domains Using Whois' Text Mining. 1-8 - Reza Farahbakhsh, Samin Mohammadi, Xiao Han, Ángel Cuevas, Noël Crespi:
Evolution of Publicly Disclosed Information in Facebook Profiles. 9-16 - Julian Schütte, Alexander Küchler, Dennis Titze:
Practical Application-Level Dynamic Taint Analysis of Android Apps. 17-24 - Jiangshan Yu, Mark Ryan, Liqun Chen:
Authenticating Compromisable Storage Systems. 25-32 - Youcef Imine, Ahmed Lounis, Abdelmadjid Bouabdallah:
Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control. 33-40 - Iakovos Gurulian, Carlton Shepherd, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks. 41-49 - Wubin Pan, Guang Cheng, Yongning Tang:
WENC: HTTPS Encrypted Traffic Classification Using Weighted Ensemble Learning and Markov Chain. 50-57 - Entao Luo, Guojun Wang, Qin Liu:
Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks. 58-64 - Degang Sun, Kun Yang, Zhixin Shi, Yan Wang:
A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior. 65-72 - Yunan Zhang, Chenghao Rong, Qingjia Huang, Yang Wu, Zeming Yang, Jianguo Jiang:
Based on Multi-features and Clustering Ensemble Method for Automatic Malware Categorization. 73-82 - Cuiping Shao, Huiyun Li:
Detection of Single Event Transients Based on Compressed Sensing. 83-88 - Qianqian Xing, Baosheng Wang, Xiaofeng Wang, Jing Tao, Liu Liu:
A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks. 89-95 - Nadeem Ahmed, Adeel Sadiq, Anum Farooq, Rabia Akram:
Securing the Neighbour Discovery Protocol in IPv6 State-ful Address Auto-Configuration. 96-103 - Indranil Ghosh Ray, Muttukrishnan Rajarajan:
A Public Key Encryption Scheme for String Identification. 104-111 - Anagi Gamachchi, Serdar Boztas:
Insider Threat Detection Through Attributed Graph Clustering. 112-119 - Lansheng Han, Shuxia Han, Wenjing Jia, Changhua Sun, Cai Fu:
Malware Discrimination Based on Reversed Association Task. 120-127 - Minjian Zhang, Jianwei Hou, Ziqi Zhang, Wenchang Shi, Bo Qin, Bin Liang:
Fine-Grained Fingerprinting Threats to Software-Defined Networks. 128-135 - Li Li, Tegawendé F. Bissyandé, Jacques Klein:
SimiDroid: Identifying and Explaining Similarities in Android Apps. 136-143 - Mohamed-Lamine Messai, Hamida Seba:
A Self-healing Key Pre-distribution Scheme for Multi-phase Wireless Sensor Networks. 144-151 - Julian Horsch, Manuel Huber, Sascha Wessel:
TransCrypt: Transparent Main Memory Encryption Using a Minimal ARM Hypervisor. 152-161 - Shiyu Ji, Tingting Chen:
On Designing Collusion-Resistant Incentive Mechanisms for Mobile Crowdsensing Systems. 162-169 - Wei Zhang, Dongdai Lin, Hailong Zhang, Cong Chen, Xiaojun Zhou:
A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol on ECC. 170-176 - Weizhong Qiang, Gongping Xu, Guozhong Sun, Tianqing Zhu, Hai Jin:
CloudController: A Writable and Heterogeneous-Adaptive Virtual Machine Introspection for Cloud Management. 177-184 - Martin Henze, Benedikt Wolters, Roman Matzutt, Torsten Zimmermann, Klaus Wehrle:
Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things. 185-192 - Shaofeng Zhang, Xi Xiao:
CSCdroid: Accurately Detect Android Malware via Contribution-Level-Based System Call Categorization. 193-200 - Mosarrat Jahan, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha:
Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data. 201-209 - Tasnuva Tithi, Chris Winstead, Ryan M. Gerdes:
Viability of Using Shadows Cast by Vehicles for Position Verification in Vehicle Platooning. 210-217 - Min Li, Yunzheng Liu, Min Yu, Gang Li, Yongjian Wang, Chao Liu:
FEPDF: A Robust Feature Extractor for Malicious PDF Detection. 218-224 - Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li, Jun Xiao:
Discovering Malicious Domains through Alias-Canonical Graph. 225-232 - Qian Lu, Haipeng Qu, Yuan Zhuang, Xi Jun Lin, Yanyong Zhu, Yunzheng Liu:
A Passive Client-based Approach to Detect Evil Twin Attacks. 233-239 - Sileshi Demesie Yalew, Gerald Q. Maguire Jr., Seif Haridi, Miguel Correia:
T2Droid: A TrustZone-Based Dynamic Analyser for Android Applications. 240-247 - Cong Zuo, Jun Shao, Zhe Liu, Yun Ling, Guiyi Wei:
Hidden-Token Searchable Public-Key Encryption. 248-254 - Xiang Feng, Shuguo Li:
A High-Speed and SPA-Resistant Implementation of ECC Point Multiplication Over GF(p). 255-260 - Zhanyong Tang, Kaiyuan Kuang, Lei Wang, Chao Xue, Xiaoqing Gong, Xiaojiang Chen, Dingyi Fang, Jie Liu, Zheng Wang:
SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation. 261-268 - Ashish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni, Deepak Puthal:
Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh Networks. 269-276 - Simon Yusuf Enoch, Mengmeng Ge, Jin B. Hong, Hani Alzaid, Dong Seong Kim:
Evaluating the Effectiveness of Security Metrics for Dynamic Networks. 277-284 - Shweta Bhandari, Frédéric Herbreteau, Vijay Laxmi, Akka Zemmari, Partha S. Roop, Manoj Singh Gaur:
SneakLeak: Detecting Multipartite Leakage Paths in Android Apps. 285-292 - Thomas Given-Wilson, Nisrine Jafri, Jean-Louis Lanet, Axel Legay:
An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT. 293-300 - Lyes Touati:
Grouping-Proofs Based Access Control Using KP-ABE for IoT Applications. 301-308 - Lyes Touati, Yacine Challal:
Mediator-Based Immediate Attribute Revocation Mechanism for CP-ABE in Multicast Group Communications. 309-314 - Da-Zhi Sun, Guangquan Xu:
One-Round Provably Secure Yoking-Proof for RFID Applications. 315-322 - Shuyuan Zhao, Yongzheng Zhang, Peng Chang:
Network Traffic Classification Using Tri-training Based on Statistical Flow Characteristics. 323-330 - Vineeta Jain, Shweta Bhandari, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah:
SniffDroid: Detection of Inter-App Privacy Leaks in Android. 331-338 - Jingkun Liu, Shuhao Li, Yongzheng Zhang, Jun Xiao, Peng Chang, Chengwei Peng:
Detecting DNS Tunnel through Binary-Classification Based on Behavior Features. 339-346 - Yuqin Qiu, Qingni Shen, Yang Luo, Cong Li, Zhonghai Wu:
A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in Cloud. 347-354 - Garima Modi, Vijay Laxmi, Smita Naval, Manoj Singh Gaur:
Improving Leakage Path Coverage in Android Apps. 355-362 - Ruoqing Zhang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Xiaoqi Yu, Zechao Liu, Zoe Lin Jiang:
A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation. 363-370 - Annie Gilda Roselin, Priyadarsi Nanda, Surya Nepal:
Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks. 371-378 - Khaled Aldebei, Helia Farhood, Wenjing Jia, Priyadarsi Nanda, Xiangjian He:
Sequential and Unsupervised Document Authorial Clustering Based on Hidden Markov Model. 379-385 - Fatemeh Rezaeibagha, Yi Mu:
Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems. 386-393
TrustCom Privacy Track
- Michael Bewong, Jixue Liu, Lin Liu, Jiuyong Li, Kim-Kwang Raymond Choo:
A Relative Privacy Model for Effective Privacy Preservation in Transactional Data. 394-401 - Shaobo Zhang, Guojun Wang, Qin Liu:
A Dual Privacy Preserving Scheme in Continuous Location-Based Services. 402-408 - Matthew Bradbury, Arshad Jhumka:
A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks. 409-416 - Mengmeng Yang, Tianqing Zhu, Lichuan Ma, Yang Xiang, Wanlei Zhou:
Privacy Preserving Collaborative Filtering via the Johnson-Lindenstrauss Transform. 417-424 - Shahzaib Tahir, Sushmita Ruj, Muttukrishnan Rajarajan:
An Efficient Disjunctive Query Enabled Ranked Searchable Encryption Scheme. 425-432 - Taochun Wang, Ji Zhang, Yonglong Luo, Kaizhong Zuo, Xintao Ding:
An Efficient and Secure Itinerary-Based Data Aggregation Algorithm for WSNs. 433-440 - Di Wu, Yu Zhang, Yinlong Liu:
Dummy Location Selection Scheme for K-Anonymity in Location Based Services. 441-448 - Mark A. Will, Ryan K. L. Ko:
Secure FPGA as a Service - Towards Secure Data Processing by Physicalizing the Cloud. 449-455 - Thông T. Nguyên, Siu Cheung Hui:
Privacy-Preserving Mechanisms for Parametric Survival Analysis with Weibull Distribution. 456-463 - Krzysztof Grining, Marek Klonowski, Malgorzata Sulkowska:
How to Cooperate Locally to Improve Global Privacy in Social Networks? On Amplification of Privacy Preserving Data Aggregation. 464-471 - Lingjuan Lyu, Yee Wei Law, Jiong Jin, Marimuthu Palaniswami:
Privacy-Preserving Aggregation of Smart Metering via Transformation and Encryption. 472-479 - Juru Zeng, Hong Chen, Weiling Lai, Ying Liu, Cuiping Li, Shan Wang:
Privacy-Preserving and Collusion-aware k-NN Query Processing in Two-tiered Sensor Networks. 480-486 - Yao Liu, Qingkai Zeng, Pinghai Yuan:
NodeLeaper: Lower Overhead Oblivious AVL Tree. 487-493 - Areg Karapetyan, Syafiq Kamarul Azman, Zeyar Aung:
Assessing the Privacy Cost in Centralized Event-Based Demand Response for Microgrids. 494-501 - Meng Liu, Xuyun Zhang, Chi Yang, Shaoning Pang, Deepak Puthal, Kaijun Ren:
Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control. 502-509 - Ayong Ye, Yacheng Li, Li Xu, Qing Li, Hui Lin:
A Trajectory Privacy-Preserving Algorithm Based on Road Networks in Continuous Location-Based Services. 510-516 - Haiying Xia, Wenxian Zhao, Zheng Zhou, Frank Jiang, Hai-Sheng Li, Xiangjian He:
Deformable Template Matching Using Proposal-Based Best-Buddies Similarity. 517-521 - Felix Konstantin Maurer, Till Neudecker, Martin Florian:
Anonymous CoinJoin Transactions with Arbitrary Values. 522-529
TrustCom Trust Track
- Rui Zhao, Zhao-Peng Meng, Yan Zheng, Qiangguo Jin, Anbang Ruan, Hanglun Xie:
SOMR: Towards a Security-Oriented MapReduce Infrastructure. 530-537 - Manel Mrabet, Yosra Ben Saied, Leïla Azouz Saïdane:
Feedback Entropy: A New Metric to Detect Unfair Rating Attacks for Trust Computing in Cloud Environments. 538-545 - Nikolaos Alexopoulos, Jörg Daubert, Max Mühlhäuser, Sheikh Mahbub Habib:
Beyond the Hype: On Using Blockchains in Trust Management for Authentication. 546-553 - Max Smith-Creasey, Muttukrishnan Rajarajan:
Adaptive Threshold Scheme for Touchscreen Gesture Continuous Authentication Using Sensor Trust. 554-561 - Oksana Kulyk, Benjamin Maximilian Reinheimer, Paul Gerber, Florian Volk, Melanie Volkamer, Max Mühlhäuser:
Advancing Trust Visualisations for Wider Applicability and User Acceptance. 562-569 - Thomas Lenz, Lukas Alber:
Towards Cross-Domain eID by Using Agile Mobile Authentication. 570-577 - Monika Santra, Sateesh K. Peddoju, A. K. Bhattacharjee, Arindam Khan:
Design and Analysis of a Modified Remote Attestation Protocol. 578-585 - Sana Hamdi, Alda Lopes Gançarski, Amel Bouzeghoub, Sadok Ben Yahia:
A New Fuzzy Clustering Approach for Reputation Management in OSNs. 586-593 - Adrian L. Shaw, Hamza Attak:
Exploring Granular flow Integrity for Interconnected Trusted Platforms. 594-601 - Bumjin Gwak, Heesuk Son, Jiyoon Kang, Dongman Lee:
IoT Trust Estimation in an Unknown Place Using the Opinions of I-Sharing Friends. 602-609 - Paolo Zicari, Roberto Interdonato, Andrea Tagarelli, Sergio Greco:
Controversy-Aware Hybrid Trust Inference in Online Social Networks. 610-617
TrustCom Forensics Track
- Dennis Titze, Michael Lux, Julian Schütte:
Ordol: Obfuscation-Resilient Detection of Libraries in Android Applications. 618-625 - Ana Nieto, Ruben Rios, Javier López:
A Methodology for Privacy-Aware IoT-Forensics. 626-633 - Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
A Fault-based Attack on AEZ v4.2. 634-641 - Ana Nieto, Ruben Rios, Javier López:
Digital Witness and Privacy in IoT: Anonymous Witnessing Approach. 642-649 - Jeffrey Todd McDonald, Ramya Manikyam, William Bradley Glisson, Todd R. Andel, Yuan Xiang Gu:
Enhanced Operating System Protection to Support Digital Forensic Investigations. 650-659 - Ibrahim Tariq Javed, Khalifa Toumi, Noël Crespi:
ProtectCall: Call Protection Based on User Reputation. 660-667 - Peng Zhang, Xiafei Zhang, Xiaoqiang Sun, Joseph K. Liu, Jianping Yu, Zoe Lin Jiang:
Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics. 668-674 - Denys A. Flores, Arshad Jhumka:
Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes. 675-682 - Zengpeng Li, Chunguang Ma, Ding Wang, Minghao Zhao, Qian Zhao, Lu Zhou:
Toward Proxy Re-encryption From Learning with Errors in the Exponent. 683-690 - Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng:
NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis. 691-698 - Daniel Jacobs, Kim-Kwang Raymond Choo, M. Tahar Kechadi, Nhien-An Le-Khac:
Volkswagen Car Entertainment System Forensics. 699-705 - Junwei Tang, Ruixuan Li, Hongmu Han, Heng Zhang, Xiwu Gu:
Detecting Permission Over-claim of Android Applications with Static and Semantic Analysis Approach. 706-713 - Yan Zhang, Lejian Liao, Chang Xu, Licheng Shi:
Situation Semantics Aggregator for Realtime Simulation on Organizational Behaviors. 714-720 - Hiroshi Nomaguchi, Atsuko Miyaji, Chunhua Su:
Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2. 721-728 - Sapana Rani, Dileep Kumar Koshley, Raju Halder:
Adapting MapReduce for Efficient Watermarking of Large Relational Dataset. 729-736 - Dominique Fleurbaaij, Mark Scanlon, Nhien-An Le-Khac:
Privileged Data Within Digital Evidence. 737-744
14th IEEE International Conference on Embedded Software and Systems (IEEE ICESS 2017)
- Xin Wang, Wei Zhang:
GPU Register Packing: Dynamically Exploiting Narrow-Width Operands to Improve Performance. 745-752 - Xin Wang, Wei Zhang:
A Sample-Based Dynamic CPU and GPU LLC Bypassing Method for Heterogeneous CPU-GPU Architectures. 753-760 - Shan Ding, Jinhui Wu, Guoqi Xie, Gang Zeng:
A Hybrid Heuristic-Genetic Algorithm with Adaptive Parameters for Static Task Scheduling in Heterogeneous Computing System. 761-766 - Long Cheng, Kai Huang, Gang Chen, Biao Hu, Alois C. Knoll:
Mixed-Criticality Control System with Performance and Robustness Guarantees. 767-775 - Chaoneng Xiang, Duo Liu, Shiming Li, Xiao Zhu, Yang Li, Jinting Ren, Liang Liang:
HiNextApp: A Context-Aware and Adaptive Framework for App Prediction in Mobile Systems. 776-783 - Takuro Yamamoto, Takuma Hara, Takuya Ishikawa, Hiroshi Oyama, Hiroaki Takada, Takuya Azumi:
TINET+TECS: Component-Based TCP/IP Protocol Stack for Embedded Systems. 784-791 - Hyuntae Cho:
Design and Implementation of a Lightweight Smart Insole for Gait Analysis. 792-797 - Kota Ishibashi, Myungryun Yoo, Takanori Yokoyama:
A Real-Time Operating System with CAN-Based Inter-Node Shared Resource Management and Distributed Shared Memory. 798-805 - Long Cheng, Zhihao Zhao, Kai Huang, Gang Chen, Alois C. Knoll:
McFTP: A Framework to Explore and Prototype Multi-core Thermal Managements on Real Processors. 806-814 - Ying Zhang, Zhishan Guo, Lingxiang Wang, Haoyi Xiong, Zhenkai Zhang:
Integrating Cache-Related Preemption Delay into GEDF Analysis for Multiprocessor Scheduling with On-chip Cache. 815-822 - Nathanael R. Weidler, Dane Brown, Samuel A. Mitchell, Joel Anderson, Jonathan R. Williams, Austin Costley, Chase Kunz, Christopher Wilkinson, Remy Wehbe, Ryan M. Gerdes:
Return-Oriented Programming on a Cortex-M Processor. 823-832 - Mahsa Foruhandeh, Ryan M. Gerdes:
Analysis of Authentication Parameters in Uplink Scenario of Heterogeneous Networks. 833-838 - Weiwen Chen, Keni Qiu, Jiqin Zhou, Yuanhui Ni, Yuanchao Xu:
Queuing Theory-Guided Performance Evaluation for a Reconfigurable High-Speed Device Interconnected Bus. 839-843 - Zhiyao Gong, Keni Qiu, Weiwen Chen, Yuanhui Ni, Yuanchao Xu, Jianlei Yang:
Pipeline Optimizations of Architecting STT-RAM as Registers in Rad-Hard Environment. 844-852
The 11th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2017)
- Ming Li, Qin Zhou:
Industrial Big Data Visualization: A Case Study Using Flight Data Recordings to Discover the Factors Affecting the Airplane Fuel Efficiency. 853-858 - Liying Jiang, Jiafeng Li, Li Zhuo, Ziqi Zhu:
Robust Vehicle Classification Based on the Combination of Deep Features and Handcrafted Features. 859-865 - Chen Hu, Jiaxin Miao, Zhuo Su, Xiaohong Shi, Qiang Chen, Xiaonan Luo:
Precision-Enhanced Image Attribute Prediction Model. 866-872 - Mohammed Al-Zobbi, Seyed A. Shahrestani, Chun Ruan:
Implementing A Framework for Big Data Anonymity and Analytics Access Control. 873-880 - Lihua Leng, Jeffery Zheng:
Mapping ECG Signal Sequences on Variant Maps. 881-884 - Ansar Rafique, Dimitri Van Landuyt, Vincent Reniers, Wouter Joosen:
Leveraging NoSQL for Scalable and Dynamic Data Encryption in Multi-tenant SaaS. 885-892 - Jorge Gonzalez-Lopez, Alberto Cano, Sebastián Ventura:
Large-Scale Multi-label Ensemble Learning on Spark. 893-900 - Isaac Triguero, Grazziela P. Figueredo, Mohammad Mesgarpour, Jonathan M. Garibaldi, Robert I. John:
Vehicle Incident Hot Spots Identification: An Approach for Big Data. 901-908 - N. Karthik, Ananthanarayana V. S.:
Sensor Data Modeling for Data Trustworthiness. 909-916 - Changqing Luo, Kaijin Zhang, Sergio Salinas, Pan Li:
Efficient Privacy-Preserving Outsourcing of Large-Scale QR Factorization. 917-924 - Karl E. Dierckens, Adrian B. Harrison, Carson K. Leung, Adrienne V. Pind:
A Data Science and Engineering Solution for Fast K-Means Clustering of Big Data. 925-932 - Patricia Miquilini, Rafael Geraldeli Rossi, Marcos G. Quiles, Vinícius Veloso de Melo, Márcio P. Basgalupp:
Automatically Design Distance Functions for Graph-Based Semi-Supervised Learning. 933-940 - Arua De M. Sousa, Ana Carolina Lorena, Márcio P. Basgalupp:
GEEK: Grammatical Evolution for Automatically Evolving Kernel Functions. 941-948
SECSOC2017 (1st IEEE International Workshop on Secure Smart Society in Next Generation Networks)
- Besfort Shala, Patrick Wacht, Ulrich Trick, Armin Lehmann, Bogdan V. Ghita, Stavros Shiaeles:
Trust Integration for Security Optimisation in P2P-Based M2M Applications. 949-954 - Leyla Roohi, Vanessa Teague:
Privacy-Preserving Queries over Secret-Shared Graph-Structured Data. 955-960 - Md. Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Kenneth Koon-Ho Wong:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS. 961-966 - Lei Wang, Shoufeng Cao, Lin Wan, Fengyu Wang:
Web Anomaly Detection Based on Frequent Closed Episode Rules. 967-972 - Yantong Zhan, Guoying Zhang, Yu Guo, Hang Meng, Xuejun Zhao:
Particle Size Measurement Based on Image Multivariate Multiscale Entropy. 973-977 - Qingru Li, Zhiyuan Tan, Aruna Jamdagni, Priyadarsi Nanda, Xiangjian He, Wei Han:
An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. 978-983
SOWN (6th IEEE International Workshop on Security and Optimization for Wireless Networks)
- Jin Li, Jinfu Chen, Minhuan Huang, Minmin Zhou, Lin Zhang, Wanggen Xie:
An Integration Testing Platform for Software Vulnerability Detection Method. 984-989 - Rong Ma, Jinbo Xiong, Mingwei Lin, Zhiqiang Yao, Hui Lin, Ayong Ye:
Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game Theory. 990-995 - Tomoaki Mimoto, Shinsaku Kiyomoto, Katsuya Tanaka, Atsuko Miyaji:
(p, N)-identifiability: Anonymity under Practical Adversaries. 996-1003 - Yifeng Mo, Shuguo Li:
Base Extent Optimization for RNS Montgomery Algorithm. 1004-1009 - Ghada Arfaoui, José Manuel Sánchez-Vílchez, Jean-Philippe Wary:
Security and Resilience in 5G: Current Challenges and Future Directions. 1010-1015
Trust WSN (3rd IEEE International Workshop on Trust and Security in Wireless Sensor Networks)
- Ava Ahadipour, Martin Schanzenbach:
A Survey on Authorization in Distributed Systems: Information Storage, Data Retrieval and Trust Evaluation. 1016-1023 - Mark A. Will, Ryan K. L. Ko, Silvino J. Schlickmann:
Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography. 1024-1031 - Kazuhide Fukushima, Rui Xu, Shinsaku Kiyomoto, Naofumi Homma:
Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure. 1032-1037
SPTIoT (International Symposium on Security, Privacy and Trust in Internet of Things)
- Haina Tang, Chunjing Han, Jingguo Ge:
Applications of Visualization Technology for Network Security. 1038-1042 - Mengmeng Ge, Jin B. Hong, Hani Alzaid, Dong Seong Kim:
Security Modeling and Analysis of Cross-Protocol IoT Devices. 1043-1048 - Faiza Medjek, Djamel Tandjaoui, Imed Romdhani, Nabil Djedjig:
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. 1049-1055 - Antonio La Marra, Fabio Martinelli, Paolo Mori, Andrea Saracino:
Implementing Usage Control in Internet of Things: A Smart Home Use Case. 1056-1063 - Jinnan Ding, Shuguo Li:
A Reconfigurable High-Speed ECC Processor Over NIST Primes. 1064-1069 - Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Peng Zhang:
Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties. 1070-1075 - Wybren van der Meer, Kim-Kwang Raymond Choo, M. Tahar Kechadi, Nhien-An Le-Khac:
Investigation and Automating Extraction of Thumbnails Produced by Image Viewers. 1076-1081 - Kaleb L. Leemaqz, Sharon X. Lee, Geoffrey J. McLachlan:
Corruption-Resistant Privacy Preserving Distributed EM Algorithm for Model-Based Clustering. 1082-1089 - Xi Zheng, Lei Pan, Hongxu Chen, Rick Di Pietro, Lynn Batten:
A Testbed for Security Analysis of Modern Vehicle Systems. 1090-1095 - Fan Jin, Vijay Varadharajan, Udaya Kiran Tupakula:
An Eclat Algorithm Based Energy Detection for Cognitive Radio Networks. 1096-1102
WCSF (3rd IEEE International Workshop on Cloud Security and Forensics)
- Varun Mahajan, Sateesh K. Peddoju:
Deployment of Intrusion Detection System in Cloud: A Performance-Based Study. 1103-1108 - Doan Hoang, Thanh Dat Dang:
FBRC: Optimization of task Scheduling in Fog-Based Region and Cloud. 1109-1114 - Robin Ankele, Andrew Simpson:
On the Performance of a Trustworthy Remote Entity in Comparison to Secure Multi-party Computation. 1115-1122 - Jeffery Garae, Ryan K. L. Ko, Janice Kho, Saidah Suwadi, Mark A. Will, Mark D. Apperley:
Visualizing the New Zealand Cyber Security Challenge for Attack Behaviors. 1123-1130 - Sam Shute, Ryan K. L. Ko, Sivadon Chaisiri:
Attribution Using Keyboard Row Based Behavioural Biometrics for Handedness Recognition. 1131-1138 - Amber Umair, Priyadarsi Nanda, Xiangjian He:
Online Social Network Information Forensics: A Survey on Use of Various Tools and Determining How Cautious Facebook Users are? 1139-1144 - Chathuranga Rathnayaka, Aruna Jamdagni:
An Efficient Approach for Advanced Malware Analysis Using Memory Forensic Technique. 1145-1150
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.