default search action
8th CNS 2020: Avignon, France
- 8th IEEE Conference on Communications and Network Security, CNS 2020, Avignon, France, June 29 - July 1, 2020. IEEE 2020, ISBN 978-1-7281-4760-4
- Aliyu Aliyu, Ying He, Iryna Yevseyeva, Cunjin Luo:
Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI) : IEEE CNS 20 Poster. 1-2 - Jianhua Sun, Kun Sun, Qi Li:
Towards a Believable Decoy System: Replaying Network Activities from Real System. 1-9 - Fabio Gritti, Lorenzo Fontana, Eric Gustafson, Fabio Pagani, Andrea Continella, Christopher Kruegel, Giovanni Vigna:
SYMBION: Interleaving Symbolic with Concrete Execution. 1-10 - Nathalie Tkauc, Thao Tran, Kevin Hernandez-Diaz, Fernando Alonso-Fernandez:
Cloud-Based Face and Speech Recognition for Access Control Applications. 1-8 - Sang-Yoon Chang, Younghee Park, Nikhil Vijayakumar Kengalahalli, Xiaobo Zhou:
Query-Crafting DoS Threats Against Internet DNS. 1-9 - Kyong-Tak Cho, Kang G. Shin, Yu Seung Kim, Byung-Ho Cha:
Off is Not Off: On the Security of Parked Vehicles. 1-9 - Jiachun Liao, Lalitha Sankar, Oliver Kosut, Flávio P. Calmon:
Maximal α-Leakage and its Properties. 1-6 - Logan O. Mailloux, Robert F. Mills:
Autonomous Space Resupply Vehicle Systems Security Design Principle Case Study. 1-8 - Takashi Harada, Ken Tanaka, Ryohei Ogasawara, Kenji Mikawa:
A Rule Reordering Method via Pairing Dependent Rules. 1-9 - Livinus Obiora Nweke, Stephen D. Wolthusen:
Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model. 1-6 - Ahmed S. Bendary, C. Emre Koksal:
Order-Optimal Scaling of Covert Communication over MIMO AWGN Channels. 1-9 - Michael Oxford, David Parker, Mark Ryan:
Quantitative Verification of Certificate Transparency Gossip Protocols. 1-9 - Allison Beemer, Eric Graves, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Authentication and Partial Message Correction over Adversarial Multiple-Access Channels. 1-6 - Martin Henze:
The Quest for Secure and Privacy-preserving Cloud-based Industrial Cooperation. 1-5 - Md Sajidul Islam Sajid, Jinpeng Wei, Md Rabbi Alam, Ehsan Aghaei, Ehab Al-Shaer:
DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware. 1-9 - Rawan Al-Shaer, Jonathan M. Spring, Eliana Christou:
Learning the Associations of MITRE ATT & CK Adversarial Techniques. 1-9 - Rizka Purwanto, Arindam Pal, Alan Blair, Sanjay Jha:
PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites. 1-9 - Paul M. Berges, Basavesh Ammanaghatta Shivakumar, Timothy Graziano, Ryan M. Gerdes, Z. Berkay Celik:
On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities. 1-6 - He Li, Vireshwar Kumar, Jung-Min Jerry Park, Yaling Yang:
Cumulative Message Authentication Codes for Resource-Constrained Networks. 1-9 - Jens Müller, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk:
Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption. 1-9 - Alireza Tahsini, Noah Dunstatter, Mina Guirguis, Chuadhry Mujeeb Ahmed:
DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games. 1-9 - Fengli Zhang, Qinghua Li:
Dynamic Risk-Aware Patch Scheduling. 1-9 - Ali Tabaja, Reuven Cohen:
When the Network of a Smart City Is Not So Smart. 1-9 - Federico Mancini, Solveig Bruvoll, John Melrose, Frederick A. Leve, Logan O. Mailloux, Raphael Ernst, Kellyn Rein, Stefano Fioravanti, Diego Merani, Robert Been:
A Security Reference Model for Autonomous Vehicles in Military Operations. 1-8 - Gregory Walkup, Sriharsha Etigowni, Dongyan Xu, Vincent Urias, Han W. Lin:
Forensic Investigation of Industrial Control Systems Using Deterministic Replay. 1-9 - Sayed Ashraf Mamun, Amlan Ganguly, Panos P. Markopoulos, Andres Kwasinski, Minseok Kwon:
Security Vulnerabilities of Server-Centric Wireless Datacenters. 1-9 - Efe U. A. Seyitoglu, Attila A. Yavuz, Muslum Ozgur Ozmen:
Compact and Resilient Cryptographic Tools for Digital Forensics. 1-9 - Xinda Wang, Shu Wang, Kun Sun, Archer L. Batcheller, Sushil Jajodia:
A Machine Learning Approach to Classify Security Patches into Vulnerability Types. 1-9 - Harshvardhan P. Joshi, Rudra Dutta:
Identifying P2P Communities in Network Traffic Using Measures of Community Connections : IEEE CNS 20 Poster. 1-2 - Chad Spensky, Aravind Machiry, Marcel Busch, Kevin Leach, Rick Housley, Christopher Kruegel, Giovanni Vigna:
TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems. 1-9 - Olga Chen, Aaron D. Jaggard, Catherine Meadows, Michael C. Shlanta:
NExtSteP: An Extensible Testbed for Network Covert Channels. 1-9 - Grigory Kabatiansky, Elena Egorova:
Adversarial multiple access channels and a new model of multimedia fingerprinting coding. 1-5 - Azadeh Tabiban, Yosr Jarraya, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack. 1-9 - Maximilian Bachl, Fares Meghdouri, Joachim Fabini, Tanja Zseby:
SparseIDS: Learning Packet Sampling with Reinforcement Learning. 1-9 - Duc C. Le, Nur Zincir-Heywood:
Exploring Adversarial Properties of Insider Threat Detection. 1-9 - Hamed Soroush, Massimiliano Albanese, Milad Asgari Mehrabadi, Ibifubara Iganibo, Marc Mosko, Jason H. Gao, David J. Fritz, Shantanu Rane, Eric Bier:
SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on Graphs. 1-10 - Shriti Naraparaju:
Fingerprinting Voice Applications on Smart Speakers over Encrypted Traffic. 1-2 - Kun Jin, Chaoyue Liu, Cathy Xia:
OTDA: a Unsupervised Optimal Transport framework with Discriminant Analysis for Keystroke Inference. 1-9 - Ross K. Gegan, Brian Perry, Dipak Ghosal, Matt Bishop:
Insider Attack Detection for Science DMZs Using System Performance Data. 1-9 - Long Jiao, Pu Wang, Ning Wang, Songlin Chen, Amir Alipour-Fanid, Junqing Le, Kai Zeng:
Efficient Physical Layer Group Key Generation in 5G Wireless Networks. 1-9 - Gbadebo Ayoade, Khandakar Ashrafi Akbar, Pracheta Sahoo, Yang Gao, Anmol Agarwal, Kangkook Jee, Latifur Khan, Anoop Singhal:
Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning. 1-9 - Giovanni Di Crescenzo, Lisa Bahler, Allen McIntosh:
Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks. 1-9 - Giulia Cervia, Germán Bassi, Mikael Skoglund:
Secure Strong Coordination. 1-6 - Guanjie Li, Chengzhe Lai:
Platoon Handover Authentication in 5G-V2X : IEEE CNS 20 Poster. 1-2 - Christopher Salls, Aravind Machiry, Adam Doupé, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Exploring Abstraction Functions in Fuzzing. 1-9 - Mohammad Saedi, Adrian Moore, Philip Perry, Mohammad Shojafar, Hanif Ullah, Jonathan Synnott, Ruth Brown, Ian Herwono:
Generation of realistic signal strength measurements for a 5G Rogue Base Station attack scenario. 1-7 - Benjamin Wu, Aaron B. Wagner, G. Edward Suh:
Optimal Mechanisms Under Maximal Leakage. 1-6 - Samuel Mergendahl, Jun Li:
Rapid: Robust and Adaptive Detection of Distributed Denial-of-Service Traffic from the Internet of Things. 1-9 - Linda Senigagliesi, Marco Baldi, Ennio Gambi:
Physical Layer Authentication Techniques based on Machine Learning with Data Compression. 1-6 - Ben Niu, Yahong Chen, Likun Zhang, Fenghua Li:
Membership Inference Attacks against MemGuard : IEEE CNS 20 Poster. 1-2 - Beste Seymen, Duygu Karaoglan Altop, Albert Levi:
Augmented Randomness for Secure Key Agreement using Physiological Signals. 1-9 - Shen Fu, Dong Qin, Daji Qiao, George T. Amariucai:
RUMBA-Mouse: Rapid User Mouse-Behavior Authentication Using a CNN-RNN Approach. 1-9 - Pinglan Liu, Wensheng Zhang:
Game Theoretic Approach for Secure and Efficient Heavy-Duty Smart Contracts. 1-9 - Ning Wang, Junqing Le, Weiwei Li, Long Jiao, Zhihao Li, Kai Zeng:
Privacy Protection and Efficient Incumbent Detection in Spectrum Sharing Based on Federated Learning. 1-9 - Rafael G. L. D'Oliveira, Salim El Rouayheb, Daniel Heinlein, David A. Karpuk:
Notes on Communication and Computation in Secure Distributed Matrix Multiplication. 1-6 - Luan Huy Pham, Massimiliano Albanese, Ritu Chadha, Cho-Yu Jason Chiang, Sridhar Venkatesan, Charles A. Kamhoua, Nandi Leslie:
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses. 1-9 - Lieneke Kusters, Alexandros Rikos, Frans M. J. Willems:
Modeling Temperature Behavior in the Helper Data for Secret-Key Binding with SRAM PUFs. 1-6 - Sujita Chaudhary, Austin O'Brien, Shengjie Xu:
Automated Post-Breach Penetration Testing through Reinforcement Learning. 1-2 - Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
A Large-scale Analysis of Cloud Service Abuse. 1-9 - Jonah Burgess, Domhnall Carlin, Philip O'Kane, Sakir Sezer:
REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic. 1-9 - Yuntao Wang, Zhou Su, Ning Zhang, Abderrahim Benslimane:
Sweet: Secure Wireless Energy Transfer with Electric Vehicles in Vehicular Energy Networks. 1-9 - Xinyu Lei, Guan-Hua Tu, Alex X. Liu, Tian Xie:
Fast and Secure kNN Query Processing in Cloud Computing. 1-9 - Fengli Zhang, Philip Dale Huff, Kylie McClanahan, Qinghua Li:
A Machine Learning-based Approach for Automated Vulnerability Remediation Analysis. 1-9 - A. K. M. Iqtidar Newaz, Amit Kumar Sikder, Leonardo Babun, A. Selcuk Uluagac:
HEKA: A Novel Intrusion Detection System for Attacks to Personal Medical Devices. 1-9 - Nebojsa Djosic, Bojan Nokovic, Salah Sharieh:
Machine Learning in Action: Securing IAM API by Risk Authentication Decision Engine. 1-4 - Ahasanun Nessa, Fatima Hussain, Xavier N. Fernando:
Adaptive Latency Reduction in LoRa for Mission Critical Communications in Mines. 1-7 - Ahmed Aziz, Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro:
SecureAIS - Securing Pairwise Vessels Communications. 1-9 - Carsten Rudolf Janda, Eduard A. Jorswieck, Moritz Wiese, Holger Boche:
Arbitrarily Varying Wiretap Channels with and without Non-Causal Side Information at the Jammer. 1-6 - Muhammad Shadi Hajar, M. Omar Al-Kadri, Harsha K. Kalutarage:
ETAREE: An Effective Trend-Aware Reputation Evaluation Engine for Wireless Medical Sensor Networks. 1-9 - Florian Wilkens, Mathias Fischer:
Towards Data-Driven Characterization of Brute-Force Attackers. 1-9 - Vishnu Teja Kilari, Ruozhou Yu, Satyajayant Misra, Guoliang Xue:
EARS: Enabling Private Feedback Updates in Anonymous Reputation Systems. 1-9 - Sarah M. Lehman, Abrar S. Alrumayh, Haibin Ling, Chiu C. Tan:
Stealthy Privacy Attacks Against Mobile AR Apps. 1-5 - Jan Grashöfer, Christian Titze, Hannes Hartenstein:
Attacks on Dynamic Protocol Detection of Open Source Network Security Monitoring Tools. 1-9 - Justin Grana:
Perturbing Inputs to Prevent Model Stealing. 1-9 - Jan Pennekamp, Fritz Alder, Roman Matzutt, Jan Tobias Mühlberg, Frank Piessens, Klaus Wehrle:
Secure End-to-End Sensing in Supply Chains. 1-6 - Dewan Chaulagain, Prabesh Poudel, Prabesh Pathak, Sankardas Roy, Doina Caragea, Guojun Liu, Xinming Ou:
Hybrid Analysis of Android Apps for Security Vetting using Deep Learning. 1-9 - Venkata Sai Krishna Avinash Nukala:
Website Cryptojacking Detection Using Machine Learning : IEEE CNS 20 Poster. 1-2 - Mattia Carlucci, Stefano Cecconello, Mauro Conti, Piero Romare:
Eathentication: A Chewing-based Authentication Method. 1-9
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.