default search action
DSC 2017: Taipei, Taiwan
- IEEE Conference on Dependable and Secure Computing, DSC 2017, Taipei, Taiwan, August 7-10, 2017. IEEE 2017, ISBN 978-1-5090-5569-2
- Jung-Chin Lai, Frank Hsiao:
The calibration of gain error for time amplifier embedded in time-to-digital converter. 1-4 - Siang-Min Siao, Ming-Hwa Sheu, Shao-Yu Wang:
High-performance reverse converter design for the new four-moduli Set {22n, 2n+1, 2n/2+1, 2n/2-1}. 1-2 - Ravi S. Sandhu:
Keynote talk #1: Attribute-based access control: Insights and challenges. 34 - Michael Montoya:
Keynote Talk #2: Increase your security effectiveness by automating and machine learning. 35 - Xingjie Yu, Michael Thang Shiwen, Yingjiu Li, Robert Huijie Deng:
Fair deposits against double-spending for Bitcoin transactions. 44-51 - Ming-Hung Shih, J. Morris Chang:
Design and analysis of high performance crypt-NoSQL. 52-59 - Balamurugan Anandan, Chris Clifton:
Secure minimum weighted bipartite matching. 60-67 - D. J. Guan, Er-Shuo Zhuang, Yu-Shen Lin, I. C. Chung:
Detecting invalid digital signatures in batches. 68-72 - Chang-Han Wu, Ti-Jui Chen, Terng-Yin Hsu, Shang-Ho Tsai, Hsung-Pin Chang:
Design of applying FlexRay-bus to federated archiectecture for triple redundant reliable UAV flight control system. 73-78 - Michael Braly, Aaron Stillmaker, Bevan M. Baas:
A configurable H.265-compatible motion estimation accelerator architecture for realtime 4K video encoding in 65 nm CMOS. 79-85 - Wout Swinkels, Luc Claesen, Feng Xiao, Haibin Shen:
SVM point-based real-time emotion detection. 86-92 - Jia-Hao Wu, Wei-Liang Ou, Chih-Peng Fan:
NIR-based gaze tracking with fast pupil ellipse fitting for real-time wearable eye trackers. 93-97 - Zhenghao Hu, Yuanyuan Zhang, Hui Wang, Juanru Li, Wenbo Yang, Dawu Gu:
MIRAGE: Randomizing large chunk allocation via dynamic binary instrumentation. 98-106 - Yacine Hebbal, Sylvie Laniepce, Jean-Marc Menaud:
K-binID: Kernel binary code identification for Virtual Machine Introspection. 107-114 - Chia-Wei Wang, Shiuhpyng Shieh:
VMCloak: Toward a stealthy in-VM agent execution. 115-122 - Ruimin Sun, Xiaoyong Yuan, Andrew Lee, Matt Bishop, Donald E. Porter, Xiaolin Li, André Grégio, Daniela Oliveira:
The dose makes the poison - Leveraging uncertainty for effective malware detection. 123-130 - SeokHwan Choi, Doo-Hee Hwang, Yoon-Ho Choi:
Wireless intrusion prevention system using dynamic random forest against wireless MAC spoofing attack. 131-137 - Yacine Hebbal, Sylvie Laniepce, Jean-Marc Menaud:
Hidden process detection using kernel functions instrumentation. 138-145 - Yu-Wei Lee, Nur A. Touba:
Computing with obfuscated data in arbitrary logic circuits via noise insertion and cancellation. 146-152 - Shahzad Muzaffar, Owais Talaat Waheed, Zeyar Aung, Ibrahim Abe M. Elfadel:
Single-clock-cycle, multilayer encryption algorithm for single-channel IoT communications. 153-158 - Tien-Hung Tseng, Shu-Sheng Wang, Jian-You Chen, Kai-Chiang Wu:
Workload-aware lifetime Trojan based on statistical aging manipulation. 159-165 - Shayan Taheri, Jiann-Shiun Yuan:
Security analysis of computing systems from circuit-architectural perspective. 166-173 - Mohammed Saeed Alkatheiri, Yu Zhuang, Mikhail Korobkov, Abdur Rashid Sangi:
An experimental study of the state-of-the-art PUFs implemented on FPGAs. 174-180 - Mohammed Saeed Alkatheiri, Yu Zhuang:
Towards fast and accurate machine learning attacks of feed-forward arbiter PUFs. 181-187 - Jinlin Chen, Yi-Ren Chen, Shi-Chun Tsai, Yi-Bing Lin:
Implementing NFV system with OpenStack. 188-194 - Chih-Chieh Chen, Yi-Ren Chen, Wei-Chih Lu, Shi-Chun Tsai, Ming-Chuan Yang:
Detecting amplification attacks with Software Defined Networking. 195-201 - Joshua A. Alcorn, Scott Melton, C. Edward Chow:
SDN On-The-Go (OTG) physical testbed. 202-208 - Joshua A. Alcorn, Scott Melton, C. Edward Chow:
SDN data path confidence analysis. 209-216 - Perumalraja Rengaraju, V. Raja Ramanan, Chung-Horng Lung:
Detection and prevention of DoS attacks in Software-Defined Cloud networks. 217-223 - Chieh-Min Wang, Yu-Sung Wu, Hsing-Hsuan Chung:
FUSION: A unified application model for virtual mobile infrastructure. 224-231 - Shi-Feng Chen, Pao-Ann Hsiung:
Landslide prediction with model switching. 232-236 - Junying Huang, Zhengyu Huang, KuanHung Chen:
Combining low-cost Inertial Measurement Unit (IMU) and deep learning algorithm for predicting vehicle attitude. 237-239 - Trong-Yen Lee, Chia-Wei Kuo, I-An Lin:
High performance CAN/FlexRay gateway design for in-vehicle network. 240-242 - Bidi Ying, Amiya Nayak:
Location privacy-protection based on p-destination in mobile social networks: A game theory analysis. 243-250 - Jingzheng Wu, Mutian Yang, Tianyue Luo:
PACS: Pemission abuse checking system for android applictions based on review mining. 251-258 - Neil Wong Hon Chan, Shanchieh Jay Yang:
SCANNER: Sequence clustering of android resource accesses. 259-266 - Shin-Ming Cheng, Yu-Jyun Wang, Ying-Cheng Chen:
Secure location tracking of femtocells in heterogeneous cellular networks. 267-272 - Ehab Ashary, C. Edward Chow, Ashish Korpe, Donovan Thorpe:
R2D2: Right place, right path data delivery. 273-279 - Mohammad Al-Rubaie, Pei Yuan Wu, J. Morris Chang, Sun-Yuan Kung:
Privacy-preserving PCA on horizontally-partitioned data. 280-287 - Rashmi Girmal, Arun K. Somani:
LowLEAC: Low Leakage Energy Architecture for Caches. 288-295 - Cheng-Hao Chang, I-Chang Huang, Mu-Fan Lin, Shiann-Rong Kuang:
Design and implementation of a low-cost guided image filter for underwater image enhancement. 296-299 - Chun-Hsiang Lai, Yu-Cheng Cheng, Tung-Chi Wu, Yen-Jen Chang:
Radix-4 adder design with refined carry. 300-304 - Tsung-Yen Tsai, Jiun-Lang Huang:
Source code transformation for software-based on-line error detection. 305-309 - Muhammad Naveed Aman, Kee Chaing Chua, Biplab Sikdar:
Physically secure mutual authentication for IoT. 310-317 - Kaliappa Ravindran, Chin-Tser Huang:
Probabilistic treatment of service assurance in distributed information systems. 318-325 - Randy Garcia:
Federated identity hybrid cloud security considerations supporting first responders. 326-333 - Wan-Chi Chang, Pi-Chung Wang:
A write-operation-adaptable replication system for multiplayer cloud gaming. 334-339 - Fatimah M. Alturkistani, Saad S. Alaboodi, Sarfraz Nawaz Brohi:
An analytical model for reliability evaluation of cloud service provisioning systems. 340-347 - Daniel P. Richardson, Alan C. Lin, John M. Pecarina:
Hosting distributed databases on internet of things-scale devices. 352-357 - Abdelhamid Elgzil, C. Edward Chow, Amer Aljaedi, Naif Alamri:
Cyber anonymity based on software-defined networking and Onion Routing (SOR). 358-365 - Alamsyah, Agus Bejo, Teguh Bharata Adji:
AES S-box construction using different irreducible polynomial and constant 8-bit vector. 366-369 - Abir M'zah, Bruno Monsuez, Hycham Aboutaleb:
Deterministic microcode machine generation. 370-376 - Anastasia-Maria Leventi-Peetz, J.-V. Peetz:
Generating and exploring S-box multivariate quadratic equation systems with SageMath. 377-383 - Nils gentschen Felde, Tobias Guggemos, Tobias Heider, Dieter Kranzlmüller:
Secure group key distribution in constrained environments with IKEv2. 384-391 - James T. Yu:
A practical and effective approach to implementing High Availability Seamless Redundancy (HSR). 392-399 - Paul Laird, Sarah Jane Delany, Pierpaolo Dondio:
Multiparty computations in varying contexts. 400-407 - Chao-Chun Yeh, Han-Lin Lu, Yi-Hsuan Lee, Wei-Sheng Chou, Shih-Kun Huang:
CRAXTriage: A coverage based triage system. 408-415 - Keisuke Kato, Vitaly Klyuev:
Development of a network intrusion detection system using Apache Hadoop and Spark. 416-423 - Bin Yan, Lin You:
A novel public key encryption model based on transformed biometrics. 424-428 - Ka-Cheng Choi, Chi-Man Pun:
Adaptive image encryption for high capacity reversible data hiding. 429-432 - Wei Tim Liew, Kuo-Yu Tsai, Jia-Ning Luo, Ming-Hour Yang:
Novel designated ownership transfer with grouping proof. 433-440 - Di Zhuang, Sen Wang, J. Morris Chang:
FRiPAL: Face recognition in privacy abstraction layer. 441-448 - Yu-Chuan Huang, Chih-Wei Yi, Wen-Chih Peng, Hsing-Chen Lin, Ching-Yu Huang:
A study on multiple wearable sensors for activity recognition. 449-452 - Youngbin Pyo, Choong In Lee, Heejo Lee:
Visual analysis of corrupted video data in video event data recorders. 453-458 - Amit Singh Gaur, Jyoti Budakoti, Chung-Horng Lung, Alan Redmond:
IoT-equipped UAV communications with seamless vertical handover. 459-465 - Kuohua Sung, Terng-Yin Hsu:
FPGA implementation of OFDM baseband processor. 466-467 - Chih-Ta Lin, Cheng-Yu Tsai, Chuan-Kai Kao:
Lower power data transport protection for Internet of Things (IoT). 468-470 - Yung-Ting Lee, Chunn-Yenn Lin, Ming-Jhou Wang:
A novel UL power control scheme for a digital cellular repeater. 471-472 - Jia-Jhun Lin, Kai-Ching Wang, Shin-Ming Cheng, Yen-Chun Liu:
On exploiting SDN to facilitate IPv4/IPv6 coexistence and transition. 473-474 - Jian-Ya Chu, Yuan-Te Liao, Chun-Yi Hung, Terng-Yin Hsu:
Implementation of digital self-interference cancellation in LTE-based CCFD transmission. 475-476 - Juinn-Horng Deng, Pin-Nien Chen, Chia-Fang Lee, Yuan-Feng Chan, Yen-Chung Lin:
SDR measurement platform design for FMCW RADAR performance verification. 477-478 - Chih-Ning Lee, Yi-Ruei Chen, Wen-Guey Tzeng:
An online subject-based spam filter using natural language features. 479-487 - Yuan-Hsiang Su, Amir Rezapour, Wen-Guey Tzeng:
The forward-backward string: A new robust feature for botnet detection. 485-492 - Di Zhuang, J. Morris Chang:
PeerHunter: Detecting peer-to-peer botnets through community behavior analysis. 493-500 - Kaliappa Ravindran, Yassine Wardei, A. Kodia, Michael Iannelli, Arun Adiththan, Steven Drager:
Assessment of QoS adaptation and cyber-defense mechanisms in networked systems. 501-508 - Tzu-Hsien Chuang, Shin-Ying Huang, Ching-Hao Mao, Albert B. Jeng, Hahn-Ming Lee:
Ziffersystem: A novel malware distribution detection system. 509-515 - Jian Mao, Zheng Leong Chua, Zhenkai Liang:
Enabling practical experimentation in cyber-security training. 516-517 - Chin-Wei Tien, Jian-Wei Liao, Shun-Chieh Chang, Sy-Yen Kuo:
Memory forensics using virtual machine introspection for Malware analysis. 518-519 - Jun Gu, Tzonelih Hwang:
Comment on 'improving the security of protocols of quantum key agreement solely using bell states and bell measurement'. 520-521 - Cheng-Yu Tsai, Chuan-Kai Kao, Chuan-Yuan Huang, Zhi-Wei Lin:
Resisting attacks from rogue HeNB. 522-523 - Chih-Ta Lin, Sung-Lin Wu, Mei-Lin Lee:
Cyber attack and defense on industry control systems. 524-526 - Chong Kuan Chen, Shen-Chieh Lan, Shiuhpyng Winston Shieh:
Shellcode detector for malicious document hunting. 527-528 - Jhen-Li Wang, Yen-Chung Chen:
An SDN-based defensive solution against DHCP attacks in the virtualization environment. 529-530 - Shan-Jung Fu, Huai-Wen Hsu, Yi-Chih Kao, Shi-Chun Tsai, Chien-Chao Tseng:
An autoblocking mechanism for firewall service. 531-532 - Bo Liu, Chi-Man Pun:
Multi-object splicing forgery detection using noise level difference. 533-534 - Xinyin Zhang, Yuanye Cao, Mutian Yang, Jingzheng Wu, Tianyue Luo, Yueqin Liu:
Droidrevealer: Automatically detecting Mysterious Codes in Android applications. 535-536 - Dongkyu Lee, Jeonghun Cho, Daejin Park:
Interactive simulation platform using processing-based visualization for safe collision-free autonomous driving development. 537-538 - Yu-Wei Cheng, Yin-Tsung Hwang:
Development of a high throughput image compression system for optical remote sensing. 539-540
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.