


default search action
1st CNS 2013: National Harbor, MD, USA
- IEEE Conference on Communications and Network Security, CNS 2013, National Harbor, MD, USA, October 14-16, 2013. IEEE 2013

- Sushil Jajodia

, Wenjing Lou, Wade Trappe:
Welcome message. 1-2 - Xiaofan He, Huaiyu Dai, Peng Ning:

Dynamic adaptive anti-jamming via controlled mobility. 1-9 - Vireshwar Kumar

, Jung-Min Park, T. Charles Clancy, Kaigui Bian:
PHY-layer authentication by introducing controlled inter symbol interference. 10-18 - Sunghyun Choi, Kang G. Shin:

Secure cooperative spectrum sensing in cognitive radio networks using interference signatures. 19-27 - Youngjune Gwon, Siamak Dastangoo, Carl Fossa, H. T. Kung:

Competing Mobile Network Game: Embracing antijamming and jamming strategies with reinforcement learning. 28-36 - Wei Peng, Feng Li, Keesook J. Han, Xukai Zou, Jie Wu:

T-dominance: Prioritized defense deployment for BYOD security. 37-45 - Jinxue Zhang, Rui Zhang, Yanchao Zhang, Guanhua Yan:

On the impact of social botnets for spam distribution and digital-influence manipulation. 46-54 - Shardul Vikram, Chao Yang, Guofei Gu:

NOMAD: Towards non-intrusive moving-target defense against web bots. 55-63 - Liyun Li, Suhas Mathur, Baris Coskun:

Gangs of the internet: Towards automatic discovery of peer-to-peer communities. 64-72 - Mohammad Ashiqur Rahman

, Mohammad Hossein Manshaei, Ehab Al-Shaer:
A game-theoretic approach for deceiving Remote Operating System Fingerprinting. 73-81 - Jason Gustafson, Jun Li:

Leveraging the crowds to disrupt phishing. 82-90 - Dong-Hoon Shin, Jinkyu Koo, Lei Yang, Xiaojun Lin, Saurabh Bagchi, Junshan Zhang:

Low-complexity secure protocols to defend cyber-physical systems against network isolation attacks. 91-99 - Zheng Yan

, Mingjun Wang, Valtteri Niemi, Raimo Kantola:
Secure pervasive social networking based on multi-dimensional trust levels. 100-108 - Michael Zuba, Michael Fagan, Jun-Hong Cui, Zhijie Jerry Shi:

A vulnerability study of geographic routing in Underwater Acoustic Networks. 109-117 - Linke Guo, Chi Zhang, Yuguang Fang

:
Privacy-preserving revocable content sharing in geosocial networks. 118-126 - Hongbo Liu

, Yingying Chen
, Mooi Choo Chuah, Jie Yang:
Towards self-healing smart grid via intelligent local controller switching under jamming. 127-135 - Boyang Wang, Baochun Li, Hui Li, Fenghua Li:

Certificateless public auditing for data integrity in the cloud. 136-144 - Jiawei Yuan, Shucheng Yu

:
Secure and constant cost public cloud storage auditing with deduplication. 145-153 - Shun-Wen Hsiao

, Yi-Ning Chen, Yeali S. Sun, Meng Chang Chen:
A cooperative botnet profiling and detection in virtualized environment. 154-162 - Gang Xu, George T. Amariucai, Yong Guan:

A lightweight argument system with efficient verifier. 163-171 - Huijun Xiong, Qingji Zheng, Xinwen Zhang, Danfeng Yao

:
CloudSafe: Securing data processing within vulnerable virtualization environments in the cloud. 172-180 - Thomas R. Halford, Thomas A. Courtade, Keith M. Chugg:

Energy-efficient, secure group key agreement for ad hoc networks. 181-188 - Jun Zou, Arash Einolghozati, Faramarz Fekri

:
Privacy-preserving item-based Collaborative Filtering using semi-distributed Belief Propagation. 189-197 - Yahya Sowti Khiabani, Shuangqing Wei:

Exponential secrecy against unbounded adversary using joint encryption and privacy amplification. 198-206 - Kyle Guan, Peter J. Winzer, Emina Soljanin

, Antonia M. Tulino
:
On the secrecy capacity of the space-division multiplexed fiber optical communication systems. 207-214 - Reihaneh Safavi-Naini, Pengwei Wang:

Efficient codes for Limited View adversarial channels. 215-223 - Amir Herzberg, Haya Schulmann:

Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org. 224-232 - Madhusanka Liyanage

, Mika Ylianttila
, Andrei V. Gurtov
:
Secure hierarchical Virtual Private LAN Services for provider provisioned networks. 233-241 - Radia J. Perlman, Charlie Kaufman:

Byzantine robustness, hierarchy, and scalability. 242-250 - Huian Li, Yan Sui, Wei Peng, Xukai Zou, Feng Li:

A viewable e-voting scheme for environments with conflict of interest. 251-259 - Qi Duan, Ehab Al-Shaer, Jafar Haadi Jafarian:

Efficient Random Route Mutation considering flow and network constraints. 260-268 - Wei-Min Yao, Sonia Fahmy

, Jiahong Zhu:
EasyScale: Easy mapping for large-scale network security experiments. 269-277 - Massimiliano Albanese

, Alessandra De Benedictis
, Sushil Jajodia
, Kun Sun:
A moving target defense mechanism for MANETs based on identity virtualization. 278-286 - Yang Liu, Wenji Chen, Yong Guan:

Identifying high-cardinality hosts from network-wide traffic measurements. 287-295 - Zhigang Chen, Xin Hu, Xiaoen Ju, Kang G. Shin:

LISA: Location information ScrAmbler for privacy protection on smartphones. 296-304 - A. Selcuk Uluagac

, Sakthi V. Radhakrishnan, Cherita L. Corbett, Antony Baca, Raheem A. Beyah
:
A passive technique for fingerprinting wireless devices with Wired-side Observations. 305-313 - Kekai Hu, Harikrishnan Chandrikakutty, Russell Tessier, Tilman Wolf:

Scalable hardware monitors to protect network processors from data plane attacks. 314-322 - Ziming Zhao, Gail-Joon Ahn

:
Using instruction sequence abstraction for shellcode detection and attribution. 323-331 - Peter Mell, Richard E. Harang:

Limitations to threshold random walk scan detection and mitigating enhancements. 332-340 - Zhenlong Yuan, Yibo Xue, Yingfei Dong:

Harvesting unique characteristics in packet sequences for effective application classification. 341-349 - Christian Callegari

, Alessandro Casella, Stefano Giordano
, Michele Pagano
, Teresa Pepe:
Sketch-based multidimensional IDS: A new approach for network anomaly detection. 350-358 - Stephen Moskal, Derek Kreider, Lydia Hays, Ben Wheeler, Shanchieh Jay Yang, Michael E. Kuhl

:
Simulating attack behaviors in enterprise networks. 359-360 - Kriangkrai Limthong:

Performance of interval-based features for anomaly detection in network traffic. 361-362 - Björn Stelte:

ISP traceback - Attack path detection. 363-364 - Amir Herzberg

, Haya Schulmann:
DNSSEC: Security and availability challenges. 365-366 - Christian S. Collberg, Aaron Gibson, Sam Martin, Nitin Shinde, Amir Herzberg

, Haya Schulmann:
Provenance of exposure: Identifying sources of leaked documents. 367-368 - Hongyang Li, György Dán, Klara Nahrstedt:

FADEC: Fast authentication for dynamic electric vehicle charging. 369-370 - Pascal Urien

:
Cloud of Secure Elements perspectives for mobile and cloud applications security. 371-372 - Hasen Nicanfar, Javad Hajipour, Farshid Agharebparast, Peyman TalebiFard, Victor C. M. Leung

:
Privacy-preserving handover mechanism in 4G. 373-374 - Ray-Guang Cheng

, Po-Yao Tsai, Ping-Chen Lin, Chia-Liang Lian, Tse-Han Liu, Hsien-Cheng Chou, Shiao-Li Tsao, Shanchieh Jay Yang:
Design and implementation of a Skype Protocol Analyzer. 375-376 - Xiaojing Liao, A. Selcuk Uluagac, Raheem A. Beyah

:
S-Match: An efficient privacy-preserving profile matching scheme. 377-378 - Hong Wen, Xiaochun Zhang, Lei Cai, Jie Tang, Xiping Zhu, Yixin Jiang, Xiaobin Guo:

A novel detection scheme for malicious nodes in smart meter system. 379-380 - Yunus Sarikaya, Özgür Erçetin, Özgür Gürbüz:

Dynamic control for cooperative jamming with a non-altruistic node. 381-382 - Yuanpeng Xie, Jinsong Zhang, Ge Fu, Hong Wen, Qiyi Han, Xiping Zhu, Yixin Jiang, Xiaobin Guo:

The security issue of WSNs based on cloud computing. 383-384 - Juan A. Elices, Fernando Pérez-González

:
Locating Tor hidden services through an interval-based traffic-correlation attack. 385-386 - Mansurul Bhuiyan, Aziz Mohaisen, Yannis Labrou, Mohammad Al Hasan:

Characterization of the dynamics and interactions of domain names and name server. 387-388 - Haitao Du, Shanchieh Jay Yang:

Sequential modeling for obfuscated network attack action sequences. 389-390 - Sriram Sankaran

, Ramalingam Sridhar:
User-adaptive energy-aware security for mobile devices. 391-392 - Maurizio Talamo

, Franco Arcieri
, Christian H. Schunck
, Andrea Callia D'Iddio:
Providing context-based security for inter-organizational electronic business processes. 393-394 - Qiyi Han, Lin Yu, Rui Zhang, Hong Wen, Yuanpeng Xie, Xiping Zhu, Yixin Jiang, Xiaobin Guo:

A P2P recommended trust nodes selection algorithm based on topological potential. 395-396 - Marcos Portnoi, Chien-Chung Shen:

Secure Zones: An Attribute-Based Encryption advisory system for safe firearms. 397-398 - Ahmed E. Kosba, Aziz Mohaisen

, Andrew G. West
, Trevor Tonn:
ADAM: Automated detection and attribution of malicious webpages. 399-400 - Osman Kiraz, Albert Levi

:
Maintaining trajectory privacy in mobile wireless sensor networks. 401-402 - Robert Koch, Mario Golling, Gabi Dreo Rodosek:

An architecture for supervising COTS products. 403-404 - Marcos Portnoi, Chien-Chung Shen:

Location-aware sign-on and key exchange using attribute-based encryption and Bluetooth beacons. 405-406 - Aziz Mohaisen

, Omar Alrawi, Andrew G. West, Allison Mankin:
Babble: Identifying malware by its dialects. 407-408 - Robert Koch, Mario Golling, Gabi Dreo Rodosek:

Attracting sophisticated attacks to secure systems: A new honeypot architecture. 409-410 - Darrell M. Kienzle, Nathan S. Evans, Matthew C. Elder:

NICE: Network Introspection by Collaborating Endpoints. 411-412 - Yixin Jiang, Xiaobin Guo, Chao Li, Hong Wen, Cai Lei, Zhang Rui:

An efficient and secure search database scheme for cloud computing in smart grid. 413-414 - Michael Atighetchi, Nathaniel Soule, Partha P. Pal

, Joseph P. Loyall, Asher Sinclair, Robert Grant:
Safe configuration of TLS connections. 415-422 - Aditi Gupta, Michael S. Kirkpatrick, Elisa Bertino:

A secure architecture design based on application isolation, code minimization and randomization. 423-429 - Amirali Sanatinia, Sashank Narain, Guevara Noubir:

Wireless spreading of WiFi APs infections using WPS flaws: An epidemiological and experimental study. 430-437 - Olgierd Pieczul, Simon N. Foley

:
Discovering emergent norms in security logs. 438-445 - Christian Doerr:

Challenge tracing and mitigation under partial information and uncertainty. 446-453 - William M. Fitzgerald, Simon N. Foley

:
Avoiding inconsistencies in the Security Content Automation Protocol. 454-461 - Khalid Zaman Bijon, Ram Krishnan

, Ravi S. Sandhu:
A framework for risk-aware role based access control. 462-469 - Mohammed Noraden Alsaleh, Saeed Al-Haj, Ehab Al-Shaer:

Objective metrics for firewall security: A holistic view. 470-477 - Jérôme François, Radu State, Thomas Engel:

Aggregated representations and metrics for scalable flow analysis. 478-482 - Hicham El Khoury

, Romain Laborde
, François Barrère, Abdelmalek Benzekri, Maroun Chamoun:
A specification method for analyzing fine grained network security mechanism configurations. 483-487 - Wei Yu

, Guobin Xu, Zhijiang Chen, Paul Moulema:
A cloud computing based architecture for cyber security situation awareness. 488-492 - Yufeng Wang, Chiu C. Tan:

Looking at the overheads of transmitting encrypted data to the cloud. 493-497 - Xiongwei Xie, Weichao Wang:

Rootkit detection on virtual machines through deep information extraction at hypervisor-level. 498-503 - Boyang Wang, Ming Li, Sherman S. M. Chow

, Hui Li:
Computing encrypted cloud data efficiently under multiple keys. 504-513 - Yue Tong, Jinyuan Sun, Sherman S. M. Chow

, Pan Li
:
Towards auditable cloud-assisted access of encrypted health data. 514-519 - Jiawei Yuan, Shucheng Yu

:
Flexible and publicly verifiable aggregation query for outsourced databases in cloud. 520-524

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














