


default search action
16th TrustCom / 11th BigDataSE / 14th ICESS 2017: Sydney, Australia
- 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-4906-6

The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2017)
TrustCom Security Track
- Tran Phuong Thao, Akira Yamada, Kosuke Murakami, Jumpei Urakawa, Yukiko Sawaya, Ayumu Kubota:

Classification of Landing and Distribution Domains Using Whois' Text Mining. 1-8 - Reza Farahbakhsh, Samin Mohammadi, Xiao Han, Ángel Cuevas

, Noël Crespi:
Evolution of Publicly Disclosed Information in Facebook Profiles. 9-16 - Julian Schütte, Alexander Küchler

, Dennis Titze:
Practical Application-Level Dynamic Taint Analysis of Android Apps. 17-24 - Jiangshan Yu

, Mark Ryan
, Liqun Chen
:
Authenticating Compromisable Storage Systems. 25-32 - Youcef Imine

, Ahmed Lounis
, Abdelmadjid Bouabdallah:
Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control. 33-40 - Iakovos Gurulian, Carlton Shepherd, Eibe Frank, Konstantinos Markantonakis

, Raja Naeem Akram
, Keith Mayes:
On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks. 41-49 - Wubin Pan, Guang Cheng, Yongning Tang:

WENC: HTTPS Encrypted Traffic Classification Using Weighted Ensemble Learning and Markov Chain. 50-57 - Entao Luo, Guojun Wang, Qin Liu:

Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks. 58-64 - Degang Sun, Kun Yang, Zhixin Shi, Yan Wang:

A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior. 65-72 - Yunan Zhang, Chenghao Rong, Qingjia Huang, Yang Wu, Zeming Yang, Jianguo Jiang:

Based on Multi-features and Clustering Ensemble Method for Automatic Malware Categorization. 73-82 - Cuiping Shao, Huiyun Li:

Detection of Single Event Transients Based on Compressed Sensing. 83-88 - Qianqian Xing, Baosheng Wang, Xiaofeng Wang, Jing Tao, Liu Liu:

A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks. 89-95 - Nadeem Ahmed, Adeel Sadiq, Anum Farooq, Rabia Akram:

Securing the Neighbour Discovery Protocol in IPv6 State-ful Address Auto-Configuration. 96-103 - Indranil Ghosh Ray, Muttukrishnan Rajarajan:

A Public Key Encryption Scheme for String Identification. 104-111 - Anagi Gamachchi, Serdar Boztas

:
Insider Threat Detection Through Attributed Graph Clustering. 112-119 - Lansheng Han, Shuxia Han, Wenjing Jia

, Changhua Sun, Cai Fu:
Malware Discrimination Based on Reversed Association Task. 120-127 - Minjian Zhang, Jianwei Hou, Ziqi Zhang, Wenchang Shi, Bo Qin, Bin Liang:

Fine-Grained Fingerprinting Threats to Software-Defined Networks. 128-135 - Li Li

, Tegawendé F. Bissyandé, Jacques Klein
:
SimiDroid: Identifying and Explaining Similarities in Android Apps. 136-143 - Mohamed-Lamine Messai

, Hamida Seba:
A Self-healing Key Pre-distribution Scheme for Multi-phase Wireless Sensor Networks. 144-151 - Julian Horsch

, Manuel Huber
, Sascha Wessel:
TransCrypt: Transparent Main Memory Encryption Using a Minimal ARM Hypervisor. 152-161 - Shiyu Ji, Tingting Chen:

On Designing Collusion-Resistant Incentive Mechanisms for Mobile Crowdsensing Systems. 162-169 - Wei Zhang, Dongdai Lin, Hailong Zhang, Cong Chen, Xiaojun Zhou:

A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol on ECC. 170-176 - Weizhong Qiang, Gongping Xu, Guozhong Sun, Tianqing Zhu, Hai Jin:

CloudController: A Writable and Heterogeneous-Adaptive Virtual Machine Introspection for Cloud Management. 177-184 - Martin Henze

, Benedikt Wolters, Roman Matzutt, Torsten Zimmermann, Klaus Wehrle
:
Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things. 185-192 - Shaofeng Zhang, Xi Xiao:

CSCdroid: Accurately Detect Android Malware via Contribution-Level-Based System Call Categorization. 193-200 - Mosarrat Jahan

, Partha Sarathi Roy
, Kouichi Sakurai, Aruna Seneviratne
, Sanjay Jha
:
Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data. 201-209 - Tasnuva Tithi, Chris Winstead, Ryan M. Gerdes:

Viability of Using Shadows Cast by Vehicles for Position Verification in Vehicle Platooning. 210-217 - Min Li, Yunzheng Liu, Min Yu, Gang Li

, Yongjian Wang, Chao Liu:
FEPDF: A Robust Feature Extractor for Malicious PDF Detection. 218-224 - Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li, Jun Xiao:

Discovering Malicious Domains through Alias-Canonical Graph. 225-232 - Qian Lu

, Haipeng Qu, Yuan Zhuang, Xi Jun Lin, Yanyong Zhu, Yunzheng Liu:
A Passive Client-based Approach to Detect Evil Twin Attacks. 233-239 - Sileshi Demesie Yalew, Gerald Q. Maguire Jr.

, Seif Haridi, Miguel Correia:
T2Droid: A TrustZone-Based Dynamic Analyser for Android Applications. 240-247 - Cong Zuo, Jun Shao, Zhe Liu, Yun Ling, Guiyi Wei:

Hidden-Token Searchable Public-Key Encryption. 248-254 - Xiang Feng, Shuguo Li:

A High-Speed and SPA-Resistant Implementation of ECC Point Multiplication Over GF(p). 255-260 - Zhanyong Tang, Kaiyuan Kuang, Lei Wang, Chao Xue, Xiaoqing Gong, Xiaojiang Chen, Dingyi Fang, Jie Liu, Zheng Wang

:
SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation. 261-268 - Ashish Nanda

, Priyadarsi Nanda, Xiangjian He
, Aruna Jamdagni, Deepak Puthal
:
Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh Networks. 269-276 - Simon Yusuf Enoch

, Mengmeng Ge, Jin B. Hong
, Hani Alzaid, Dong Seong Kim
:
Evaluating the Effectiveness of Security Metrics for Dynamic Networks. 277-284 - Shweta Bhandari

, Frédéric Herbreteau, Vijay Laxmi
, Akka Zemmari
, Partha S. Roop, Manoj Singh Gaur:
SneakLeak: Detecting Multipartite Leakage Paths in Android Apps. 285-292 - Thomas Given-Wilson, Nisrine Jafri, Jean-Louis Lanet, Axel Legay:

An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT. 293-300 - Lyes Touati:

Grouping-Proofs Based Access Control Using KP-ABE for IoT Applications. 301-308 - Lyes Touati, Yacine Challal

:
Mediator-Based Immediate Attribute Revocation Mechanism for CP-ABE in Multicast Group Communications. 309-314 - Da-Zhi Sun, Guangquan Xu:

One-Round Provably Secure Yoking-Proof for RFID Applications. 315-322 - Shuyuan Zhao, Yongzheng Zhang, Peng Chang:

Network Traffic Classification Using Tri-training Based on Statistical Flow Characteristics. 323-330 - Vineeta Jain

, Shweta Bhandari
, Vijay Laxmi
, Manoj Singh Gaur, Mohamed Mosbah
:
SniffDroid: Detection of Inter-App Privacy Leaks in Android. 331-338 - Jingkun Liu, Shuhao Li, Yongzheng Zhang, Jun Xiao, Peng Chang, Chengwei Peng:

Detecting DNS Tunnel through Binary-Classification Based on Behavior Features. 339-346 - Yuqin Qiu, Qingni Shen, Yang Luo, Cong Li, Zhonghai Wu:

A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in Cloud. 347-354 - Garima Modi, Vijay Laxmi

, Smita Naval
, Manoj Singh Gaur:
Improving Leakage Path Coverage in Android Apps. 355-362 - Ruoqing Zhang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Xiaoqi Yu, Zechao Liu, Zoe Lin Jiang:

A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation. 363-370 - Annie Gilda Roselin, Priyadarsi Nanda, Surya Nepal

:
Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks. 371-378 - Khaled Aldebei, Helia Farhood

, Wenjing Jia
, Priyadarsi Nanda, Xiangjian He
:
Sequential and Unsupervised Document Authorial Clustering Based on Hidden Markov Model. 379-385 - Fatemeh Rezaeibagha

, Yi Mu:
Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems. 386-393
TrustCom Privacy Track
- Michael Bewong

, Jixue Liu, Lin Liu
, Jiuyong Li
, Kim-Kwang Raymond Choo
:
A Relative Privacy Model for Effective Privacy Preservation in Transactional Data. 394-401 - Shaobo Zhang, Guojun Wang, Qin Liu:

A Dual Privacy Preserving Scheme in Continuous Location-Based Services. 402-408 - Matthew Bradbury

, Arshad Jhumka:
A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks. 409-416 - Mengmeng Yang, Tianqing Zhu, Lichuan Ma, Yang Xiang, Wanlei Zhou

:
Privacy Preserving Collaborative Filtering via the Johnson-Lindenstrauss Transform. 417-424 - Shahzaib Tahir, Sushmita Ruj, Muttukrishnan Rajarajan:

An Efficient Disjunctive Query Enabled Ranked Searchable Encryption Scheme. 425-432 - Taochun Wang

, Ji Zhang, Yonglong Luo, Kaizhong Zuo, Xintao Ding
:
An Efficient and Secure Itinerary-Based Data Aggregation Algorithm for WSNs. 433-440 - Di Wu, Yu Zhang, Yinlong Liu:

Dummy Location Selection Scheme for K-Anonymity in Location Based Services. 441-448 - Mark A. Will, Ryan K. L. Ko

:
Secure FPGA as a Service - Towards Secure Data Processing by Physicalizing the Cloud. 449-455 - Thông T. Nguyên, Siu Cheung Hui:

Privacy-Preserving Mechanisms for Parametric Survival Analysis with Weibull Distribution. 456-463 - Krzysztof Grining, Marek Klonowski

, Malgorzata Sulkowska:
How to Cooperate Locally to Improve Global Privacy in Social Networks? On Amplification of Privacy Preserving Data Aggregation. 464-471 - Lingjuan Lyu, Yee Wei Law

, Jiong Jin
, Marimuthu Palaniswami
:
Privacy-Preserving Aggregation of Smart Metering via Transformation and Encryption. 472-479 - Juru Zeng, Hong Chen, Weiling Lai, Ying Liu, Cuiping Li, Shan Wang:

Privacy-Preserving and Collusion-aware k-NN Query Processing in Two-tiered Sensor Networks. 480-486 - Yao Liu, Qingkai Zeng, Pinghai Yuan:

NodeLeaper: Lower Overhead Oblivious AVL Tree. 487-493 - Areg Karapetyan

, Syafiq Kamarul Azman
, Zeyar Aung
:
Assessing the Privacy Cost in Centralized Event-Based Demand Response for Microgrids. 494-501 - Meng Liu

, Xuyun Zhang
, Chi Yang, Shaoning Pang
, Deepak Puthal
, Kaijun Ren:
Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control. 502-509 - Ayong Ye, Yacheng Li, Li Xu, Qing Li, Hui Lin:

A Trajectory Privacy-Preserving Algorithm Based on Road Networks in Continuous Location-Based Services. 510-516 - Haiying Xia, Wenxian Zhao, Zheng Zhou, Frank Jiang, Hai-Sheng Li, Xiangjian He

:
Deformable Template Matching Using Proposal-Based Best-Buddies Similarity. 517-521 - Felix Konstantin Maurer, Till Neudecker, Martin Florian:

Anonymous CoinJoin Transactions with Arbitrary Values. 522-529
TrustCom Trust Track
- Rui Zhao, Zhao-Peng Meng, Yan Zheng

, Qiangguo Jin, Anbang Ruan, Hanglun Xie:
SOMR: Towards a Security-Oriented MapReduce Infrastructure. 530-537 - Manel Mrabet

, Yosra Ben Saied, Leïla Azouz Saïdane:
Feedback Entropy: A New Metric to Detect Unfair Rating Attacks for Trust Computing in Cloud Environments. 538-545 - Nikolaos Alexopoulos, Jörg Daubert, Max Mühlhäuser, Sheikh Mahbub Habib

:
Beyond the Hype: On Using Blockchains in Trust Management for Authentication. 546-553 - Max Smith-Creasey, Muttukrishnan Rajarajan:

Adaptive Threshold Scheme for Touchscreen Gesture Continuous Authentication Using Sensor Trust. 554-561 - Oksana Kulyk, Benjamin Maximilian Reinheimer, Paul Gerber, Florian Volk, Melanie Volkamer, Max Mühlhäuser:

Advancing Trust Visualisations for Wider Applicability and User Acceptance. 562-569 - Thomas Lenz, Lukas Alber:

Towards Cross-Domain eID by Using Agile Mobile Authentication. 570-577 - Monika Santra, Sateesh Kumar Peddoju, A. K. Bhattacharjee, Arindam Khan:

Design and Analysis of a Modified Remote Attestation Protocol. 578-585 - Sana Hamdi, Alda Lopes Gançarski, Amel Bouzeghoub, Sadok Ben Yahia

:
A New Fuzzy Clustering Approach for Reputation Management in OSNs. 586-593 - Adrian L. Shaw, Hamza Attak:

Exploring Granular flow Integrity for Interconnected Trusted Platforms. 594-601 - Bumjin Gwak, Heesuk Son, Jiyoon Kang, Dongman Lee:

IoT Trust Estimation in an Unknown Place Using the Opinions of I-Sharing Friends. 602-609 - Paolo Zicari

, Roberto Interdonato, Andrea Tagarelli, Sergio Greco
:
Controversy-Aware Hybrid Trust Inference in Online Social Networks. 610-617
TrustCom Forensics Track
- Dennis Titze, Michael Lux

, Julian Schütte:
Ordol: Obfuscation-Resilient Detection of Libraries in Android Applications. 618-625 - Ana Nieto, Ruben Rios, Javier López:

A Methodology for Privacy-Aware IoT-Forensics. 626-633 - Hassan Qahur Al Mahri, Leonie Simpson

, Harry Bartlett
, Ed Dawson
, Kenneth Koon-Ho Wong
:
A Fault-based Attack on AEZ v4.2. 634-641 - Ana Nieto, Ruben Rios, Javier López:

Digital Witness and Privacy in IoT: Anonymous Witnessing Approach. 642-649 - Jeffrey Todd McDonald, Ramya Manikyam, William Bradley Glisson

, Todd R. Andel, Yuan Xiang Gu:
Enhanced Operating System Protection to Support Digital Forensic Investigations. 650-659 - Ibrahim Tariq Javed, Khalifa Toumi, Noël Crespi:

ProtectCall: Call Protection Based on User Reputation. 660-667 - Peng Zhang, Xiafei Zhang, Xiaoqiang Sun, Joseph K. Liu, Jianping Yu, Zoe Lin Jiang:

Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics. 668-674 - Denys A. Flores, Arshad Jhumka:

Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes. 675-682 - Zengpeng Li

, Chunguang Ma, Ding Wang
, Minghao Zhao, Qian Zhao, Lu Zhou:
Toward Proxy Re-encryption From Learning with Errors in the Exponent. 683-690 - Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng:

NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis. 691-698 - Daniel Jacobs, Kim-Kwang Raymond Choo

, M. Tahar Kechadi
, Nhien-An Le-Khac
:
Volkswagen Car Entertainment System Forensics. 699-705 - Junwei Tang

, Ruixuan Li, Hongmu Han, Heng Zhang, Xiwu Gu:
Detecting Permission Over-claim of Android Applications with Static and Semantic Analysis Approach. 706-713 - Yan Zhang, Lejian Liao, Chang Xu

, Licheng Shi:
Situation Semantics Aggregator for Realtime Simulation on Organizational Behaviors. 714-720 - Hiroshi Nomaguchi, Atsuko Miyaji

, Chunhua Su:
Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2. 721-728 - Sapana Rani, Dileep Kumar Koshley, Raju Halder

:
Adapting MapReduce for Efficient Watermarking of Large Relational Dataset. 729-736 - Dominique Fleurbaaij, Mark Scanlon

, Nhien-An Le-Khac
:
Privileged Data Within Digital Evidence. 737-744
14th IEEE International Conference on Embedded Software and Systems (IEEE ICESS 2017)
- Xin Wang, Wei Zhang

:
GPU Register Packing: Dynamically Exploiting Narrow-Width Operands to Improve Performance. 745-752 - Xin Wang, Wei Zhang

:
A Sample-Based Dynamic CPU and GPU LLC Bypassing Method for Heterogeneous CPU-GPU Architectures. 753-760 - Shan Ding, Jinhui Wu, Guoqi Xie, Gang Zeng:

A Hybrid Heuristic-Genetic Algorithm with Adaptive Parameters for Static Task Scheduling in Heterogeneous Computing System. 761-766 - Long Cheng, Kai Huang, Gang Chen, Biao Hu, Alois C. Knoll

:
Mixed-Criticality Control System with Performance and Robustness Guarantees. 767-775 - Chaoneng Xiang, Duo Liu, Shiming Li, Xiao Zhu, Yang Li, Jinting Ren, Liang Liang:

HiNextApp: A Context-Aware and Adaptive Framework for App Prediction in Mobile Systems. 776-783 - Takuro Yamamoto, Takuma Hara, Takuya Ishikawa, Hiroshi Oyama, Hiroaki Takada, Takuya Azumi:

TINET+TECS: Component-Based TCP/IP Protocol Stack for Embedded Systems. 784-791 - Hyuntae Cho:

Design and Implementation of a Lightweight Smart Insole for Gait Analysis. 792-797 - Kota Ishibashi, Myungryun Yoo, Takanori Yokoyama

:
A Real-Time Operating System with CAN-Based Inter-Node Shared Resource Management and Distributed Shared Memory. 798-805 - Long Cheng, Zhihao Zhao

, Kai Huang, Gang Chen, Alois C. Knoll
:
McFTP: A Framework to Explore and Prototype Multi-core Thermal Managements on Real Processors. 806-814 - Ying Zhang

, Zhishan Guo
, Lingxiang Wang, Haoyi Xiong
, Zhenkai Zhang
:
Integrating Cache-Related Preemption Delay into GEDF Analysis for Multiprocessor Scheduling with On-chip Cache. 815-822 - Nathanael R. Weidler, Dane Brown, Samuel A. Mitchell, Joel Anderson, Jonathan R. Williams, Austin Costley, Chase Kunz, Christopher Wilkinson, Remy Wehbe, Ryan M. Gerdes:

Return-Oriented Programming on a Cortex-M Processor. 823-832 - Mahsa Foruhandeh, Ryan M. Gerdes:

Analysis of Authentication Parameters in Uplink Scenario of Heterogeneous Networks. 833-838 - Weiwen Chen, Keni Qiu, Jiqin Zhou, Yuanhui Ni, Yuanchao Xu:

Queuing Theory-Guided Performance Evaluation for a Reconfigurable High-Speed Device Interconnected Bus. 839-843 - Zhiyao Gong, Keni Qiu, Weiwen Chen, Yuanhui Ni, Yuanchao Xu, Jianlei Yang:

Pipeline Optimizations of Architecting STT-RAM as Registers in Rad-Hard Environment. 844-852
The 11th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2017)
- Ming Li, Qin Zhou:

Industrial Big Data Visualization: A Case Study Using Flight Data Recordings to Discover the Factors Affecting the Airplane Fuel Efficiency. 853-858 - Liying Jiang, Jiafeng Li, Li Zhuo, Ziqi Zhu:

Robust Vehicle Classification Based on the Combination of Deep Features and Handcrafted Features. 859-865 - Chen Hu, Jiaxin Miao, Zhuo Su, Xiaohong Shi, Qiang Chen, Xiaonan Luo:

Precision-Enhanced Image Attribute Prediction Model. 866-872 - Mohammed Al-Zobbi, Seyed A. Shahrestani

, Chun Ruan:
Implementing A Framework for Big Data Anonymity and Analytics Access Control. 873-880 - Lihua Leng, Jeffery Zheng:

Mapping ECG Signal Sequences on Variant Maps. 881-884 - Ansar Rafique, Dimitri Van Landuyt

, Vincent Reniers, Wouter Joosen:
Leveraging NoSQL for Scalable and Dynamic Data Encryption in Multi-tenant SaaS. 885-892 - Jorge Gonzalez-Lopez, Alberto Cano

, Sebastián Ventura:
Large-Scale Multi-label Ensemble Learning on Spark. 893-900 - Isaac Triguero, Grazziela P. Figueredo

, Mohammad Mesgarpour, Jonathan M. Garibaldi, Robert I. John:
Vehicle Incident Hot Spots Identification: An Approach for Big Data. 901-908 - N. Karthik

, Ananthanarayana V. S.:
Sensor Data Modeling for Data Trustworthiness. 909-916 - Changqing Luo

, Kaijin Zhang, Sergio Salinas, Pan Li
:
Efficient Privacy-Preserving Outsourcing of Large-Scale QR Factorization. 917-924 - Karl E. Dierckens, Adrian B. Harrison, Carson K. Leung

, Adrienne V. Pind:
A Data Science and Engineering Solution for Fast K-Means Clustering of Big Data. 925-932 - Patricia Miquilini, Rafael Geraldeli Rossi

, Marcos G. Quiles
, Vinícius Veloso de Melo, Márcio P. Basgalupp
:
Automatically Design Distance Functions for Graph-Based Semi-Supervised Learning. 933-940 - Arua De M. Sousa, Ana Carolina Lorena, Márcio P. Basgalupp

:
GEEK: Grammatical Evolution for Automatically Evolving Kernel Functions. 941-948
SECSOC2017 (1st IEEE International Workshop on Secure Smart Society in Next Generation Networks)
- Besfort Shala

, Patrick Wacht, Ulrich Trick
, Armin Lehmann
, Bogdan V. Ghita
, Stavros Shiaeles
:
Trust Integration for Security Optimisation in P2P-Based M2M Applications. 949-954 - Leyla Roohi, Vanessa Teague:

Privacy-Preserving Queries over Secret-Shared Graph-Structured Data. 955-960 - Md. Iftekhar Salam

, Leonie Simpson
, Harry Bartlett
, Ed Dawson
, Josef Pieprzyk
, Kenneth Koon-Ho Wong
:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS. 961-966 - Lei Wang, Shoufeng Cao, Lin Wan, Fengyu Wang:

Web Anomaly Detection Based on Frequent Closed Episode Rules. 967-972 - Yantong Zhan, Guoying Zhang, Yu Guo, Hang Meng, Xuejun Zhao:

Particle Size Measurement Based on Image Multivariate Multiscale Entropy. 973-977 - Qingru Li, Zhiyuan Tan

, Aruna Jamdagni, Priyadarsi Nanda, Xiangjian He
, Wei Han:
An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. 978-983
SOWN (6th IEEE International Workshop on Security and Optimization for Wireless Networks)
- Jin Li, Jinfu Chen, Minhuan Huang, Minmin Zhou, Lin Zhang, Wanggen Xie:

An Integration Testing Platform for Software Vulnerability Detection Method. 984-989 - Rong Ma

, Jinbo Xiong, Mingwei Lin
, Zhiqiang Yao, Hui Lin, Ayong Ye:
Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game Theory. 990-995 - Tomoaki Mimoto, Shinsaku Kiyomoto, Katsuya Tanaka, Atsuko Miyaji

:
(p, N)-identifiability: Anonymity under Practical Adversaries. 996-1003 - Yifeng Mo, Shuguo Li:

Base Extent Optimization for RNS Montgomery Algorithm. 1004-1009 - Ghada Arfaoui

, José Manuel Sánchez-Vílchez, Jean-Philippe Wary:
Security and Resilience in 5G: Current Challenges and Future Directions. 1010-1015
Trust WSN (3rd IEEE International Workshop on Trust and Security in Wireless Sensor Networks)
- Ava Ahadipour, Martin Schanzenbach

:
A Survey on Authorization in Distributed Systems: Information Storage, Data Retrieval and Trust Evaluation. 1016-1023 - Mark A. Will, Ryan K. L. Ko

, Silvino J. Schlickmann:
Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography. 1024-1031 - Kazuhide Fukushima

, Rui Xu, Shinsaku Kiyomoto, Naofumi Homma:
Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure. 1032-1037
SPTIoT (International Symposium on Security, Privacy and Trust in Internet of Things)
- Haina Tang, Chunjing Han, Jingguo Ge:

Applications of Visualization Technology for Network Security. 1038-1042 - Mengmeng Ge, Jin B. Hong

, Hani Alzaid, Dong Seong Kim
:
Security Modeling and Analysis of Cross-Protocol IoT Devices. 1043-1048 - Faiza Medjek, Djamel Tandjaoui, Imed Romdhani, Nabil Djedjig:

Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. 1049-1055 - Antonio La Marra, Fabio Martinelli, Paolo Mori

, Andrea Saracino
:
Implementing Usage Control in Internet of Things: A Smart Home Use Case. 1056-1063 - Jinnan Ding, Shuguo Li:

A Reconfigurable High-Speed ECC Processor Over NIST Primes. 1064-1069 - Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Peng Zhang:

Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties. 1070-1075 - Wybren van der Meer, Kim-Kwang Raymond Choo

, M. Tahar Kechadi
, Nhien-An Le-Khac
:
Investigation and Automating Extraction of Thumbnails Produced by Image Viewers. 1076-1081 - Kaleb L. Leemaqz, Sharon X. Lee, Geoffrey J. McLachlan

:
Corruption-Resistant Privacy Preserving Distributed EM Algorithm for Model-Based Clustering. 1082-1089 - Xi Zheng

, Lei Pan
, Hongxu Chen, Rick Di Pietro, Lynn Batten:
A Testbed for Security Analysis of Modern Vehicle Systems. 1090-1095 - Fan Jin, Vijay Varadharajan

, Udaya Kiran Tupakula
:
An Eclat Algorithm Based Energy Detection for Cognitive Radio Networks. 1096-1102
WCSF (3rd IEEE International Workshop on Cloud Security and Forensics)
- Varun Mahajan, Sateesh K. Peddoju:

Deployment of Intrusion Detection System in Cloud: A Performance-Based Study. 1103-1108 - Doan Hoang, Thanh Dat Dang:

FBRC: Optimization of task Scheduling in Fog-Based Region and Cloud. 1109-1114 - Robin Ankele, Andrew Simpson

:
On the Performance of a Trustworthy Remote Entity in Comparison to Secure Multi-party Computation. 1115-1122 - Jeffery Garae, Ryan K. L. Ko

, Janice Kho, Saidah Suwadi, Mark A. Will, Mark D. Apperley:
Visualizing the New Zealand Cyber Security Challenge for Attack Behaviors. 1123-1130 - Sam Shute, Ryan K. L. Ko

, Sivadon Chaisiri:
Attribution Using Keyboard Row Based Behavioural Biometrics for Handedness Recognition. 1131-1138 - Amber Umair, Priyadarsi Nanda, Xiangjian He

:
Online Social Network Information Forensics: A Survey on Use of Various Tools and Determining How Cautious Facebook Users are? 1139-1144 - Chathuranga Rathnayaka, Aruna Jamdagni:

An Efficient Approach for Advanced Malware Analysis Using Memory Forensic Technique. 1145-1150

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














