


default search action
10. SecureComm 2014: Beijing, China
- Jing Tian, Jiwu Jing, Mudhakar Srivatsa:
International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 153, Springer 2015, ISBN 978-3-319-23801-2
Doctoral Symposium
- Qun Wang, Huanyan Qian, Peiyu Ji, Yu Xie, Shuhui Yang:
A Performance Comparison Study of a Coverage-Preserving Node Scheduling Scheme and Its Enhancement in Sensor Networks. 3-9 - Xianming Gao, Xiaozhe Zhang, Baosheng Wang, Huiting Shi:
An Improved Authorization Model in Trust Network. 10-16 - Piers O'Hanlon, Joss Wright, Ian Brown, Tulio de Souza:
KEMF: Key Management for Federated Sensor Networks. 17-24 - Rula Sayaf, Dave Clarke, Richard Harper:
\mathrmCPS^2 : A Contextual Privacy Framework for Social Software. 25-32 - Ben Niu, Xiuguang Li, Xiaoyan Zhu, Xiaoqing Li, Hui Li:
Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks. 33-40 - Li Zhai, ChuanKun Wu:
RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack. 41-47
Intrusion Detection
- Vincenzo Gulisano
, Magnus Almgren
, Marina Papatriantafilou
:
METIS: A Two-Tier Intrusion Detection System for Advanced Metering Infrastructures. 51-68 - Shen Su, Beichuan Zhang, Binxing Fang:
Online Detection of Concurrent Prefix Hijacks. 69-83 - Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein:
Countermeasures for Mitigating ICN Routing Related DDoS Attacks. 84-92 - Ziyu Wang, Jiahai Yang, Fuliang Li:
A New Anomaly Detection Method Based on IGTE and IGFE. 93-109
International Workshop on Applications and Technologies in Cyber Security (ATCS)
- Zubair Shah
, Abdun Naser Mahmood
, Jill Slay
:
Forensic Potentials of Solid State Drives. 113-126 - Saira Syed, Quazi Mamun
:
Cloud Security from Users Point of View: A Pragmatic Study with Thematic Analysis. 127-140 - Khandakar Rabbi, Mohammed Kaosar
, Md. Rafiqul Islam
, Quazi Mamun
:
A Secure Real Time Data Processing Framework for Personally Controlled Electronic Health Record (PCEHR) System. 141-156 - Abdun Naser Mahmood
, Md. Enamul Kabir
, Abdul K. Mustafa:
Novel Iterative Min-Max Clustering to Minimize Information Loss in Statistical Disclosure Control. 157-172 - Pinaki Sarkar, Priyatosh Mahish
, Morshed Uddin Chowdhury
, Kouichi Sakurai:
Securing Sensor Networks by Moderating Frequencies. 173-185 - Jarrod West, Maumita Bhattacharya
, Md. Rafiqul Islam
:
Intelligent Financial Fraud Detection Practices: An Investigation. 186-203 - Mohiuddin Ahmed
, Abdun Naser Mahmood
:
Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection. 204-219 - Md. Saiful Islam
, Md. Rafiqul Islam
, A. S. M. Kayes
, Chengfei Liu
, Irfan Altas:
A Survey on Mining Program-Graph Features for Malware Analysis. 220-236 - Hussein Alnabulsi, Quazi Mamun
, Md. Rafiqul Islam
, Morshed U. Chowdhury
:
Defence Against Code Injection Attacks. 237-251 - Adnan Anwar
, Abdun Naser Mahmood
, Mohiuddin Ahmed
:
False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation. 252-266 - Ala' F. A. Aburumman, Kim-Kwang Raymond Choo
:
A Domain-Based Multi-cluster SIP Solution for Mobile Ad Hoc Network. 267-281
DAPRO 2014 and SSS 2014 International Workshop on Data Protection in Mobile and Pervasive Computing (DAPRO) International Workshop on Secure Smart Systems (SSS)
- Le Guan, Fengjun Li
, Jiwu Jing, Jing Wang, Ziqiang Ma:
virtio-ct: A Secure Cryptographic Token Service in Hypervisors. 285-300 - Fatih Kiliç, Thomas Kittel, Claudia Eckert:
Blind Format String Attacks. 301-314 - Felix C. Freiling, Mykola Protsenko, Yan Zhuang:
An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs. 315-328 - Fahad Alarifi, Maribel Fernández:
Towards Privacy-Preserving Web Metering via User-Centric Hardware. 329-340 - Weiyu Jiang, Zhan Wang, Limin Liu, Neng Gao:
Towards Efficient Update of Access Control Policy for Cryptographic Cloud Storage. 341-356
International Workshop on System Level Security of Smartphones
- Heqing Huang, Kai Chen, Peng Liu, Sencun Zhu, Dinghao Wu:
Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms. 359-366 - Zhongwen Zhang, Ji Xiang, Lei Wang, Lingguang Lei:
Transplantation Attack: Analysis and Prediction. 367-374 - Yingjun Zhang, Kezhen Huang, Yuling Liu, Kai Chen, Liang Huang, Yifeng Lian:
Timing-Based Clone Detection on Android Markets. 375-381 - Wei Hu, Dongyao Ji, Ting Wang, Gang Yao:
A New Trust Chain Security Evaluation Model and Tool. 382-391 - Bin Li, Zhijie Feng:
A System for Privacy Information Analysis and Safety Assessment of iOS Applications. 392-398 - Bin Ma:
How We Found These Vulnerabilities in Android Applications. 399-406

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.