


default search action
5th CNS 2017: Las Vegas, NV, USA
- 2017 IEEE Conference on Communications and Network Security, CNS 2017, Las Vegas, NV, USA, October 9-11, 2017. IEEE 2017, ISBN 978-1-5386-0683-4

- Xu Yuan, Xingliang Yuan, Baochun Li, Cong Wang:

Secure multi-client data access with boolean queries in distributed key-value stores. 1-9 - Qiben Yan

, Hao Yang, Mehmet C. Vuran
, Suat Irmak:
SPRIDE: Scalable and private continual geo-distance evaluation for precision agriculture. 1-9 - Youssef Khazbak, Guohong Cao:

Deanonymizing mobility traces with co-location information. 1-9 - Huacheng Zeng, Chen Cao, Hongxiang Li, Qiben Yan

:
Enabling jamming-resistant communications in wireless MIMO networks. 1-9 - Liyao Xiang, Baochun Li, Bo Li:

Privacy-preserving inference in crowdsourcing systems. 1-9 - Kun Jin

, Si Fang, Chunyi Peng, Zhiyang Teng, XuFei Mao, Lan Zhang, Xiangyang Li:
ViViSnoop: Someone is snooping your typing without seeing it! 1-9 - Song Fang, Ian D. Markwood, Yao Liu:

Manipulatable wireless key establishment. 1-9 - Hongbo Liu, Bo Liu

, Cong Shi, Yingying Chen
:
Secret key distribution leveraging color shift over visible light channel. 1-9 - Yifan Tian, Yantian Hou, Jiawei Yuan:

CAPIA: Cloud assisted privacy-preserving image annotation. 1-9 - Heather Lawrence, Andrew Hughes, Robert Tonic, Cliff C. Zou:

D-miner: A framework for mining, searching, visualizing, and alerting on darknet events. 1-9 - Yuwei Zheng, Lin Huang, Haoqi Shan, Jun Li, Qing Yang, Wenyuan Xu:

Ghost telephonist impersonates you: Vulnerability in 4G LTE CS fallback. 1-9 - Sarah M. Lehman

, Chiu C. Tan:
PrivacyManager: An access control framework for mobile augmented reality applications. 1-9 - Liyang Zhang, Francesco Restuccia, Tommaso Melodia

, Scott M. Pudlewski
:
Learning to detect and mitigate cross-layer attacks in wireless networks: Framework and applications. 1-9 - Andrey Garnaev, Wade Trappe:

An OFDM-based dual radar/communication system facing uncertain jamming power. 1-9 - Wei Du, Qinghua Li:

Secure and efficient outsourcing of large-scale nonlinear programming. 1-9 - Xu Zhang, Edward W. Knightly:

Massive MIMO pilot distortion attack and zero-startup-cost detection: Analysis and experiments. 1-9 - Shameek Bhattacharjee

, Nirnay Ghosh, Vijay K. Shah, Sajal K. Das
:
QnQ: A reputation model to secure mobile crowdsourcing applications from incentive losses. 1-9 - Yuanyi Wu, Dongyu Meng, Hao Chen

:
Evaluating private modes in desktop and mobile browsers and their resistance to fingerprinting. 1-9 - Jiapeng Zhang, Yingfei Dong:

Cyber attacks on remote relays in smart grid. 1-9 - Hailun Tan, Gene Tsudik, Sanjay Jha

:
MTRA: Multiple-tier remote attestation in IoT networks. 1-9 - Xiaonan Zhang

, Qi Jia, Linke Guo:
Secure and optimized unauthorized secondary user detection in dynamic spectrum access. 1-9 - Huangxin Wang, Zhonghua Xi, Fei Li, Songqing Chen:

WebTrap: A dynamic defense scheme against economic denial of sustainability attacks. 1-9 - Zhiyuan Zheng, Shan Jin, Riccardo Bettati, A. L. Narasimha Reddy:

Securing cyber-physical systems with adaptive commensurate response. 1-6 - Jianhua Sun, Kun Sun, Qi Li

:
CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms. 1-9 - Julie M. Haney, Simson L. Garfinkel

, Mary Frances Theofanos:
Organizational practices in cryptographic development and testing. 1-9 - Gradeigh D. Clark, Janne Lindqvist, Antti Oulasvirta

:
Composition policies for gesture passwords: User choice, security, usability and memorability. 1-9 - John D. Roth, Jeremy Martin, Travis Mayberry:

A graph-theoretic approach to virtual access point correlation. 1-9 - Mohamed Grissa, Attila A. Yavuz

, Bechir Hamdaoui:
When the hammer meets the nail: Multi-server PIR for database-driven CRN with location privacy assurance. 1-9 - Blake Anderson, David A. McGrew:

OS fingerprinting: New techniques and a study of information gain and obfuscation. 1-9 - Chang-Wu Chen, Sang-Yoon Chang, Yih-Chun Hu, Yen-Wen Chen:

Protecting vehicular networks privacy in the presence of a single adversarial authority. 1-9 - Erik-Oliver Blass, Guevara Noubir:

Secure logging with crash tolerance. 1-10 - Qingji Zheng, Qi Li

, Aytac Azgin, Jian Weng
:
Data verification in information-centric networking with efficient revocable certificateless signature. 1-9 - Jiajun Xin, Ming Li, Linke Guo, Pan Li

:
Practical privacy-preserving spectrum query schemes for database-driven CRNs with multiple service providers. 1-9 - Zonghao Huang, Yanmin Gong

:
Differential location privacy for crowdsourced spectrum sensing. 1-9 - Sukwha Kyung, Wonkyu Han, Naveen Tiwari, Vaibhav Hemant Dixit, Lakshmi Srinivas, Ziming Zhao, Adam Doupé, Gail-Joon Ahn

:
HoneyProxy: Design and implementation of next-generation honeynet via SDN. 1-9 - Mingshun Sun, Ming Li, Ryan M. Gerdes:

A data trust framework for VANETs enabling false data detection and secure vehicle tracking. 1-9 - Berk Akgun, Marwan Krunz, Onur Ozan Koyluoglu:

Pilot contamination attacks in massive MIMO systems. 1-9 - Yujie Ji, Xinyang Zhang

, Ting Wang:
Backdoor attacks against learning systems. 1-9 - Amr Abdelaziz

, C. Emre Koksal:
Fundamental limits of covert communication over MIMO AWGN channel. 1-9 - Seth Andrews, Ryan M. Gerdes, Ming Li:

Towards physical layer identification of cognitive radio devices. 1-9 - Dennis Kergl, Robert Roedler, Gabi Dreo Rodosek:

VulMap: Global information security vulnerabilities IEEE CNS 17 poster. 362-363 - Fei Pan, Hong Wen, Runfa Liao, Yixin Jiang, Aidong Xu, Kai Ouyang, Xiping Zhu:

Physical layer authentication based on channel information and machine learning. 364-365 - Runfa Liao, Hong Wen, Fei Pan, Huanhuan Song, Yixin Jiang, FeiYi Xie, Aidong Xu:

A physical layer secure transmission method based on channel prediction and QoS. 366-367 - Huanhuan Song, Luping Zhang, Hong Wen, Aidong Xu, Yixin Jiang, Runfa Liao, Songlin Chen, Yi Chen:

Performance analysis of cooperative secure transmission system. 368-369 - Qing Yang, Yixin Jiang, Aidong Xu, Hong Wen, Feng Wang, LiuFei Chen, Kai Ouyang, Xiping Zhu:

A model divides the mobile security level based on SVM. 370-371 - Wei Cheng, Aidong Xu, Yixin Jiang, Hong Wen, Huanhuan Song, Kai Ouyang, Xiping Zhu:

A method of reconciling the key discrepancy by exploiting unconditional secure transmission. 372-373 - Wei Cheng, Aidong Xu, Yixin Jiang, Hong Wen, Huanhuan Song, Kai Ouyang, Xiping Zhu:

The realization of key extraction based on USRP and OFDM channel response. 374-375 - J. P. Houle, S. Ahmadi, B. C. A. Robart, Ashraf Matrawy:

Leveraging inter-controller communication to MitigateDDoS attacks in SDN networks. 376-377 - Martín Barrère

, Emil C. Lupu:
Naggen: A network attack graph generation tool - IEEE CNS 17 poster. 378-379 - Elena Uchiteleva, Abdallah Shami

, Ahmed Refaey:
Time-varying keys for encryption in WSNs: IEEE CNS 17 poster. 380-381 - Ahmed Refaey, Khaled Loukhaoukha

, Adel Omar Dahmane:
Cryptanalysis of stream cipher using density evolution. 382-383 - Mohamed Haj Taieb, Jean-Yves Chouinard

:
Physical layer security using BCH and LDPC codes with adaptive granular HARQ. 564-569 - Ning Zhang, Ruide Zhang, Qiben Yan

, Wenjing Lou, Y. Thomas Hou
, Danfeng Yao
:
Black penguin: On the feasibility of detecting intrusion with homogeneous memory. 586-594 - Robert C. Mitchell:

Epidemic-resistant configurations for intrusion detection systems. 487-494 - Avradip Mandal, John C. Mitchell, Hart William Montgomery, Arnab Roy:

Privacy for targeted advertising. 438-443 - Utku Ozgur, Harikrishnan T. Nair, Aditya Sundararajan

, Kemal Akkaya, Arif I. Sarwat
:
An efficient MQTT framework for control and protection of networked cyber-physical systems. 421-426 - Robert Mitchell, Marci McBride, John Jarocki:

Linkography abstraction refinement and cyber security. 595-601 - Konstantin Boyarinov, Aaron Hunter:

Security and trust for surveillance cameras. 384-385 - Ken Wong, Aaron Hunter:

Bluetooth for decoy systems: A practical study. 86-387 - Sebastian Baur, Holger Boche:

Storage of general data sources on a public database with security and privacy constraints. 555-559 - Mani Khavari, Sebastian Baur, Holger Boche:

Optimal capacity region for PUF-based authentication with a constraint on the number of challenge-response pairs. 575-579 - Steffen Passmann, Anne Lauber-Roensberg

, Thorsten Strufe:
Privacy-preserving audience measurement in practice - Opportunities and challenges. 444-449 - Mehrdad Tahmasbi, Matthieu R. Bloch:

Covert secret key generation. 540-544 - Farshad Rahimi Asl, Fei Chiang, Wenbo He, Reza Samavi

:
Privacy aware web services in the cloud. 458-466 - Matthias Frey

, Igor Bjelakovic, Slawomir Stanczak:
MAC resolvability: First and second order results. 560-564 - Franck Cornevaux-Juignet, Matthieu Arzel

, Pierre-Henri Horrein, Tristan Groleat, Christian Person:
Combining FPGAs and processors for high-throughput forensics IEEE CNS 17 poster. 388-389 - Franck Cornevaux-Juignet, Matthieu Arzel

, Pierre-Henri Horrein, Tristan Groleat, Christian Person:
Open-source flexible packet parser for high data rate agile network probe. 610-618 - Prashanth Busireddygari, Subhash C. Kak:

Binary primes sequence for cryptography and secure communication. 570-574 - Rick Fritschek

, Gerhard Wunder:
On full-duplex secure key generation with deterministic models. 550-554 - Shaofeng Zou, Yingbin Liang, Shlomo Shamai

:
Gaussian fading channel with secrecy outside a bounded range. 545-549 - Jagadeesh Harshan, Sang-Yoon Chang, Seungmin Kang, Yih-Chun Hu:

Securing balise-based train control systems using cryptographic random fountains. 405-410 - Marmara El Masri, Natalija Vlajic:

Current state of client-side extensions aimed at protecting against CSRF-like attacks. 390-391 - Sandra Domenique Ringmann, Hanno Langweg:

Determining security requirements for cloud-supported routing of physical goods. 514-521 - R. Padmavathi Iyer, Pradeep K. Atrey, Gaurav Varshney, Manoj Misra:

Email spoofing detection using volatile memory forensics. 619-625 - Bilal Habib, Bertrand Cambou, Duane Booher, Christopher Robert Philabaum:

Public key exchange scheme that is addressable (PKA). 392-393 - Jeffrey Pawlick, Quanyan Zhu:

Quantitative models of imperfect deception in network security using signaling games with evidence [IEEE CNS 17 Poster]. 394-395 - Enrico Bacis

, Alan Barnett, Andrew Byrne, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa
, Pierangela Samarati:
Distributed shuffle index: Analysis and implementation in an industrial testbed. 396-397 - Jong-Hoon Lee, Young Soo Kim

, Jong-Hyun Kim, Ik-Kyun Kim:
Toward the SIEM architecture for cloud-based security services. 398-399 - Kenneth C. K. Wong, Aaron Hunter:

Managing cybersecurity break-ins using bluetooth low energy devices to verify attackers: A practical study. 432-437 - Mohamed Aslan, Ashraf Matrawy:

Could network view inconsistency affect virtualized network security functions? 510-512 - Vikram Patil, Shivam Parikh, Priyanka Singh

, Pradeep K. Atrey:
GeoSecure: Towards secure outsourcing of GPS data over cloud. 495-501 - Bojan Suzic, Andreas Reiter, Alexander Marsalek:

Structuring the Scope: Enabling adaptive and multilateral authorization management. 522-530 - Erkuden Rios

, Eider Iturbe
, Wissam Mallouli, Massimiliano Rak
:
Dynamic security assurance in multi-cloud DevOps. 467-475 - Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei

, Vladimir Shpilrain:
Computing multiple exponentiations in discrete log and RSA groups: From batch verification to batch delegation. 531-539 - Zhiheng Xu, Quanyan Zhu:

Secure and practical output feedback control for cloud-enabled cyber-physical systems. 416-420 - Ruochi Zhang, Parv Venkitasubramaniam:

A game theoretic approach to analyze false data injection and detection in LQG system. 427-431 - Fengli Zhang, Qinghua Li:

Deep learning-based data forgery detection in automatic generation control. 400-404 - Changwei Liu, Anoop Singhal, Duminda Wijesekera:

A layered graphical model for mission attack impact analysis. 602-609 - R. James Ranjith Kumar, Biplab Sikdar

:
Efficient detection of false data injection attacks on AC state estimation in smart grids. 411-415 - Robert Seeliger

, Daniel Silhavy
, Stefan Arbanowski
:
Dynamic ad-insertion and content orchestration workflows through manifest manipulation in HLS and MPEG-DASH. 450-455 - Nabil Abubaker, Leonard Dervishi, Erman Ayday:

Privacy-preserving fog computing paradigm. 502-509 - Anselme Tueno, Florian Kerschbaum, Daniel Bernau, Sara Foresti:

Selective access for supply chain management in the cloud. 476-482 - Enrico Bacis

, Marco Rosa
, Ali Sajjad:
EncSwift and key management: An integrated approach in an industrial setting. 483-486 - Daniela Becker, Jorge Guajardo, Karl-Heinz Zimmermann:

Towards a new privacy-preserving social media advertising architecture (invited position paper). 45-457 - Ken Yau, Kam-Pui Chow, Siu-Ming Yiu, Chun-Fai Chan:

Detecting anomalous behavior of PLC using semi-supervised machine learning. 580-585

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














