


default search action
7th CNS 2019: Washington, DC, USA
- 7th IEEE Conference on Communications and Network Security, CNS 2019, Washington, DC, USA, June 10-12, 2019. IEEE 2019, ISBN 978-1-5386-7117-7

- Samy Kambou, Ahmed Bouabdallah:

Using Structural Diversity to Enforce Strong Authentication of Mobiles to the Cloud. 1-9 - Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei

, Vladimir Shpilrain:
Secure Delegation to a Single Malicious Server: Exponentiation in RSA-type Groups. 1-9 - Yifan Tian, Jiawei Yuan, Houbing Song

:
Secure and Reliable Decentralized Truth Discovery Using Blockchain. 1-8 - Tiep Minh Hoang

, Trung Q. Duong, Sangarapillai Lambotharan:
Secure Wireless Communication Using Support Vector Machines. 1-5 - Peyman Siyari, Marwan Krunz:

Linear Precoding with Friendly Jamming in Overloaded MU-MIMO Wiretap Networks. 1-5 - Wenwen Tu, Lifeng Lai:

Secret Key and Private Key Capacities Over an Unauthenticated Public Channel. 1-5 - Qinlong Huang, Nan Li, Zhicheng Zhang, Yixian Yang:

Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of Vehicles. 1-8 - Abderrahmane Mayouche, Danilo Spano, Christos G. Tsinos, Symeon Chatzinotas

, Björn E. Ottersten:
SER -Constrained Symbol-Level Precoding for Physical-Layer Security. 1-5 - Batu K. Chalise, Brian M. Sadler

:
Joint Data and Tag Precoder Optimization for MIMO Physical Layer Authentication with Embedded Fingerprinting. 1-5 - Asem Ghaleb, Issa Traoré, Karim Ganame:

A Framework Architecture for Agentless Cloud Endpoint Security Monitoring. 1-9 - Ning Wang, Jie Tang, Kai Zeng

:
Spoofing Attack Detection in Mm-Wave and Massive MIMO 5G Communication. 1-5 - Anudeep Sai Muttavarapu, Ram Dantu, Mark A. Thompson:

Distributed Ledger for Spammers' Resume. 1-9 - Yaoqing Liu, Guchuan Sun, Stephanie Schuckers

:
Enabling Secure and Privacy Preserving Identity Management via Smart Contract. 1-8 - Amir Alipour-Fanid, Monireh Dabaghchian

, Ning Wang, Pu Wang, Liang Zhao, Kai Zeng:
Machine Learning-Based Delay-Aware UAV Detection Over Encrypted Wi-Fi Traffic. 1-7 - Jake Bailey Perazzone, Paul L. Yu, Brian M. Sadler

, Rick S. Blum
:
Fingerprint Embedding Authentication with Artificial Noise: MISO Regime. 1-5 - Xuheng Lin, Ronghua Xu, Yu Chen, J. Koji Lum:

A Blockchain-Enabled Decentralized Time Banking for a New Social Value System. 1-5 - Anil Gaihre, Santosh Pandey

, Hang Liu:
Deanonymizing Cryptocurrency With Graph Learning: The Promises and Challenges. 1-3 - Roberto Di Pietro

, Gabriele Oligeri, Pietro Tedeschi
:
JAM-ME: Exploiting Jamming to Accomplish Drone Mission. 1-9 - SeokHwan Choi, Jin-Myeong Shin

, Peng Liu, Yoon-Ho Choi:
Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks. 1-6 - Allison Beemer

, Oliver Kosut, Jörg Kliewer, Eric Graves, Paul L. Yu:
Authentication Against a Myopic Adversary. 1-5 - Kemal Akkaya, Vashish Baboolal, Nico Saputro

, A. Selcuk Uluagac, Hamid Menouar:
Privacy-Preserving Control of Video Transmissions for Drone-based Intelligent Transportation Systems. 1-7 - Huan Yang, Liang Cheng

, Mooi Choo Chuah:
Deep-Learning-Based Network Intrusion Detection for SCADA Systems. 1-7 - A. H. M. Jakaria, Mohammad Ashiqur Rahman

, Md. Golam Moula Mehedi Hasan:
Safety Analysis of AMI Networks Through Smart Fraud Detection. 1-7 - Talal Halabi

, Martine Bellaïche:
Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures. 1-9 - Ismail Butun

, Patrik Österberg, Mikael Gidlund
:
Preserving Location Privacy in Cyber-Physical Systems. 1-6 - Roberto Di Pietro

, Leonardo Jero, Flavio Lombardi, Agusti Solanas:
GPU Algorithms for K-Anonymity in Microdata. 1-9 - Ashwag Albakri

, Lein Harn, Mahesh Maddumala
:
Polynomial-based Lightweight Key Management in a Permissioned Blockchain. 1-9 - Muhammad Saad, Ashar Ahmad, Aziz Mohaisen:

Fighting Fake News Propagation with Blockchains. 1-4 - Jiacheng Shang, Jie Wu:

A Usable Authentication System Using Wrist-Worn Photoplethysmography Sensors on Smartwatches. 1-9 - Wenxin Chen, Yingfei Dong, Zhenhai Duan:

Manipulating Drone Position Control. 10-18 - Mingyan Xiao, Ming Li, Linke Guo, Miao Pan, Zhu Han, Pan Li

:
Securing Task Allocation in Mobile Crowd Sensing: An Incentive Design Approach. 19-27 - Lili Zhang, Dianqi Han, Ang Li, Tao Li, Yan Zhang, Yanchao Zhang:

WristUnlock: Secure and Usable Smartphone Unlocking with Wrist Wearables. 28-36 - Qiumao Ma, Wensheng Zhang:

Efficient and Accountable Oblivious Cloud Storage with Three Servers. 37-45 - Peiyi Han, Chuanyi Liu, Yingfei Dong, Hezhong Pan, QiYang Song, Binxing Fang:

FileCrypt: Transparent and Scalable Protection of Sensitive Data in Browser-based Cloud Storage. 46-54 - Muslum Ozgur Ozmen, Attila A. Yavuz

, Rouzbeh Behnia:
Energy-Aware Digital Signatures for Embedded Medical Devices. 55-63 - Maria Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, Usman Ali, Vianney Lapotre, Guy Gogniat

:
Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture. 64-72 - Ala Altaweel

, Radu Stoleru, Guofei Gu, Arnab Kumar Maity:
CollusiveHijack: A New Route Hijacking Attack and Countermeasures in Opportunistic Networks. 73-81 - Danish Sattar, Ashraf Matrawy:

Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices. 82-90 - Quoc Phong Nguyen, Kar Wai Lim, Dinil Mon Divakaran, Kian Hsiang Low, Mun Choon Chan:

GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection. 91-99 - Savio Sciancalepore

, Roberto Di Pietro
:
DRAKE: Distributed Relay-Assisted Key Establishment. 100-108 - Hao Liu, Boyang Wang, Nan Niu, Shomir Wilson, Xuetao Wei:

Vaccine: : Obfuscating Access Pattern Against File-Injection Attacks. 109-117 - Alex Biryukov

, Daniel Feher:
Privacy and Linkability of Mining in Zcash. 118-123 - Xiaolan Gu, Ming Li, Yang Cao

, Li Xiong
:
Supporting Both Range Queries and Frequency Estimation with Local Differential Privacy. 124-132 - Hanyu Quan, Hao Liu, Boyang Wang, Ming Li, Yuqing Zhang:

Randex: Mitigating Range Injection Attacks on Searchable Encryption. 133-141 - Zili Zha, An Wang, Yang Guo, Doug Montgomery

, Songqing Chen:
BotSifter: An SDN-based Online Bot Detection Framework in Data Centers. 142-150 - Cagri Cetin, Dmitry B. Goldgof, Jay Ligatti:

SQL-Identifier Injection Attacks. 151-159 - Ashutosh Dutta, Ehab Al-Shaer:

"What", "Where", and "Why" Cybersecurity Controls to Enforce for Optimal Risk Mitigation. 160-168 - Yebo Feng

, Jun Li, Lei Jiao
, Xintao Wu
:
BotFlowMon: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows. 169-177 - Tim Krause, Rafael Uetz, Tim Kretschmann:

Recognizing Email Spam from Meta Data Only. 178-186 - Xuhang Ying, Joanna Mazer, Giuseppe Bernieri, Mauro Conti

, Linda Bushnell
, Radha Poovendran
:
Detecting ADS-B Spoofing Attacks Using Deep Neural Networks. 187-195 - Xinyu Zhou, Aiqun Hu, Guyue Li, Linning Peng, Yuexiu Xing

, Jiabao Yu:
Design of a Robust RF Fingerprint Generation and Classification Scheme for Practical Device Identification. 196-204 - Ahmet Okutan, Shanchieh Jay Yang, Katie McConky

, Gordon Werner:
CAPTURE: Cyberattack Forecasting Using Non-Stationary Features with Time Lags. 205-213 - Trishita Tiwari, Avraham Klausner, Mikhail Andreev, Ari Trachtenberg, Arkady Yerukhimovich:

Location Leakage from Network Access Patterns. 214-222 - Boyang Hu, Qicheng Lin, Yao Zheng

, Qiben Yan
, Matthew Troglia, Qingyang Wang:
Characterizing Location-based Mobile Tracking in Mobile Ad Networks. 223-231 - Sean Kennedy, Haipeng Li, Chenggang Wang, Hao Liu, Boyang Wang, Wenhai Sun

:
I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers. 232-240 - Zhen Ling, Zupei Li, Chen Chen, Junzhou Luo, Wei Yu

, Xinwen Fu
:
I Know What You Enter on Gear VR. 241-249 - Ghada Almashaqbeh, Kevin Kelley, Allison Bishop, Justin Cappos:

CAPnet: A Defense Against Cache Accounting Attacks on Content Distribution Networks. 250-258 - Florian Quinkert, Tobias Lauinger, William K. Robertson, Engin Kirda, Thorsten Holz:

It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains. 259-267 - Jie Li

, Lu Zhou, Huaxin Li, Lu Yan, Haojin Zhu
:
Dynamic Traffic Feature Camouflaging via Generative Adversarial Networks. 268-276 - Nurit Devir, Orna Grumberg, Shaul Markovitch, Gabi Nakibly:

Topology-Agnostic Runtime Detection of OSPF Routing Attacks. 277-285 - Bruno Andriamanalimanana, Ali Tekeoglu, Korkut Bekiroglu, Saumendra Sengupta, Chen-Fu Chiang, Michael Reale

, Jorge E. Novillo:
Symmetric kullback-leibler divergence of softmaxed distributions for anomaly scores. 1-6 - Mustafa Kaiiali, Sakir Sezer, Ayesha Khalid:

Cloud computing in the quantum era. 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














