


default search action
3rd CSNet 2019: Quito, Ecuador
- 3rd Cyber Security in Networking Conference, CSNet 2019, Quito, Ecuador, October 23-25, 2019. IEEE 2019, ISBN 978-1-7281-3949-4

- El-hacen Diallo

, Alexandre Laubé, Khaldoun Al Agha, Steven Martin:
Efficient Block replication to optimize the blockchain resources. 1-5 - Mohammed S. Alshehri, Brajendra Panda:

A Blockchain-Encryption-Based Approach to Protect Fog Federations from Rogue Nodes. 6-13 - Kodjo Edem Agbezoutsi, Pascal Urien

, Toundé Mesmin Dandjinou:
Towards Blockchain Services For Mobile Money Traceability And Federation. 14-20 - Nour El Madhoun, Julien Hatin, Emmanuel Bertin:

Going Beyond the Blockchain Hype: In Which Cases are Blockchains Useful for IT Applications? 21-27 - Achraf Fayad, Badis Hammi, Rida Khatoun, Ahmed Serhrouchni:

A Blockchain-based Lightweight Authentication Solution for IoT. 28-34 - Victor Pasknel de Alencar Ribeiro, Raimir Holanda Filho

, Alex Ramos:
A Secure and Fault-Tolerant Architecture for LoRaWAN Based on Blockchain. 35-41 - Ralph Koning, Ameneh Deljoo, Lydia Meijer, Cees de Laat, Paola Grosso

:
Trust-based collaborative defences in multi network alliances. 42-49 - Ameneh Deljoo, Ralph Koning, Tom M. van Engers, Leon Gommans, Cees de Laat:

Managing Effective Collaboration in Cybersecurity Alliances Using Social Computational Trust. 50-57 - Solange Ghernaouti, Léonore Cellier, Bastien Wanner:

Information sharing in cybersecurity : Enhancing security, trust and privacy by capacity building. 58-62 - Jorge Merchan-Lima, Fabian Astudillo-Salinas

, Luis Tello-Oquendo, Franklin L. Sanchez
, Gabriel Lopez, Dorys Quiroz:
Information Security Management Frameworks in Higher Education Institutions: An Overview. 63-65 - Abdelmalek Benzekri, Romain Laborde

, Arnaud Oglaza, Darine Rammal, François Barrère:
Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situations. 66-72 - Maria Alejandra Osorio Angarita, Ebroul Izquierdo, Agustín Moreno Cañadas

:
Human Interaction Proofs (HIPs) based on Emerging Images and Topological Data Analysis (TDA) Techniques. 73-79 - Nour El Madhoun, Emmanuel Bertin, Guy Pujolle:

The EMV Payment System: Is It Reliable? 80-85 - Fathima James:

A Risk Management Framework and A Generalized Attack Automata for IoT based Smart Home Environment. 86-90 - Olivier Cros, Gabriel Chênevert:

Hashing-based authentication for CAN bus and application to Denial-of-Service protection. 91-98 - Karim Lounis, Mohammad Zulkernine:

Bluetooth Low Energy Makes "Just Works" Not Work. 99-106 - Fathima James:

IoT Cybersecurity based Smart Home Intrusion Prevention System. 107-113 - Anika Anwar, Talal Halabi

, Mohammad Zulkernine:
Cloud-based Sybil Attack Detection Scheme for Connected Vehicles. 114-121 - José David Vega Sánchez

, Luis Urquiza-Aguiar, Martha Cecilia Paredes Paredes
:
Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey. 122-129 - Christian Tietz, Eric Klieme, Lukas Behrendt, Pawel Böning, Leonard Marschke, Christoph Meinel:

Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTC. 130-137 - Firas Al-Doghman, Zenon Chaczko, Wayne Brookes, Lucia Carrion Gordon:

Social Consensus-inspired Aggregation Algorithms for Edge Computing. 138-141 - Germán E. Rodríguez

, Jenny Torres, Pamela Flores
, Diego Eduardo Benavides, Daniel Nuñez-Agurto
:
XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in Universities. 142-149 - Andreane Spano da Roza, João Vitor Valle, Diogo Menezes Ferrazani Mattos

:
A Precise Method for Monitoring and Detecting Recurrent Attacks on Wireless Networks based on Link-Layer Traffic Classification. 150-157 - Marek Malowidzki, Damian Hermanowski, Przemyslaw Berezinski:

TAG: Topological Attack Graph Analysis Tool. 158-160 - Diego Oña, Lenín Zapata, Walter Fuertes

, Germán E. Rodríguez
, Diego Eduardo Benavides, Theofilos Toulkeridis:
Phishing Attacks: Detecting and Preventing Infected E-mails Using Machine Learning Methods. 161-163

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














