


default search action
CSS 2013: Zhangjiajie, China
- Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan:

Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings. Lecture Notes in Computer Science 8300, Springer 2013, ISBN 978-3-319-03583-3
CSS 2013 Regular Papers
- Jan-Min Chen:

A Crawler Guard for Quickly Blocking Unauthorized Web Robot. 1-13 - Tao Peng, Qin Liu, Guojun Wang:

Privacy Preserving for Location-Based Services Using Location Transformation. 14-28 - Ang Mi, Weiping Wang, Shigeng Zhang, Hong Song:

Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux. 29-39 - Jiangxiao Zhang, Zhoujun Li, Hua Guo:

Multiple-Bank E-Cash without Random Oracles. 40-51 - Chong Fu, Tao Wang, Zhao-yu Meng, Junxin Chen

, Hong-feng Ma:
A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy. 52-66 - Baosheng Ge, Wen Tao Zhu:

Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics. 67-80 - Wencheng Yang, Jiankun Hu

, Song Wang
, Jucheng Yang:
Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures. 81-91 - Juan Wang, Yong Wang, Hongxin Hu, Qingxin Sun, He Shi, Longjie Zeng:

Towards a Security-Enhanced Firewall Application for OpenFlow Networks. 92-103 - Lin-Bo Qiao, Bo-Feng Zhang, Rui-Yuan Zhao, Jinshu Su:

Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method. 104-116 - Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips:

Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows. 117-131 - Layal Samarji, Frédéric Cuppens, Nora Cuppens-Boulahia, Wael Kanoun, Samuel Dubus:

Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks. 132-150 - Robert Koch, Mario Golling, Gabi Dreo Rodosek:

Geolocation and Verification of IP-Addresses with Specific Focus on IPv6. 151-170 - Youssou Faye, Hervé Guyennet, Ibrahima Niang, Yanbo Shou:

Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks. 171-182 - Seyed Ali Mirheidari, Sajjad Arshad, Rasool Jalili:

Alert Correlation Algorithms: A Survey and Taxonomy. 183-197 - Natsuki Kimura, Noriaki Yoshiura:

Construction and Verification of Mobile Ad Hoc Network Protocols. 198-212 - Jun Zhang

, Xiao Chen
, Yang Xiang
, Wanlei Zhou
:
Zero-Day Traffic Identification. 213-227 - Christian Callegari

, Stefano Giordano
, Susanna Mannella, Michele Pagano
:
Design and Implementation of a Testbed for the Security Assessment of MANETs. 228-242 - Qiang Liu, Jianping Yin, Shui Yu

:
A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology. 243-257 - Leyou Zhang, Qing Wu, Yi Mu:

Anonymous Identity-Based Broadcast Encryption with Adaptive Security. 258-271 - Qing Wu, Leyou Zhang:

Hierarchical Identity-Based Signature with Short Public Keys. 272-281 - Nizar Kheir, Xiao Han:

PeerViewer: Behavioral Tracking and Classification of P2P Malware. 282-298 - Jingping Song, Zhiliang Zhu, Peter Scully, Chris J. Price:

Selecting Features for Anomaly Intrusion Detection: A Novel Method using Fuzzy C Means and Decision Tree Classification. 299-307 - Sheng Wen

, Ping Li, Di Wu
, Yang Xiang
, Wanlei Zhou
:
Detecting Stepping Stones by Abnormal Causality Probability. 308-322 - Aihua Peng, Lansheng Han, Yanan Yu, Nan Du, Mingquan Li:

Algebra-Based Behavior Identification of Trojan Horse. 323-337 - Cheng-Chi Lee

, Chun-Ta Li
, Chi-Yao Weng, Jian-Jhong Jheng, Xiao-Qian Zhang, Yi-Rui Zhu:
Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards. 338-348 - Haichang Gao, Wei Jia, Ning Liu, Kaisheng Li:

The Hot-Spots Problem in Windows 8 Graphical Password Scheme. 349-362 - Shaoyin Cheng, Shengmei Luo, Zifeng Li, Wei Wang, Yan Wu, Fan Jiang:

Static Detection of Dangerous Behaviors in Android Apps. 363-376 - Changji Wang, Wentao Li, Yuan Li, Xi-Lei Xu:

A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function. 377-386 - Shuhong Chen, Guojun Wang, Weijia Jia

:
A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing. 387-402 - Fangfang Zhou, Ronghua Shi, Ying Zhao, Yezi Huang, Xing Liang:

NetSecRadar: A Visualization System for Network Security Situational Awareness. 403-416
Workshop Papers
- Ronghua Shi, Ye Kang, Zhaoyuan Zhang:

Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System. 417-428 - Cai Fu, Deliang Xu, Lansheng Han, Jingfang Xu, Zhicun Fang:

Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN. 429-440 - Zemin Cai, Yi Wang

, Renfa Li:
An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space. 441-449 - Zhenyu Wang, Yanqiu Ye, Ruimin Wang:

An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux. 450-457 - Javier González, Philippe Bonnet

:
Towards an Open Framework Leveraging a Trusted Execution Environment. 458-467 - Kok-Seng Wong

, Myung Ho Kim
:
Secure Re-publication of Dynamic Big Data. 468-477

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














