default search action
7th ICCNS 2017: Tokyo, Japan
- Proceedings of the 7th International Conference on Communication and Network Security, ICCNS 2017, Tokyo, Japan, November 24-26, 2017. ACM 2017, ISBN 978-1-4503-5349-6
Data Privacy and Security
- Ishu Gupta, Ashutosh Kumar Singh:
A Probability based Model for Data Leakage Detection using Bigraph. 1-5 - Wanxia Yang, Shanyu Tang:
Steganalysis of LSB Speech with Low Embedding Rates based on Joint Probability. 6-11 - Muhammad Imran Khan, Simon N. Foley, Barry O'Sullivan:
On database intrusion detection: A Query analytics-based model of normative behavior to detect insider attacks. 12-17 - Romi Nur Ismanto, Muhammad Salman:
Improving Security Level through Obfuscation Technique for Source Code Protection using AES Algorithm. 18-22 - Huan Li, Chen Guo, Donglin Wang:
Hybrid Sorting Method for Successive Cancellation List Decoding of Polar Codes. 23-26
System Security and Authentication
- Chiraphat Chaiphet, Sudsanguan Ngamsuriyaroj, Ahmed Awad, Betran Jacob, Ioannis Gakos, Wiktor Grajkowski:
Secure Enclave for TLS Web Server on Untrusted Environment. 27-31 - JaeHyu Kim, JooSeok Song:
A Simple and Efficient Replay Attack Prevention Scheme for LoRaWAN. 32-36 - Binhe Zhou, Bin Tian:
Analysis and Research on Combinatorial Attack of Android Platform Applications. 37-42 - Shreeya Swagatika Sahoo, Sujata Mohanty, Banshidhar Majhi:
A Light Weight Three Factor based Authentication Scheme for Multi-server Environment using Smart Cards. 43-47 - Susmita Mandal, Sujata Mohanty, Banshidhar Majhi:
An ID-based Non-Interactive Deniable Authentication Protocol based on ECC. 48-52 - Ari Moesriami Barmawi, Dani Arumanegara:
Strengthening Dynamic Identity Based Remote User Authentication Scheme Using Smart Card against Offline Password Guessing Attack. 53-58
Network Detection and Security
- Arash Habibi Lashkari, Gerard Draper-Gil, Jonathan Edward Keenan, Kenneth Fon Mbah, Ali A. Ghorbani:
A Survey Leading to a New Evaluation Framework for Network-based Botnet Detection. 59-66 - Sheng-Yu Chen, Tzung-Han Jeng, Chuan-Chiang Huang, Chien-Chih Chen, Kuo-Sen Chou:
Doctrina: Annotated Bipartite Graph Mining for Malware-Control Domain Detection. 67-75 - Khurram Gulzar Rana, Yongquan Cai, Muhammad Azeem, Allah Ditta, Haiyang Yu:
Detection of Malicious Node in Wireless Ad Hoc Network by Using Acknowledgement Based Approach. 76-80 - Xueqin Zhang, Li Zhang, Chunhua Gu:
Security Risk Estimation of Social Network Privacy Issue. 81-85 - Xueqin Zhang, Qianru Zhou, Chunhua Gu:
Published Weighted Social Networks Privacy Preservation Based on Community Division. 86-90 - Ching-Nung Yang, Jian-Ming Li, Yung-Shun Chou:
On the Analysis of k-Secure t-Conference Key Distribution Scheme. 91-95 - Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
wirelessOrBAC: Towards an access-control-based IDS for Wireless Sensor Networks. 96-103 - Gengzhong Zheng, Xiaoqing Dong:
Node Importance Evaluation in Wireless Sensor Networks based on Topology Contribution and Energy Efficiency. 104-108 - Boosun Jeon, Young-Jun Heo, Jung-Chan Na:
A Retransmission Method for Improving Transmission Reliability in One-way Transmission. 109-113 - Congqi Shen, Huifang Chen, Lei Xie:
Distributed Target Tracking under Byzantine Data Attacks. 114-119
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.