


default search action
11th NSS 2017: Helsinki, Finland
- Zheng Yan, Refik Molva, Wojciech Mazurczyk

, Raimo Kantola:
Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings. Lecture Notes in Computer Science 10394, Springer 2017, ISBN 978-3-319-64700-5
Cloud and IoT Security
- Keita Emura

:
A Generic Construction of Secure-Channel Free Searchable Encryption with Multiple Keywords. 3-18 - Ian Oliver, Silke Holtmanns, Yoan Miche, Shankar Lal, Leo Hippeläinen, Aapo Kalliola, Sowmya Ravidas:

Experiences in Trusted Cloud Computing. 19-30 - Sara Ramezanian

, Tommi Meskanen, Masoud Naderpour, Valtteri Niemi:
Private Membership Test Protocol with Low Communication Complexity. 31-45 - Leyou Zhang

, Qing Wu:
Adaptively Secure Hierarchical Identity-Based Encryption over Lattice. 46-58 - Igor Kabashkin:

Risk Modelling of Blockchain Ecosystem. 59-70
Network Security
- Ahmad M. K. Nasser, Di Ma

, Sam Lauzon:
Exploiting AUTOSAR Safety Mechanisms to Launch Security Attacks. 73-86 - Somanath Tripathy, Praveen Kumar:

CookiesWall: Preventing Session Hijacking Attacks Using Client Side Proxy. 87-98 - Fannv He, Yuqing Zhang, Donghang Liu, Ying Dong, Caiyun Liu, Chensi Wu:

Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent Analysis. 99-111 - Saeed Shafieian, Daniel Smith, Mohammad Zulkernine:

Detecting DNS Tunneling Using Ensemble Learning. 112-127 - Hanlu Chen, Yulong Fu, Zheng Yan

:
Survey on Big Data Analysis Algorithms for Network Security Measurement. 128-142
Platform and Hardware Security
- Donghai Tian, Dingjun Qi, Li Zhan, Yuhang Yin, Changzhen Hu, Jingfeng Xue:

A Practical Method to Confine Sensitive API Invocations on Commodity Hardware. 145-159 - Patrick Eitschberger, Jörg Keller, Simon Holmbacka:

Hardware and Software Support for Transposition of Bit Matrices in High-Speed Encryption. 160-168 - Jiayuan Zhang, Yao Yao, Xiaoqi Li

, Jian Xie, Gaofei Wu:
An Android Vulnerability Detection System. 169-183 - Amirhossein Gharib, Ali A. Ghorbani:

DNA-Droid: A Real-Time Android Ransomware Detection Framework. 184-198 - Lijun Jiang, Weizhi Meng

, Yu Wang, Chunhua Su, Jin Li:
Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study. 199-213
Crypto and Others
- Lihua Wang

, Takuya Hayashi
, Yoshinori Aono, Le Trieu Phong:
A Generic yet Efficient Method for Secure Inner Product. 217-232 - Elena Reshetova, Filippo Bonazzi, N. Asokan

:
Randomization Can't Stop BPF JIT Spray. 233-247 - Dang Nguyen, Dat Tran

, Wanli Ma, Khoa Nguyen:
EEG-Based Random Number Generators. 248-256 - Tahmina Ahmed, Ravi S. Sandhu:

Safety of ABAC _\alpha Is Decidable. 257-272 - Naoki Nishikawa, Hideharu Amano, Keisuke Iwai:

Implementation of Bitsliced AES Encryption on CUDA-Enabled GPU. 273-287
Authentication and Key Management
- Jayaprakash Kar:

Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme. 291-300 - Joona Kannisto, Jarmo Harju:

The Time Will Tell on You: Exploring Information Leaks in SSH Public Key Authentication. 301-314 - Pinaki Sarkar:

Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS). 315-331 - Deepak Kumar Dalai

, Dibyendu Roy:
A State Recovery Attack on ACORN-v1 and ACORN-v2. 332-345
International Workshop on Security Measurements of Cyber Networks (SMCN-2017)
- Yukun Zheng, Kun Lv, Changzhen Hu:

A Quantitative Method for Evaluating Network Security Based on Attack Graph. 349-358 - Rui Ma, Tianbao Zhu, Changzhen Hu, Chun Shan, Xiaolin Zhao:

SulleyEX: A Fuzzer for Stateful Network Protocol. 359-372 - Chun Shan, Shiyou Sun, Jingfeng Xue, Changzhen Hu, Hongjin Zhu:

A Detecting Method of Array Bounds Defects Based on Symbolic Execution. 373-385 - Yajie Dong, Zhenyan Liu, Yida Yan, Yong Wang, Tu Peng, Ji Zhang:

Machine Learning for Analyzing Malware. 386-398 - Yun Chen, Kun Lv, Changzhen Hu:

Optimal Attack Path Generation Based on Supervised Kohonen Neural Network. 399-412 - Rui Ma, Siyu Chen, Ke Ma, Changzhen Hu, Xiajing Wang:

Defenses Against Wormhole Attacks in Wireless Sensor Networks. 413-426 - Mohammed Al-Janabi

, Peter Andras
:
A Systematic Analysis of Random Forest Based Social Media Spam Classification. 427-438 - Chensi Wu, Yuqing Zhang, Ying Dong:

Application Research on Network Attacks and Defenses with Zachman Framework. 439-449 - Donghang Liu, Lihua Dong, Shaoqing Lv, Ying Dong, Fannv He, Chensi Wu, Yuqing Zhang, Hua Ma:

A Novel Approach to Network Security Situation Assessment Based on Attack Confidence. 450-463 - Roberto Saia

:
A Discrete Wavelet Transform Approach to Fraud Detection. 464-474 - Hao Zhang, Kun Lv, Changzhen Hu:

An Automatic Vulnerabilities Classification Method Based on Their Relevance. 475-485 - Jing Li, Lihua Yin, Yunchuan Guo, Chao Li, Fenghua Li, Lihua Chen:

A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks. 486-496
International Workshop on Security in Big Data (SECBD-2017)
- Jialu Hao, Jian Liu, Hong Rong, Huimei Wang, Ming Xian:

OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating. 499-509 - Le Trieu Phong:

Privacy-Preserving Stochastic Gradient Descent with Multiple Distributed Trainers. 510-518
3rd International Workshop on 5G Security and Machine Learning (IW5GS-2017)
- Markku Vajaranta, Joona Kannisto, Jarmo Harju:

IPsec and IKE as Functions in SDN Controlled Network. 521-530 - Elena Ivannikova, Mikhail Zolotukhin, Timo Hämäläinen

:
Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks. 531-543 - Mohsin Khan, Valtteri Niemi:

Concealing IMSI in 5G Network Using Identity Based Encryption. 544-554 - Fakher Ben Ftima, Kamel Karoui

, Henda Ben Ghézala
:
A Formal Approach for Network Security Policy Relevancy Checking. 555-564 - Huiting Tan, Chaojing Tang, Chen Zhang, Shaolei Wang:

Area-Dividing Route Mutation in Moving Target Defense Based on SDN. 565-574 - Irina Mihai, Catalin Adrian Leordeanu

, Alecsandru Patrascu:
Covert Channels Implementation and Detection in Virtual Environments. 575-584 - Silke Holtmanns, Yoan Miche, Ian Oliver:

Subscriber Profile Extraction and Modification via Diameter Interconnection. 585-594 - Lauri Isotalo:

5G Slicing as a Tool to Test User Equipment Against Advanced Persistent Threats. 595-603 - Tommi Meskanen, Masoud Naderpour, Valtteri Niemi:

Mind Your Right to Know: On De-anonymization Auditability in V2X Communications. 604-610
2nd International Workshop on Security of the Internet of Everything (SECIOE-2017)
- Lulu Liang, Kai Zheng, Qiankun Sheng, Wei Wang, Rong Fu, Xin Huang:

A Denial of Service Attack Method for IoT System in Photovoltaic Energy System. 613-622 - Chia-Mei Chen, Gu Hsin Lai, Yen-Chih Kuo, Tan-Ho Chang:

Improving Alert Accuracy for Smart Vehicles. 623-631 - Thomas W. Pieber, Thomas Ulz, Christian Steger

, Rainer Matischek:
Hardware Secured, Password-based Authentication for Smart Sensors for the Industrial Internet of Things. 632-642 - Leo Hippelainen, Ian Oliver, Shankar Lal:

Towards Dependably Detecting Geolocation of Cloud Servers. 643-656 - Juha Nurmi

, Mikko S. Niemelä
:
Tor De-anonymisation Techniques. 657-671 - Michal Zima:

Coincer: Decentralised Trustless Platform for Exchanging Decentralised Cryptocurrencies. 672-682 - Deepak Kumar Dalai

, Pinaki Sarkar:
Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet. 683-693 - Ali Abbasi

, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon
, Sandro Etalle:
\mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems. 694-709 - Nian Xue, Chenglong Jiang, Xin Huang, Dawei Liu:

A Role-Based Access Control System for Intelligent Buildings. 710-720 - Smriti Bhatt, Farhan Patwa, Ravi S. Sandhu:

Access Control Model for AWS Internet of Things. 721-736 - Noria Foukia, David Billard

, Eduardo Solana:
Privacy Verification Chains for IoT. 737-752 - Rendon Sánchez Angel Mecías, Octavio José Salcedo Parra, Correa Sánchez Lewys:

Platform for Detection of Holes in the Bogotá D.C. Road Network and Exposure of the Information in a Web Environment. 753-760

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














