


default search action
10. SecureComm 2014: Beijing, China
- Jing Tian, Jiwu Jing, Mudhakar Srivatsa:

International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 153, Springer 2015, ISBN 978-3-319-23801-2
Doctoral Symposium
- Qun Wang, Huanyan Qian, Peiyu Ji, Yu Xie, Shuhui Yang:

A Performance Comparison Study of a Coverage-Preserving Node Scheduling Scheme and Its Enhancement in Sensor Networks. 3-9 - Xianming Gao, Xiaozhe Zhang, Baosheng Wang, Huiting Shi:

An Improved Authorization Model in Trust Network. 10-16 - Piers O'Hanlon, Joss Wright, Ian Brown, Tulio de Souza:

KEMF: Key Management for Federated Sensor Networks. 17-24 - Rula Sayaf, Dave Clarke, Richard Harper:

\mathrmCPS^2 : A Contextual Privacy Framework for Social Software. 25-32 - Ben Niu, Xiuguang Li, Xiaoyan Zhu, Xiaoqing Li, Hui Li:

Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks. 33-40 - Li Zhai, ChuanKun Wu:

RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack. 41-47
Intrusion Detection
- Vincenzo Gulisano

, Magnus Almgren
, Marina Papatriantafilou
:
METIS: A Two-Tier Intrusion Detection System for Advanced Metering Infrastructures. 51-68 - Shen Su, Beichuan Zhang, Binxing Fang:

Online Detection of Concurrent Prefix Hijacks. 69-83 - Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein

:
Countermeasures for Mitigating ICN Routing Related DDoS Attacks. 84-92 - Ziyu Wang, Jiahai Yang, Fuliang Li:

A New Anomaly Detection Method Based on IGTE and IGFE. 93-109
International Workshop on Applications and Technologies in Cyber Security (ATCS)
- Zubair Shah

, Abdun Naser Mahmood
, Jill Slay
:
Forensic Potentials of Solid State Drives. 113-126 - Saira Syed, Quazi Mamun

:
Cloud Security from Users Point of View: A Pragmatic Study with Thematic Analysis. 127-140 - Khandakar Rabbi, Mohammed Kaosar

, Md. Rafiqul Islam
, Quazi Mamun
:
A Secure Real Time Data Processing Framework for Personally Controlled Electronic Health Record (PCEHR) System. 141-156 - Abdun Naser Mahmood

, Md. Enamul Kabir
, Abdul K. Mustafa:
Novel Iterative Min-Max Clustering to Minimize Information Loss in Statistical Disclosure Control. 157-172 - Pinaki Sarkar, Priyatosh Mahish

, Morshed Uddin Chowdhury
, Kouichi Sakurai:
Securing Sensor Networks by Moderating Frequencies. 173-185 - Jarrod West, Maumita Bhattacharya

, Md. Rafiqul Islam
:
Intelligent Financial Fraud Detection Practices: An Investigation. 186-203 - Mohiuddin Ahmed

, Abdun Naser Mahmood
:
Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection. 204-219 - Md. Saiful Islam

, Md. Rafiqul Islam
, A. S. M. Kayes
, Chengfei Liu
, Irfan Altas:
A Survey on Mining Program-Graph Features for Malware Analysis. 220-236 - Hussein Alnabulsi, Quazi Mamun

, Md. Rafiqul Islam
, Morshed U. Chowdhury
:
Defence Against Code Injection Attacks. 237-251 - Adnan Anwar

, Abdun Naser Mahmood
, Mohiuddin Ahmed
:
False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation. 252-266 - Ala' F. A. Aburumman, Kim-Kwang Raymond Choo

:
A Domain-Based Multi-cluster SIP Solution for Mobile Ad Hoc Network. 267-281
DAPRO 2014 and SSS 2014 International Workshop on Data Protection in Mobile and Pervasive Computing (DAPRO) International Workshop on Secure Smart Systems (SSS)
- Le Guan, Fengjun Li

, Jiwu Jing, Jing Wang, Ziqiang Ma:
virtio-ct: A Secure Cryptographic Token Service in Hypervisors. 285-300 - Fatih Kiliç, Thomas Kittel, Claudia Eckert:

Blind Format String Attacks. 301-314 - Felix C. Freiling, Mykola Protsenko, Yan Zhuang:

An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs. 315-328 - Fahad Alarifi, Maribel Fernández:

Towards Privacy-Preserving Web Metering via User-Centric Hardware. 329-340 - Weiyu Jiang, Zhan Wang, Limin Liu, Neng Gao:

Towards Efficient Update of Access Control Policy for Cryptographic Cloud Storage. 341-356
International Workshop on System Level Security of Smartphones
- Heqing Huang, Kai Chen, Peng Liu, Sencun Zhu, Dinghao Wu:

Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms. 359-366 - Zhongwen Zhang, Ji Xiang, Lei Wang, Lingguang Lei:

Transplantation Attack: Analysis and Prediction. 367-374 - Yingjun Zhang, Kezhen Huang, Yuling Liu, Kai Chen, Liang Huang, Yifeng Lian:

Timing-Based Clone Detection on Android Markets. 375-381 - Wei Hu, Dongyao Ji, Ting Wang, Gang Yao:

A New Trust Chain Security Evaluation Model and Tool. 382-391 - Bin Li, Zhijie Feng:

A System for Privacy Information Analysis and Safety Assessment of iOS Applications. 392-398 - Bin Ma:

How We Found These Vulnerabilities in Android Applications. 399-406

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














