


default search action
ATCS/SePrIoT@SecureComm 2017: Niagara Falls, ON, Canada
- Xiaodong Lin, Ali A. Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang:

Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 239, Springer 2018, ISBN 978-3-319-78815-9
International Workshop on Applications and Techniques in Cyber Security (ATCS)
- Erdal Ozkaya

, Rafiqul Islam
:
Privacy in Social Media. 3-10 - Li Wang, Dinghao Wu:

SecControl: Bridging the Gap Between Security Tools and SDN Controllers. 11-31 - Yeslam Al-Saggaf

:
An Effective Approach for Dealing with the Pressure to Compromise Security During Systems Development. 32-46 - Jemal H. Abawajy, A. Richard, Zaher Al Aghbari:

Securing Websites Against Homograph Attacks. 47-59 - Jemal H. Abawajy, Mohd Izuan Hafez Ninggal, Zaher Al Aghbari, Abdul Basit Darem

, Asma Alhashmi
:
Privacy Threat Analysis of Mobile Social Network Data Publishing. 60-68 - Muhammad Jafer, M. Arif Khan

, Sabih ur Rehman
, Tanveer A. Zia:
Exploring Secure Communication in VANET Broadcasting. 69-84 - Cory Smith, Glenn Dietrich, Kim-Kwang Raymond Choo

:
Identification of Forensic Artifacts in VMWare Virtualized Computing. 85-103 - Itzael Jiménez Aranda, Eleazar Aguirre Anaya, Raúl Acosta Bermejo

, Ponciano Jorge Escamilla-Ambrosio
:
Possible Keyloggers Without Implementing a Keyboard in Android. 104-112 - Md Samsul Haque

, Morshed U. Chowdhury:
A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV). 113-122 - Sharmin Jahan, Mozammel Chowdhury, Rafiqul Islam

, Junaid Ahsenali Chaudhry:
Securing Healthcare Data Using Biometric Authentication. 123-132 - Mozammel Chowdhury, Rafiqul Islam

, Junbin Gao
:
Fast and Robust Biometric Authentication Scheme Using Human Ear. 133-144 - Ying Lin, Bo Li:

WebAD ^2 2 : A Cascading Model Based on Machine Learning for Web Attacks Detection. 145-165 - Ken Eustace

, Rafiqul Islam
, Philip Tsang, Geoffrey Fellows
:
Human Factors, Self-awareness and Intervention Approaches in Cyber Security When Using Mobile Devices and Social Networks. 166-181 - Zhi Wang, Meilin Qin, Mengqi Chen, Chunfu Jia:

Hiding Fast Flux Botnet in Plain Email Sight. 182-197 - Maxwell G. Dondo:

Cyber Security Decision Support for Remediation in Automated Computer Network Defence. 198-217 - Chaz Vidal, Kim-Kwang Raymond Choo

:
Situational Crime Prevention and the Mitigation of Cloud Computing Threats. 218-233 - Lorena González-Manzano, Mark Slaymaker

, José María de Fuentes
, Dimitris Vayenas:
SoNeUCONABCPro: An Access Control Model for Social Networks with Translucent User Provenance. 234-252
1st Workshop on Security and Privacy in the Internet of Things (SePrIoT)
- Sevil Sen

, Ahmet Ilhan Aysan, John A. Clark:
SAFEDroid: Using Structural Features for Detecting Android Malwares. 255-270 - Dustin Mink, William Bradley Glisson

, Ryan Benton
, Kim-Kwang Raymond Choo
:
Manipulating the Five V's in the Next Generation Air Transportation System. 271-282 - Alfonso Blanco Blanco

, José María de Fuentes
, Lorena González-Manzano, Luis Hernández Encinas
, Agustín Martín Muñoz
, José Luis Rodrigo Oliva, J. Ignacio Sánchez García:
A Framework for Acquiring and Analyzing Traces from Cryptographic Devices. 283-300 - Eirini Anthi, George Theodorakopoulos

:
Sensitive Data in Smartphone Applications: Where Does It Go? Can It Be Intercepted? 301-319 - Mohammed Riyadh Abdmeziem

, François Charoy:
Fault-Tolerant and Scalable Key Management Protocol for IoT-Based Collaborative Groups. 320-338

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














