


default search action
14th SecureComm 2018: Singapore
- Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu:

Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 255, Springer 2018, ISBN 978-3-030-01703-3
Social Network and Enterprise Security
- Yulong Dong, Jun Dai

, Xiaoyan Sun:
A Mobile Botnet That Meets Up at Twitter. 3-21 - Yu Li, Dae Wook Kim, Junjie Zhang, Derek Doran:

Detecting Suspicious Members in an Online Emotional Support Service. 22-42 - Xueping Liang, Sachin Shetty

, Deepak K. Tosh
, Yafei Ji, Danyi Li:
Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using Blockchain. 43-62 - Yahan Wang, Chunhua Wu, Kangfeng Zheng, Xiujuan Wang:

Social Bot Detection Using Tweets Similarity. 63-78
Network Security
- Mengyi Li, Chi-Hung Chi, Chen Ding, Raymond K. Wong, Zhong She:

A Multi-protocol Authentication Shibboleth Framework and Implementation for Identity Federation. 81-101 - Thomas Lukaseder, Lisa Maile

, Benjamin Erb, Frank Kargl:
SDN-Assisted Network-Based Mitigation of Slow DDoS Attacks. 102-121 - Bernd Prünster

, Dominik Ziegler, Christian Kollmann, Bojan Suzic:
A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won't Do. 122-138 - Amir Rezapour, Wen-Guey Tzeng:

A Robust Intrusion Detection Network Using Thresholdless Trust Management System with Incentive Design. 139-154 - Gaurav Varshney, Pawel Szalachowski:

A Metapolicy Framework for Enhancing Domain Expressiveness on the Internet. 155-170 - Sze Yiu Chau

, Omar Chowdhury, Victor E. Gonsalves, Huangyi Ge, Weining Yang, Sonia Fahmy
, Ninghui Li:
Adaptive Deterrence of DNS Cache Poisoning. 171-191 - Sayed M. Saghaian N. E., Tom La Porta, Trent Jaeger, Z. Berkay Celik, Patrick D. McDaniel:

Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout. 192-212 - Eman Salem Alashwali, Kasper Rasmussen:

On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name. 213-228
Applied Cryptography
- Jing Yang, Shuangyi Zhu, Tianyu Chen, Yuan Ma, Na Lv, Jingqiang Lin:

Neural Network Based Min-entropy Estimation for Random Number Generators. 231-250 - Ya-Qi Song, Li Yang:

Improved Quantum Key Distribution Networks Based on Blom-Scheme. 251-270 - Liang Zheng, Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma:

Implementation of High Throughput XTS-SM4 Module for Data Storage Devices. 271-290 - Adil Ahmad, Faizan Ahmad, Lei Wei, Vinod Yegneswaran, Fareed Zaffar:

Detecting and Defending Against Certificate Attacks with Origin-Bound CAPTCHAs. 291-308
Web Security
- Ke Tian, Zhou Li, Kevin D. Bowers, Danfeng (Daphne) Yao

:
FrameHanger: Evaluating and Classifying Iframe Injection at Large Scale. 311-331 - Keitaro Yamazaki, Daisuke Kotani

, Yasuo Okabe:
Xilara: An XSS Filter Based on HTML Template Restoration. 332-351 - Juan D. Parra Rodriguez, Joachim Posegga:

Local Storage on Steroids: Abusing Web Browsers for Hidden Content Storage and Distribution. 352-371
ATCS Workshop
- Attlee M. Gamundani

, Amelia Phillips, Hippolyte N. Muyingi:
A Review and Costing of Lightweight Authentication Schemes for Internet of Things (IoT): Towards Design of an Authentication Architecture for Smart Home Applications. 375-390 - Musfira Siddique, Muhammad Ayzed Mirza

, Mudassar Ahmad, Junaid Chaudhry, Rafiqul Islam
:
A Survey of Big Data Security Solutions in Healthcare. 391-406 - Mozammel Chowdhury, Sharmin Jahan, Rafiqul Islam

, Junbin Gao
:
Malware Detection for Healthcare Data Security. 407-416 - Gaurav Sharma, Soultana Ellinidou, Veronika Kuchta, Rajeev Anand Sahu

, Olivier Markowitch, Jean-Michel Dricot:
Secure Communication on NoC Based MPSoC. 417-428 - Yeslam Al-Saggaf

:
Online Radicalisation Along a Continuum: From When Individuals Express Grievances to When They Transition into Extremism. 429-440 - Bin Ma, Xiaoyu Wang, Bing Li, Yunqing Shi:

A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data Hiding. 441-452 - Tongyi Xie, Jiawei Mo, Baohua Huang:

A Secure AODV Protocol Improvement Scheme Based on Fuzzy Neural Network. 453-467 - Eman Salem Alashwali, Kasper Rasmussen:

What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS. 468-487 - Niken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo

, Helen Ashman
:
An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia Presentations. 488-506 - Niken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo

, Helen Ashman
:
Event Reconstruction of Indonesian E-Banking Services on Windows Phone Devices. 507-521

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














