


default search action
16th SecureComm 2020: Washington, DC, USA
- Noseong Park, Kun Sun, Sara Foresti, Kevin R. B. Butler, Nitesh Saxena:

Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 335, Springer 2020, ISBN 978-3-030-63085-0 - Md. Mazharul Islam, Ehab Al-Shaer, Muhammad Abdul Basit Ur Rahim

:
Email Address Mutation for Proactive Deterrence Against Lateral Spear-Phishing Attacks. 1-22 - Ehsan Aghaei, Waseem G. Shadid, Ehab Al-Shaer:

ThreatZoom: Hierarchical Neural Network for CVEs to CWEs Classification. 23-41 - Qianying Shen, Futai Zou:

Detecting Dictionary Based AGDs Based on Community Detection. 42-48 - Qingchuan Zhao

, Haohuang Wen
, Zhiqiang Lin, Dong Xuan, Ness B. Shroff:
On the Accuracy of Measured Proximity of Bluetooth-Based Contact Tracing Apps. 49-60 - Muhammad Abdul Basit Ur Rahim

, Ehab Al-Shaer, Qi Duan:
A Formal Verification of Configuration-Based Mutation Techniques for Moving Target Defense. 61-79 - Douglas J. Leith

, Stephen Farrell:
Coronavirus Contact Tracing App Privacy: What Data Is Shared by the Singapore OpenTrace App? 80-96 - Tyler McDaniel, Jared M. Smith, Max Schuchard:

The Maestro Attack: Orchestrating Malicious Flows with BGP. 97-117 - Jingcheng Yang, Haowei Ye, Futai Zou:

pyDNetTopic: A Framework for Uncovering What Darknet Market Users Talking About. 118-139 - Dalton A. Hahn, Drew Davidson, Alexandru G. Bardas:

MisMesh: Security Issues and Challenges in Service Meshes. 140-151 - Fatemeh Rezaei

, Shahrzad Naseri, Ittay Eyal, Amir Houmansadr:
The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels. 152-171 - Fengzhao Shi, Chao Zheng, Yiming Cui, Qingyun Liu:

MAAN: A Multiple Attribute Association Network for Mobile Encrypted Traffic Classification. 172-189 - Niels Hansen, Lorenzo De Carli

, Drew Davidson:
Assessing Adaptive Attacks Against Trained JavaScript Classifiers. 190-210 - Yisroel Mirsky, Benjamin Fedidat, Yoram Haddad:

An Encryption System for Securing Physical Signals. 211-232 - Zhifan Xu

, Melike Baykal-Gürsoy:
A Cooperative Jamming Game in Wireless Networks Under Uncertainty. 233-254 - Haipeng Li, Ben Niu, Boyang Wang:

SmartSwitch: Efficient Traffic Obfuscation Against Stream Fingerprinting. 255-275 - Quinn Burke, Patrick D. McDaniel, Thomas F. La Porta, Mingli Yu, Ting He:

Misreporting Attacks in Software-Defined Networking. 276-296 - Haohuang Wen

, Qingchuan Zhao
, Zhiqiang Lin, Dong Xuan, Ness B. Shroff:
A Study of the Privacy of COVID-19 Contact Tracing Apps. 297-317 - Abdullah Ali, Birhanu Eshete

:
Best-Effort Adversarial Approximation of Black-Box Malware Classifiers. 318-338 - Yubao Zhang, Shuai Hao, Haining Wang:

Review Trade: Everything Is Free in Incentivized Review Groups. 339-359 - Yuyang Rong

, Peng Chen, Hao Chen
:
Integrity: Finding Integer Errors by Targeted Fuzzing. 360-380 - Sayed M. Saghaian N. E., Tom La Porta, Simone Silvestri, Patrick D. McDaniel:

Improving Robustness of a Popular Probabilistic Clustering Algorithm Against Insider Attacks. 381-401 - David Darling, Ang Li, Qinghua Li:

Automated Bystander Detection and Anonymization in Mobile Photography. 402-424 - Nikolay Ivanov, Jianzhi Lou, Qiben Yan:

SmartWiFi: Universal and Secure Smart Contract-Enabled WiFi Hotspot. 425-445 - Elizabeth Stobert, Tina Safaie, Heather Molyneaux, Mohammad Mannan, Amr M. Youssef:

ByPass: Reconsidering the Usability of Password Managers. 446-466 - Jiaping Gui, Zhengzhang Chen

, Xiao Yu, Cristian Lumezanu, Haifeng Chen:
Anomaly Detection on Web-User Behaviors Through Deep Learning. 467-473 - Ross Copeland, Drew Davidson:

Identity Armour: User Controlled Browser Security. 474-480 - Xiaoyong Yuan

, Lei Ding
, Malek Ben Salem, Xiaolin Li, Dapeng Wu
:
Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-supervised Neural Networks. 481-502 - Nilanjan Sen, Ram Dantu, Mark A. Thompson:

Performance Analysis of Elliptic Curves for VoIP Audio Encryption Using a Softphone. 503-508 - Zhili Chen, Baohua Yang, Fuhu Wu, Shuai Ren, Hong Zhong:

TCNN: Two-Way Convolutional Neural Network for Image Steganalysis. 509-514 - Ssu-Hsin Yu:

PrivyTRAC - Privacy and Security Preserving Contact Tracing System. 515-525

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














