


default search action
16th SecureComm 2020: Washington, DC, USA
- Noseong Park, Kun Sun, Sara Foresti, Kevin R. B. Butler, Nitesh Saxena:

Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 336, Springer 2020, ISBN 978-3-030-63094-2 - Ruming Tang, Cheng Huang, Yanti Zhou, Haoxian Wu, Xianglin Lu, Yongqian Sun, Qi Li, Jinjin Li, Weiyao Huang, Siyuan Sun, Dan Pei

:
A Practical Machine Learning-Based Framework to Detect DNS Covert Communication in Enterprises. 1-21 - Mingkui Wei

, Khaled Rabieh
, Faisal Kaleem
:
CacheLoc: Leveraging CDN Edge Servers for User Geolocation. 22-40 - Md Ariful Haque, Sachin Shetty

, Charles A. Kamhoua, Kimberly Gold:
Modeling Mission Impact of Cyber Attacks on Energy Delivery Systems. 41-61 - Yu Wang

, Zhenzhen Li, Gaopeng Gou, Gang Xiong
, Chencheng Wang, Zhen Li:
Identifying DApps and User Behaviors on Ethereum via Encrypted Traffic. 62-83 - Candong Rong, Gaopeng Gou, Mingxin Cui, Gang Xiong, Zhen Li, Li Guo:

TransNet: Unseen Malware Variants Detection Using Deep Transfer Learning. 84-101 - Muhammad Ihsan Haikal Sukmana

, Kennedy Aondona Torkura, Sezi Dwi Sagarianti Prasetyo, Feng Cheng, Christoph Meinel:
A Brokerage Approach for Secure Multi-Cloud Storage Resource Management. 102-119 - Jaehyun Han

, Zhiqiang Lin, Donald E. Porter:
On the Effectiveness of Behavior-Based Ransomware Detection. 120-140 - Golam Dastoger Bashar, Alejandro Anzola Avila, Gaby G. Dagher:

PoQ: A Consensus Protocol for Private Blockchains Using Intel SGX. 141-160 - Sang-Yoon Chang:

Share Withholding in Blockchain Mining. 161-187 - Jiahui Zhang, Qian Lu, Ruobing Jiang

, Haipeng Qu:
PEDR: A Novel Evil Twin Attack Detection Scheme Based on Phase Error Drift Range. 188-207 - Xuebin Ma, Jingyu Yang, Shengyi Guan:

Differentially Private Social Graph Publishing for Community Detection. 208-214 - Syed Akib Anwar Hridoy, Mohammad Zulkernine:

LaaCan: A Lightweight Authentication Architecture for Vehicle Controller Area Network. 215-234 - Javier I. Campos, Kristen Johnson, Jonathan Neeley, Staci Roesch, Farha Jahan, Quamar Niyaz, Khair Al Shamaileh:

A Machine Learning Based Smartphone App for GPS Spoofing Detection. 235-241 - Yu Jiang, Ruixuan Li, Junwei Tang, Ali Davanian, Heng Yin

:
AOMDroid: Detecting Obfuscation Variants of Android Malware Using Transfer Learning. 242-253 - Ayush Kumar

, Mrinalini Shridhar, Sahithya Swaminathan, Teng Joon Lim:
ML-Based Early Detection of IoT Botnets. 254-260 - Quentin M. Kniep, Wolf Müller, Jens-Peter Redlich:

Post-Quantum Cryptography in WireGuard VPN. 261-267 - Rafal Leszczyna

:
Evaluating the Cost of Personnel Activities in Cybersecurity Management: A Case Study. 268-274 - Songsong Liu, Qiyang Song, Kun Sun, Qi Li:

SGX-Cube: An SGX-Enhanced Single Sign-On System Against Server-Side Credential Leakage. 275-290 - Nilanjan Sen, Ram Dantu, Kirill Morozov:

EW256357: A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications' Security. 291-310 - Xinxin Fan

, Zhi Zhong, Qi Chai, Dong Guo:
Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System. 311-323 - Chunling Han, Rui Xue:

Private Global Generator Aggregation from Different Types of Local Models. 324-335 - Pinchen Cui, David A. Umphress:

Perturbing Smart Contract Execution Through the Underlying Runtime. 336-349 - Mingyue Li

, Chunfu Jia, Wei Shao:
Blockchain Based Multi-keyword Similarity Search Scheme over Encrypted Data. 350-371 - Andreas Zdziarstek

, Willi Brekenfelder
, Felix Eibisch
:
Using the Physical Layer to Detect Attacks on Building Automation Networks. 372-390 - Mohammad Saidur Rahman, Ibrahim Khalil, Abdelaziz Bouras:

Formalizing Dynamic Behaviors of Smart Contract Workflow in Smart Healthcare Supply Chain. 391-402 - Liting Deng, Hui Wen, Mingfeng Xin, Yue Sun, Limin Sun, Hongsong Zhu:

Malware Classification Using Attention-Based Transductive Learning Network. 403-418 - Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Jingxuan Ma, Pascal Urien

:
COOB: Hybrid Secure Device Pairing Scheme in a Hostile Environment. 419-438 - Liangjia Li, Yuling Luo, Junxiu Liu, Senhui Qiu, Lanhang Li:

A Robust Watermarking Scheme with High Security and Low Computational Complexity. 439-454 - Immanuel Kunz, Christian Banse, Philipp Stephanow:

Selecting Privacy Enhancing Technologies for IoT-Based Services. 455-474 - Friedrich Doku

, Ethan Doku
:
Khopesh - Contact Tracing Without Sacrificing Privacy. 475-486

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














