


default search action
17th TrustCom / 12th BigDataSE 2018: New York, NY, USA
- 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018. IEEE 2018, ISBN 978-1-5386-4388-4
IEEE TrustCom 2018
Track 1: Trust Track 1
- Scot Tucker:
Engineering Trust: A Graph-Based Algorithm for Modeling, Validating, and Evaluating Trust. 1-9 - Yubiao Wang, Junhao Wen, Wei Zhou, Fengji Luo:
A Novel Dynamic Cloud Service Trust Evaluation Model in Cloud Computing. 10-15 - Yongkai Fan, Shengle Liu, Gang Tan
, Xiaodong Lin, Guanqun Zhao, Jianrong Bai:
One Secure Access Scheme Based on Trusted Execution Environment. 16-21 - Tianao Ma, Wei Hu, Yonghao Wang
, Dalia El-Banna, John Grant, Hongjun Dai:
Evaluation of Flexilink as Deterministic Unified Real-Time Protocol for Industrial Networks. 22-27
Track 1: Trust Track 2
- Ghada El Haddad, Esma Aïmeur, Hicham Hage:
Understanding Trust, Privacy and Financial Fears in Online Payment. 28-36 - Sebastian Friebe, Ingo Sobik, Martina Zitterbart:
DecentID: Decentralized and Privacy-Preserving Identity Storage System Using Smart Contracts. 37-42 - Monika Ewa Rakoczy
, Amel Bouzeghoub, Alda Lopes Gançarski, Katarzyna Wegrzyn-Wolska
:
Reputation Prediction Using Influence Conversion. 43-48 - Mostafa Kahla, Mohamed Azab, Ahmed Mansour:
Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments. 49-54
Track 1: Trust Track 3
- Mohamed Azab, Ahmed Hamdy, Ahmed Mansour:
Repoxy: Replication Proxy for Trustworthy SDN Controller Operation. 55-60 - Concepcion Sanchez Aleman, Niki Pissinou, Sheila Alemany, Georges A. Kamhoua:
A Dynamic Trust Weight Allocation Technique for Data Reconstruction in Mobile Wireless Sensor Networks. 61-67 - Jian Chen, Ziyang Chen, Peijia Zheng, Jianting Guo, Wei Zhang, Jiwu Huang:
Encrypted Domain Mel-Frequency Cepstral Coefficient and Fragile Audio Watermarking. 68-73 - Bumjin Gwak, Jin-Hee Cho, Dongman Lee, Heesuk Son:
TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things. 74-85
Track 1: Trust Track 4
- Jian Chen, Peijia Zheng, Jianting Guo, Wei Zhang, Jiwu Huang:
A Privacy-Preserving Multipurpose Watermarking Scheme for Audio Authentication and Protection. 86-91 - Manu Elappila
, Suchismita Chinara:
Dynamic Survivable Path Routing for Fast Changing IoT Network Topologies. 92-97 - Zhaojun Lu, Qian Wang, Gang Qu, Zhenglin Liu:
BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs. 98-103 - Abu Shohel Ahmed, Tuomas Aura
:
Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure. 104-111
Track 1: Trust Track 5
- Ibrahim Tariq Javed, Khalifa Toumi, Noël Crespi:
N-Combat: A Nuisance Call Combating Framework for Internet Telephony. 112-117 - Muhammad Saleem Khan, Saira Waris, Idrees Ahmed
, Majid Iqbal Khan:
A Comprehensive Analysis of Packet Loss in MANETs. 118-123 - Sheikh Mahbub Habib
, Nikolaos Alexopoulos, Md Monirul Islam, Jens Heider, Stephen Marsh, Max Mühlhäuser:
Trust4App: Automating Trustworthiness Assessment of Mobile Applications. 124-135 - Shunan Ma, Xunbo Shuai, Zhaohua Zhou, Kechun Qiao:
Bionic Mechanism Based Dynamic Trust Evaluation Method in Cloud Environment. 136-141
Track 1: Trust Track 6
- Keju Meng, Fuyou Miao, Yue Yu, Changbin Lu:
A Universal Secret Sharing Scheme with General Access Structure Based on CRT. 142-148 - Gaosheng Liu, Xin Wang, Xiaohong Li, Jianye Hao, Zhiyong Feng:
ESRQ: An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning. 149-155 - Antonio Caliò, Andrea Tagarelli:
Trust-Based Dynamic Linear Threshold Models for Non-competitive and Competitive Influence Propagation. 156-162 - Syed Rizvi, Andrew Kurtz, Joseph R. Pfeffer III, Mohammad Rizvi:
Securing the Internet of Things (IoT): A Security Taxonomy for IoT. 163-168
Track 1: Trust Track 7
- Dapeng Qu, Dengyu Liang, Songlin Wu, Jie Li, Weihong Xuan, Xingwei Wang:
A Trust Energy-Efficient QoS Routing Scheme for Mobile Peer-to-Peer Networks. 169-176 - Tao Sun, Xin Guo, Ting Zhang:
Testing Sequence Generation Method Based on Unrelated Behaviors Serializing. 177-183 - Mark J. Carman, Mark Koerber, Jiuyong Li
, Kim-Kwang Raymond Choo
, Helen Ashman
:
Manipulating Visibility of Political and Apolitical Threads on Reddit via Score Boosting. 184-190 - Ruidan Li, Errin W. Fulp:
Using Evolutionary Approaches to Manage Surveillance Cameras in Dynamic Environments. 191-196 - Jie Zhou, Min Tian:
An Elite Clone Parallel Genetic Algorithm for Trust Monitoring Assignment Problem in Adaptive Wireless Sensor Networks. 197-203 - Hamza Baqa, Nguyen Binh Truong, Noël Crespi, Gyu Myoung Lee, Franck Le Gall
:
Quality of Information as an indicator of Trust in the Internet of Things. 204-211
Track 2: Security Track 1
- Mehdi Yousefi, Nhamo Mtetwa, Yan Zhang, Huaglory Tianfield
:
A Reinforcement Learning Approach for Attack Graph Analysis. 212-217 - Wenli Shang, Junrong Cui, Chunhe Song, Jianming Zhao, Peng Zeng
:
Research on Industrial Control Anomaly Detection Based on FCM and SVM. 218-222 - Sha Ma:
Authorized Equality Test of Encrypted Data for Secure Cloud Databases. 223-230
Track 2: Security Track 2
- Weitao Xu
, Sanjay Jha
, Wen Hu
:
Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN. 231-236 - Jiewen Mao
, Weijun Deng, Fuke Shen:
DDoS Flooding Attack Detection Based on Joint-Entropy with Multiple Traffic Features. 237-243 - Martin Schanzenbach
, Christian Banse
, Julian Schütte:
Practical Decentralized Attribute-Based Delegation Using Secure Name Systems. 244-251 - Lingtao Qi, Haiping Huang, Peng Wang, Ru Chuan Wang:
Abnormal Item Detection Based on Time Window Merging for Recommender Systems. 252-259
Track 2: Security Track 3
- Ekaterina Volodina, Adnan Aziz, Erwin P. Rathgeb, Tobias Hoßfeld
:
Application of Visual Analysis to Detect and Analyze Patterns in VoIP Attack Traffic. 260-268 - Qiang Li, Zhengwei Jiang, Zeming Yang, Baoxu Liu, Xin Wang, Yunan Zhang:
A Quality Evaluation Method of Cyber Threat Intelligence in User Perspective. 269-276 - Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo
:
Towards Better Ocular Recognition for Secure Real-World Applications. 277-282 - Pengfei Wang, Fengyu Wang, Fengbo Lin, Zhenzhong Cao:
Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis. 283-288
Track 2: Security Track 4
- Julian Schütte, Gerd Stefan Brost:
LUCON: Data Flow Control for Message-Based IoT Systems. 289-299 - Yiwen Gao
, Wei Cheng, Hailong Zhang, Yongbin Zhou:
Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages. 300-306 - Hui Xie, Kun Lv, Changzhen Hu:
An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis. 307-315 - Devu Manikantan Shila, Emeka Eyisi:
Adversarial Gait Detection on Mobile Devices Using Recurrent Neural Networks. 316-321
Track 2: Security Track 5
- Liting Yu, Dongrong Zhang, Liang Wu, Shuguo Xie, Donglin Su, Xiaoxiao Wang:
AES Design Improvements Towards Information Security Considering Scan Attack. 322-326 - Lal Hussain
, Wajid Aziz
, Sharjil Saeed, Saima Rathore, Muhammad Rafique
:
Automated Breast Cancer Detection Using Machine Learning Techniques by Extracting Different Feature Extracting Strategies. 327-331 - Zhenya Chen, Weifeng Liu, Ying Yang, Jizhi Wang, Meng Guo, Lijuan Chen, Guang Yang, Jie Zhou:
Electronic Evidence Service Research in Cloud Computing Environment. 332-338
Track 2: Security Track 6
- Shuang Wei, Shuaifu Dai, Xinfeng Wu, Xinhui Han:
STDC: A SDN-Oriented Two-Stage DDoS Detection and Defence System Based on Clustering. 339-347 - Yang Lu
, Richard O. Sinnott, Karin Verspoor
:
Semantic-Based Policy Composition for Privacy-Demanding Data Linkage. 348-359 - Jiarong Wang, Lijun Cai, Aimin Yu, Min Zhu, Dan Meng:
TempatMDS: A Masquerade Detection System Based on Temporal and Spatial Analysis of File Access Records. 360-371 - Shao-Chien Chen, Yi-Ruei Chen, Wen-Guey Tzeng:
Effective Botnet Detection Through Neural Networks on Convolutional Features. 372-378
Track 2: Security Track 7
- Talal Halabi
, Martine Bellaïche, Adel Abusitta:
Online Allocation of Cloud Resources Based on Security Satisfaction. 379-384 - Katarzyna Kapusta, Gérard Memmi:
Enhancing Data Protection in a Distributed Storage Environment Using Structure-Wise Fragmentation and Dispersal of Encrypted Data. 385-390 - Sumit Kumar Tetarave, Somanath Tripathy, Ezhil Kalaimannan, Caroline John:
eBot: Approach Towards Modeling an Advanced P2P Botnet. 391-396 - Huikang Cao, Ruixuan Li, Wenlong Tian, Zhiyong Xu, Weijun Xiao:
A Practical Accountability Scheme for Oblivious RAM in Cloud Storage. 397-402
Track 2: Security Track 8
- Nour El Madhoun, Emmanuel Bertin, Guy Pujolle:
For Small Merchants: A Secure Smartphone-Based Architecture to Process and Accept NFC Payments. 403-411 - Noboru Kunihiro
, Wenjie Lu, Takashi Nishide, Jun Sakuma:
Outsourced Private Function Evaluation with Privacy Policy Enforcement. 412-423 - Fabrizio Biondi, Thomas Given-Wilson, Axel Legay:
Universal Optimality of Apollonian Cell Encoders. 424-435 - Firas Saidi, Zouheir Trabelsi, Henda Ben Ghézala
:
An Evidential Clustering Based Framework for Cyber Terrorist Cells Topology Identification. 436-443
Track 2: Security Track 9
- Nilesh Chakraborty, Shreya Singh, Samrat Mondal
:
On Designing a Questionnaire Based Honeyword Generation Approach for Achieving Flatness. 444-455 - Hatem Ismail, Stefanie Roos, Neeraj Suri
:
A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems. 456-464 - Filipe Apolinario
, Miguel L. Pardal
, Miguel Correia:
S-Audit: Efficient Data Integrity Verification for Cloud Storage. 465-474 - Zechun Cao
, Shou-Hsuan Stephen Huang
:
Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit Selection. 475-480
Track 2: Security Track 10
- Iakovos Gurulian, Konstantinos Markantonakis, Eibe Frank, Raja Naeem Akram
:
Good Vibrations: Artificial Ambience-Based Relay Attack Detection. 481-489 - Stephen C. Adams, Bryan T. Carter, Cody H. Fleming, Peter A. Beling:
Selecting System Specific Cybersecurity Attack Patterns Using Topic Modeling. 490-497 - William Ledbetter, William Bradley Glisson
, Todd McDonald, Todd R. Andel, George Grispos
, Kim-Kwang Raymond Choo
:
Digital Blues: An Investigation Into the Use of Bluetooth Protocols. 498-503 - Meera Sridhar, Abhinav Mohanty, Fadi Yilmaz
, Vasant Tendulkar, Kevin W. Hamlen:
Inscription: Thwarting ActionScript Web Attacks From Within. 504-515
Track 2: Security Track 11
- George W. Clark, Michael V. Doran, William Glisson
:
A Malicious Attack on the Machine Learning Policy of a Robotic System. 516-521 - Hidehito Gomi, Shuji Yamaguchi, Kota Tsubouchi
, Naomi Sasaya:
Continuous Authentication System Using Online Activities. 522-532 - Mehdi Nobakht
, Yulei Sui
, Aruna Seneviratne, Wen Hu
:
Permission Analysis of Health and Fitness Apps in IoT Programming Frameworks. 533-538 - Taku Noguchi
, Mayuko Hayakawa:
Black Hole Attack Prevention Method Using Multiple RREPs in Mobile Ad Hoc Networks. 539-544
Track 2: Security Track 12
- Tong Liu, Gang Shi, Liwei Chen, Fei Zhang, Yaxuan Yang, Jihu Zhang:
TMDFI: Tagged Memory Assisted for Fine-Grained Data-Flow Integrity Towards Embedded Systems Against Software Exploitation. 545-550 - A. S. M. Kayes
, J. Wenny Rahayu, Tharam S. Dillon, Elizabeth Chang
:
Accessing Data from Multiple Sources Through Context-Aware Access Control. 551-559 - Chunhua Li, Weirui Xie, Ke Zhou:
Efficient Binary-Encoding Access Control Policy Combination for Large-Scale Collaborative Scenarios. 560-566 - Luis Sacramento, Iberia Medeiros
, Joao Bota, Miguel Correia:
FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data Using Network Flows. 567-572
Track 2: Security Track 13
- Hooman Alavizadeh
, Julian Jang-Jaccard
, Dong Seong Kim
:
Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing. 573-578 - Dilli Prasad Sharma
, Dong Seong Kim
, Seunghyun Yoon
, Hyuk Lim, Jin-Hee Cho, Terrence J. Moore
:
FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. 579-587 - Simon Yusuf Enoch
, Jin B. Hong
, Dong Seong Kim
:
Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models. 588-595 - Andrea Saracino
, Francesco Restuccia, Fabio Martinelli:
Practical Location Validation in Participatory Sensing Through Mobile WiFi Hotspots. 596-607
Track 2: Security Track 14
- Youcef Imine
, Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Ahmed Lounis
:
MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture. 608-613 - Zechao Liu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Ruoqing Zhang, Yulin Wu:
A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage. 614-623 - Judong Bao, Yongqiang He, Weiping Wen:
DroidPro: An AOTC-Based Bytecode-Hiding Scheme for Packing the Android Applications. 624-632 - Rocio Lopez Perez, Florian Adamsky, Ridha Soua, Thomas Engel:
Machine Learning for Reliable Network Attack Detection in SCADA Systems. 633-638
Track 2: Security Track 15
- Jeffery Garae, Ryan K. L. Ko
, Mark D. Apperley:
A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach. 639-650 - Eric Klieme, Christian Tietz, Christoph Meinel:
Beware of SMOMBIES: Verification of Users Based on Activities While Walking. 651-660 - Samir G. Sayed, Mohmed Shawkey:
Data Mining Based Strategy for Detecting Malicious PDF Files. 661-667 - Glaidson Menegazzo Verzeletti, Emerson Ribeiro de Mello, Michelle Silva Wangham
:
A National Mobile Identity Management Strategy for Electronic Government Services. 668-673
Track 2: Security Track 16
- Nisha Malik, Priyadarsi Nanda, Arushi Arora, Xiangjian He
, Deepak Puthal:
Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks. 674-679 - Xiehua Li, Jie Jiang, Yichen Chen:
Fully Decentralized Authentication and Revocation Scheme in Data Sharing Systems. 680-686 - Menghao Zhang
, Jun Bi, Jiasong Bai, Guanyu Li:
FloodShield: Securing the SDN Infrastructure Against Denial-of-Service Attacks. 687-698 - Wei Zhang, Dongdai Lin, Hailong Zhang, Xiaojun Zhou, Yiwen Gao
:
A Lightweight FourQ Primitive on ARM Cortex-M0. 699-704
Track 2: Security Track 17
- Danjun Liu, Jingyuan Wang, Zelin Rong, Xianya Mi, Fangyu Gai, Yong Tang, Baosheng Wang:
Pangr: A Behavior-Based Automatic Vulnerability Detection and Exploitation Framework. 705-712 - Xiang Liu
, Jie Huang, Guowen Zong:
Public Auditing for Network Coding Based Secure Cloud Storage. 713-720 - Syed Rizvi, Joseph Gualdoni, Abdul Razaque
:
Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol. 721-726 - Qiwen Wang, Jianguo Jiang, Zhixin Shi, Wen Wang, Bin Lv, Biao Qi, Qilei Yin:
A Novel Multi-source Fusion Model for Known and Unknown Attack Scenarios. 727-736
Track 2: Security Track 18
- Guolin Tan, Peng Zhang, Qingyun Liu, Xinran Liu, Chunge Zhu, Fenghu Dou:
Adaptive Malicious URL Detection: Learning in the Presence of Concept Drifts. 737-743 - Liya Su, Yepeng Yao, Ning Li, Junrong Liu, Zhigang Lu, Baoxu Liu:
Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection. 744-753 - Biao Qi, Jianguo Jiang, Zhixin Shi, Rui Mao, Qiwen Wang:
BotCensor: Detecting DGA-Based Botnet Using Two-Stage Anomaly Detection. 754-762 - Guang Yang, Lijun Cai, Aimin Yu, Dan Meng:
A General and Expandable Insider Threat Detection System Using Baseline Anomaly Detection and Scenario-Driven Alarm Filters. 763-773
Track 2: Security Track 19
- Satsuya Ohata, Takahiro Matsuda, Kanta Matsuura
:
Provably Secure Password Reset Protocol: Model, Definition, and Construction. 774-782 - Xiang Tian, Yujia Zhu, Zhao Li, Chao Zheng, Yong Sun, Qingyun Liu:
VegaStar: An Illegal Domain Detection System on Large-Scale Video Traffic. 783-789 - Rudrapatna K. Shyamasundar, N. V. Narendra Kumar, Abhijit Taware, Parjanya Vyas:
An Experimental Flow Secure File System. 790-799 - Danjun Liu, Yao Li, Yong Tang, Baosheng Wang, Wei Xie:
VMPBL: Identifying Vulnerable Functions Based on Machine Learning Combining Patched Information and Binary Comparison Technique by LCS. 800-807
Track 2: Security Track 20
- Anshul Arora, Sateesh Kumar Peddoju:
NTPDroid: A Hybrid Android Malware Detector Using Network Traffic and System Permissions. 808-813 - Mohannad Mostafa, Tanushree Banerjee, M. Anwar Hasan:
Energy Exhaustion Attack on Barrett's Reduction. 814-818 - Trusit Shah, Subbarayan Venkatesan:
Authentication of IoT Device and IoT Server Using Secure Vaults. 819-824 - Errin W. Fulp, H. Donald Gage:
Using Feature Selection to Identify Chains of Insecure Software Configuration Parameters. 825-830 - Nouha Oualha
:
Reinforcing IoT-Enforced Security Policies. 831-836
Track 2: Security Track 21
- Ruichun Gu, Xiaolong Zhang, Yu Lei, Junxing Zhang:
Enhancing Security and Scalability in Software Defined LTE Core Networks. 837-842