


default search action
1st CSNet 2017: Rio de Janeiro, Brazil
- 1st Cyber Security in Networking Conference, CSNet 2017, Rio de Janeiro, Brazil, October 18-20, 2017. IEEE 2017, ISBN 978-1-5386-1332-0
- Valerio Selis
, Alan Marshall:
A fake timing attack against behavioural tests used in embedded IoT M2M communications. 1-6 - Igor Jochem Sanz, Martin Andreoni Lopez
, Diogo Menezes Ferrazani Mattos
, Otto Carlos Muniz Bandeira Duarte:
A cooperation-aware virtual network function for proactive detection of distributed port scanning. 1-8 - Zakarya Drias, Ahmed Serhrouchni, Olivier Vogel:
Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems (ICS). 1-10 - Romain Laborde, Arnaud Oglaza, François Barrère, Abdelmalek Benzekri:
dynSMAUG: A dynamic security management framework driven by situations. 1-8 - Renato Souza Silva
, Evandro L. C. Macedo
:
A cooperative approach for a global intrusion detection system for internet service providers. 1-8 - Jéssica Alcântara Gonçalves, Vinicius S. Faria, Gabriele de Brito Vieira, Camilla Alves Mariano da Silva, Dalbert Matos Mascarenhas
:
WIDIP: Wireless distributed IPS for DDoS attacks. 1-3 - Markus Endler, Anderson Silva, Rafael A. M. S. Cruz:
An approach for secure edge computing in the Internet of Things. 1-8 - Nour El Madhoun, Emmanuel Bertin:
Magic always comes with a price: Utility versus security for bank cards. 1-7 - Katarzyna Kapusta, Gérard Memmi, Hassan Noura
:
Secure and resilient scheme for data protection in unattended wireless sensor networks. 1-8 - Badis Hammi, Jean Philippe Monteuuis, Houda Labiod, Rida Khatoun, Ahmed Serhrouchni:
Using butterfly keys: A performance study of pseudonym certificates requests in C-ITS. 1-6 - Varun Sharma:
A ranking based privilege model for privacy in location based services. 1-7 - Valentin Vallois, Fouad Amine Guenane:
Bitcoin transaction: From the creation to validation, a protocol overview. 1-7 - Batoul Haidar, Maroun Chamoun
, Ahmed Serhrouchni:
Multilingual cyberbullying detection system: Detecting cyberbullying in Arabic content. 1-8 - Martin Andreoni Lopez
, Renato Souza Silva
, Igor Drummond Alvarenga, Gabriel A. F. Rebello
, Igor Jochem Sanz, Antonio Gonzalez Pastana Lobato, Diogo M. F. Mattos
, Otto Carlos M. B. Duarte, Guy Pujolle:
Collecting and characterizing a real broadband access network traffic dataset. 1-8 - Khalil Hariss, Maroun Chamoun, Abed Ellatif Samhat
:
On DGHV and BGV fully homomorphic encryption schemes. 1-9 - Sravani Teja Bulusu, Romain Laborde
, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri:
Describing advanced persistent threats using a multi-agent system approach. 1-3 - Mohammad-Mahdi Bazm, Marc Lacoste, Mario Südholt, Jean-Marc Menaud:
Side-channels beyond the cloud edge: New isolation threats and solutions. 1-8 - Mohamed Tahar Hammi, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, Pascale Minet:
A lightweight IoT security protocol. 1-8 - Mohammed El-hajj
, Maroun Chamoun
, Ahmad Fadlallah, Ahmed Serhrouchni:
Analysis of authentication techniques in Internet of Things (IoT). 1-3 - Patricio Zambrano
, Marco Sánchez
, Jenny Torres
, Walter Fuertes
:
BotHook: An option against Cyberpedophilia. 1-3 - Joanna Moubarak, Eric Filiol
, Maroun Chamoun:
Comparative analysis of blockchain technologies and TOR network: Two faces of the same reality? 1-9 - Sofiane Lagraa, Jérôme François, Abdelkader Lahmadi, Marine Miner, Christian A. Hammerschmidt, Radu State:
BotGM: Unsupervised graph mining to detect botnets in traffic flows. 1-8 - Nikola Bozic, Guy Pujolle, Stefano Secci:
Securing virtual machine orchestration with blockchains. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.