


default search action
DSC 2017: Taipei, Taiwan
- IEEE Conference on Dependable and Secure Computing, DSC 2017, Taipei, Taiwan, August 7-10, 2017. IEEE 2017, ISBN 978-1-5090-5569-2

- Jung-Chin Lai, Frank Hsiao:

The calibration of gain error for time amplifier embedded in time-to-digital converter. 1-4 - Siang-Min Siao, Ming-Hwa Sheu, Shao-Yu Wang:

High-performance reverse converter design for the new four-moduli Set {22n, 2n+1, 2n/2+1, 2n/2-1}. 1-2 - Ravi S. Sandhu:

Keynote talk #1: Attribute-based access control: Insights and challenges. 34 - Michael Montoya:

Keynote Talk #2: Increase your security effectiveness by automating and machine learning. 35 - Xingjie Yu, Michael Thang Shiwen, Yingjiu Li, Robert Huijie Deng

:
Fair deposits against double-spending for Bitcoin transactions. 44-51 - Ming-Hung Shih, J. Morris Chang:

Design and analysis of high performance crypt-NoSQL. 52-59 - Balamurugan Anandan, Chris Clifton:

Secure minimum weighted bipartite matching. 60-67 - D. J. Guan, Er-Shuo Zhuang, Yu-Shen Lin, I. C. Chung:

Detecting invalid digital signatures in batches. 68-72 - Chang-Han Wu, Ti-Jui Chen, Terng-Yin Hsu, Shang-Ho Tsai, Hsung-Pin Chang

:
Design of applying FlexRay-bus to federated archiectecture for triple redundant reliable UAV flight control system. 73-78 - Michael Braly, Aaron Stillmaker, Bevan M. Baas:

A configurable H.265-compatible motion estimation accelerator architecture for realtime 4K video encoding in 65 nm CMOS. 79-85 - Wout Swinkels, Luc Claesen, Feng Xiao, Haibin Shen:

SVM point-based real-time emotion detection. 86-92 - Jia-Hao Wu, Wei-Liang Ou, Chih-Peng Fan

:
NIR-based gaze tracking with fast pupil ellipse fitting for real-time wearable eye trackers. 93-97 - Zhenghao Hu, Yuanyuan Zhang, Hui Wang, Juanru Li, Wenbo Yang, Dawu Gu:

MIRAGE: Randomizing large chunk allocation via dynamic binary instrumentation. 98-106 - Yacine Hebbal, Sylvie Laniepce, Jean-Marc Menaud:

K-binID: Kernel binary code identification for Virtual Machine Introspection. 107-114 - Chia-Wei Wang, Shiuhpyng Shieh:

VMCloak: Toward a stealthy in-VM agent execution. 115-122 - Ruimin Sun, Xiaoyong Yuan

, Andrew Lee, Matt Bishop
, Donald E. Porter, Xiaolin Li, André Grégio
, Daniela Oliveira:
The dose makes the poison - Leveraging uncertainty for effective malware detection. 123-130 - SeokHwan Choi, Doo-Hee Hwang, Yoon-Ho Choi:

Wireless intrusion prevention system using dynamic random forest against wireless MAC spoofing attack. 131-137 - Yacine Hebbal, Sylvie Laniepce, Jean-Marc Menaud:

Hidden process detection using kernel functions instrumentation. 138-145 - Yu-Wei Lee, Nur A. Touba:

Computing with obfuscated data in arbitrary logic circuits via noise insertion and cancellation. 146-152 - Shahzad Muzaffar, Owais Talaat Waheed, Zeyar Aung

, Ibrahim Abe M. Elfadel
:
Single-clock-cycle, multilayer encryption algorithm for single-channel IoT communications. 153-158 - Tien-Hung Tseng, Shu-Sheng Wang, Jian-You Chen, Kai-Chiang Wu:

Workload-aware lifetime Trojan based on statistical aging manipulation. 159-165 - Shayan Taheri

, Jiann-Shiun Yuan:
Security analysis of computing systems from circuit-architectural perspective. 166-173 - Mohammed Saeed Alkatheiri

, Yu Zhuang, Mikhail Korobkov, Abdur Rashid Sangi:
An experimental study of the state-of-the-art PUFs implemented on FPGAs. 174-180 - Mohammed Saeed Alkatheiri

, Yu Zhuang:
Towards fast and accurate machine learning attacks of feed-forward arbiter PUFs. 181-187 - Jinlin Chen, Yi-Ren Chen, Shi-Chun Tsai, Yi-Bing Lin:

Implementing NFV system with OpenStack. 188-194 - Chih-Chieh Chen, Yi-Ren Chen, Wei-Chih Lu, Shi-Chun Tsai, Ming-Chuan Yang:

Detecting amplification attacks with Software Defined Networking. 195-201 - Joshua A. Alcorn, Scott Melton, C. Edward Chow:

SDN On-The-Go (OTG) physical testbed. 202-208 - Joshua A. Alcorn, Scott Melton, C. Edward Chow:

SDN data path confidence analysis. 209-216 - Perumalraja Rengaraju, V. Raja Ramanan, Chung-Horng Lung:

Detection and prevention of DoS attacks in Software-Defined Cloud networks. 217-223 - Chieh-Min Wang, Yu-Sung Wu, Hsing-Hsuan Chung:

FUSION: A unified application model for virtual mobile infrastructure. 224-231 - Shi-Feng Chen, Pao-Ann Hsiung

:
Landslide prediction with model switching. 232-236 - Junying Huang, Zhengyu Huang, KuanHung Chen:

Combining low-cost Inertial Measurement Unit (IMU) and deep learning algorithm for predicting vehicle attitude. 237-239 - Trong-Yen Lee, Chia-Wei Kuo, I-An Lin:

High performance CAN/FlexRay gateway design for in-vehicle network. 240-242 - Bidi Ying, Amiya Nayak

:
Location privacy-protection based on p-destination in mobile social networks: A game theory analysis. 243-250 - Jingzheng Wu, Mutian Yang, Tianyue Luo:

PACS: Pemission abuse checking system for android applictions based on review mining. 251-258 - Neil Wong Hon Chan, Shanchieh Jay Yang:

SCANNER: Sequence clustering of android resource accesses. 259-266 - Shin-Ming Cheng

, Yu-Jyun Wang, Ying-Cheng Chen:
Secure location tracking of femtocells in heterogeneous cellular networks. 267-272 - Ehab Ashary

, C. Edward Chow, Ashish Korpe, Donovan Thorpe:
R2D2: Right place, right path data delivery. 273-279 - Mohammad Al-Rubaie, Pei Yuan Wu

, J. Morris Chang, Sun-Yuan Kung:
Privacy-preserving PCA on horizontally-partitioned data. 280-287 - Rashmi Girmal, Arun K. Somani:

LowLEAC: Low Leakage Energy Architecture for Caches. 288-295 - Cheng-Hao Chang, I-Chang Huang, Mu-Fan Lin, Shiann-Rong Kuang:

Design and implementation of a low-cost guided image filter for underwater image enhancement. 296-299 - Chun-Hsiang Lai, Yu-Cheng Cheng, Tung-Chi Wu, Yen-Jen Chang:

Radix-4 adder design with refined carry. 300-304 - Tsung-Yen Tsai, Jiun-Lang Huang:

Source code transformation for software-based on-line error detection. 305-309 - Muhammad Naveed Aman, Kee Chaing Chua, Biplab Sikdar

:
Physically secure mutual authentication for IoT. 310-317 - Kaliappa Ravindran, Chin-Tser Huang:

Probabilistic treatment of service assurance in distributed information systems. 318-325 - Randy Garcia:

Federated identity hybrid cloud security considerations supporting first responders. 326-333 - Wan-Chi Chang, Pi-Chung Wang

:
A write-operation-adaptable replication system for multiplayer cloud gaming. 334-339 - Fatimah M. Alturkistani, Saad S. Alaboodi, Sarfraz Nawaz Brohi

:
An analytical model for reliability evaluation of cloud service provisioning systems. 340-347 - Daniel P. Richardson, Alan C. Lin, John M. Pecarina:

Hosting distributed databases on internet of things-scale devices. 352-357 - Abdelhamid Elgzil, C. Edward Chow, Amer Aljaedi, Naif Alamri:

Cyber anonymity based on software-defined networking and Onion Routing (SOR). 358-365 - Alamsyah

, Agus Bejo, Teguh Bharata Adji:
AES S-box construction using different irreducible polynomial and constant 8-bit vector. 366-369 - Abir M'zah, Bruno Monsuez, Hycham Aboutaleb:

Deterministic microcode machine generation. 370-376 - Anastasia-Maria Leventi-Peetz, J.-V. Peetz:

Generating and exploring S-box multivariate quadratic equation systems with SageMath. 377-383 - Nils gentschen Felde, Tobias Guggemos, Tobias Heider, Dieter Kranzlmüller:

Secure group key distribution in constrained environments with IKEv2. 384-391 - James T. Yu:

A practical and effective approach to implementing High Availability Seamless Redundancy (HSR). 392-399 - Paul Laird, Sarah Jane Delany

, Pierpaolo Dondio:
Multiparty computations in varying contexts. 400-407 - Chao-Chun Yeh, Han-Lin Lu, Yi-Hsuan Lee, Wei-Sheng Chou, Shih-Kun Huang:

CRAXTriage: A coverage based triage system. 408-415 - Keisuke Kato, Vitaly Klyuev:

Development of a network intrusion detection system using Apache Hadoop and Spark. 416-423 - Bin Yan, Lin You:

A novel public key encryption model based on transformed biometrics. 424-428 - Ka-Cheng Choi

, Chi-Man Pun
:
Adaptive image encryption for high capacity reversible data hiding. 429-432 - Wei Tim Liew, Kuo-Yu Tsai, Jia-Ning Luo

, Ming-Hour Yang:
Novel designated ownership transfer with grouping proof. 433-440 - Di Zhuang, Sen Wang, J. Morris Chang:

FRiPAL: Face recognition in privacy abstraction layer. 441-448 - Yu-Chuan Huang, Chih-Wei Yi

, Wen-Chih Peng, Hsing-Chen Lin, Ching-Yu Huang:
A study on multiple wearable sensors for activity recognition. 449-452 - Youngbin Pyo, Choong In Lee, Heejo Lee:

Visual analysis of corrupted video data in video event data recorders. 453-458 - Amit Singh Gaur, Jyoti Budakoti, Chung-Horng Lung, Alan Redmond:

IoT-equipped UAV communications with seamless vertical handover. 459-465 - Kuohua Sung, Terng-Yin Hsu:

FPGA implementation of OFDM baseband processor. 466-467 - Chih-Ta Lin, Cheng-Yu Tsai, Chuan-Kai Kao:

Lower power data transport protection for Internet of Things (IoT). 468-470 - Yung-Ting Lee, Chunn-Yenn Lin, Ming-Jhou Wang:

A novel UL power control scheme for a digital cellular repeater. 471-472 - Jia-Jhun Lin, Kai-Ching Wang, Shin-Ming Cheng

, Yen-Chun Liu:
On exploiting SDN to facilitate IPv4/IPv6 coexistence and transition. 473-474 - Jian-Ya Chu, Yuan-Te Liao, Chun-Yi Hung, Terng-Yin Hsu:

Implementation of digital self-interference cancellation in LTE-based CCFD transmission. 475-476 - Juinn-Horng Deng, Pin-Nien Chen, Chia-Fang Lee, Yuan-Feng Chan, Yen-Chung Lin:

SDR measurement platform design for FMCW RADAR performance verification. 477-478 - Chih-Ning Lee, Yi-Ruei Chen, Wen-Guey Tzeng:

An online subject-based spam filter using natural language features. 479-487 - Yuan-Hsiang Su, Amir Rezapour, Wen-Guey Tzeng:

The forward-backward string: A new robust feature for botnet detection. 485-492 - Di Zhuang, J. Morris Chang:

PeerHunter: Detecting peer-to-peer botnets through community behavior analysis. 493-500 - Kaliappa Ravindran, Yassine Wardei, A. Kodia, Michael Iannelli, Arun Adiththan, Steven Drager:

Assessment of QoS adaptation and cyber-defense mechanisms in networked systems. 501-508 - Tzu-Hsien Chuang, Shin-Ying Huang, Ching-Hao Mao, Albert B. Jeng, Hahn-Ming Lee:

Ziffersystem: A novel malware distribution detection system. 509-515 - Jian Mao, Zheng Leong Chua, Zhenkai Liang

:
Enabling practical experimentation in cyber-security training. 516-517 - Chin-Wei Tien, Jian-Wei Liao, Shun-Chieh Chang, Sy-Yen Kuo

:
Memory forensics using virtual machine introspection for Malware analysis. 518-519 - Jun Gu, Tzonelih Hwang:

Comment on 'improving the security of protocols of quantum key agreement solely using bell states and bell measurement'. 520-521 - Cheng-Yu Tsai, Chuan-Kai Kao, Chuan-Yuan Huang, Zhi-Wei Lin:

Resisting attacks from rogue HeNB. 522-523 - Chih-Ta Lin, Sung-Lin Wu, Mei-Lin Lee:

Cyber attack and defense on industry control systems. 524-526 - Chong Kuan Chen, Shen-Chieh Lan, Shiuhpyng Winston Shieh:

Shellcode detector for malicious document hunting. 527-528 - Jhen-Li Wang, Yen-Chung Chen:

An SDN-based defensive solution against DHCP attacks in the virtualization environment. 529-530 - Shan-Jung Fu, Huai-Wen Hsu, Yi-Chih Kao, Shi-Chun Tsai, Chien-Chao Tseng

:
An autoblocking mechanism for firewall service. 531-532 - Bo Liu

, Chi-Man Pun
:
Multi-object splicing forgery detection using noise level difference. 533-534 - Xinyin Zhang, Yuanye Cao, Mutian Yang, Jingzheng Wu, Tianyue Luo, Yueqin Liu:

Droidrevealer: Automatically detecting Mysterious Codes in Android applications. 535-536 - Dongkyu Lee

, Jeonghun Cho, Daejin Park:
Interactive simulation platform using processing-based visualization for safe collision-free autonomous driving development. 537-538 - Yu-Wei Cheng, Yin-Tsung Hwang:

Development of a high throughput image compression system for optical remote sensing. 539-540

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














