Search dblp for Publications

export results for "toc:db/conf/securecomm/securecomm2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/securecomm/0002XWSZ15,
  author       = {Yongzheng Zhang and
                  Tao Xu and
                  Yipeng Wang and
                  Jianliang Sun and
                  Xiaoyu Zhang},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {A Markov Random Field Approach to Automated Protocol Signature Inference},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {459--476},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_25},
  doi          = {10.1007/978-3-319-28865-9\_25},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/0002XWSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AburummanS0KC15,
  author       = {Ala' F. A. Aburumman and
                  Wei Jye Seo and
                  Md. Rafiqul Islam and
                  Muhammad Khurram Khan and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {A Secure Cross-Domain {SIP} Solution for Mobile Ad Hoc Network Using
                  Dynamic Clustering},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {649--664},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_43},
  doi          = {10.1007/978-3-319-28865-9\_43},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/AburummanS0KC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AlimomeniS15,
  author       = {Mohsen Alimomeni and
                  Reihaneh Safavi{-}Naini},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {How to Prevent to Delegate Authentication},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {477--499},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_26},
  doi          = {10.1007/978-3-319-28865-9\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/AlimomeniS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/Atamli-ReinehM15,
  author       = {Ahmad Atamli{-}Reineh and
                  Andrew P. Martin},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Securing Application with Software Partitioning: {A} Case Study Using
                  {SGX}},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {605--621},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_40},
  doi          = {10.1007/978-3-319-28865-9\_40},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/Atamli-ReinehM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/BaeJNS15,
  author       = {Chanwoo Bae and
                  Jesung Jung and
                  Jaehyun Nam and
                  Seungwon Shin},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {{POSTER:} {A} Collaborative Approach on Behavior-Based Android Malware
                  Detection},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {594--597},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_38},
  doi          = {10.1007/978-3-319-28865-9\_38},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/BaeJNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/BertrandBBR15,
  author       = {Yoann Bertrand and
                  Mireille Blay{-}Fornarino and
                  Karima Boudaoud and
                  Michel Riveill},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Generation of Transmission Control Rules Compliant with Existing Access
                  Control Policies},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {438--455},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_24},
  doi          = {10.1007/978-3-319-28865-9\_24},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/BertrandBBR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/CaoLYTZ15,
  author       = {Kai Cao and
                  Yunchun Li and
                  Hailong Yang and
                  Jiqiang Tang and
                  Xiaoxiang Zou},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {{POSTER:} An Online Prefix-Preserving {IP} Address Anonymization Algorithm
                  for Passive Measurement Systems},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {581--584},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_35},
  doi          = {10.1007/978-3-319-28865-9\_35},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/CaoLYTZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ChengLYDS15,
  author       = {Yueqiang Cheng and
                  Qing Li and
                  Miao Yu and
                  Xuhua Ding and
                  Qingni Shen},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {SuperCall: {A} Secure Interface for Isolated Execution Environment
                  to Dynamically Use External Services},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {193--211},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_11},
  doi          = {10.1007/978-3-319-28865-9\_11},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/ChengLYDS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ChowdhuryGC15,
  author       = {Mozammel Chowdhury and
                  Junbin Gao and
                  Morshed U. Chowdhury},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Image Spam Classification Using Neural Network},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {622--632},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_41},
  doi          = {10.1007/978-3-319-28865-9\_41},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ChowdhuryGC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ChowdhuryGI15,
  author       = {Mozammel Chowdhury and
                  Junbin Gao and
                  Rafiqul Islam},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Human Surveillance System for Security Application},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {711--724},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_47},
  doi          = {10.1007/978-3-319-28865-9\_47},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ChowdhuryGI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/CorderoVMF15,
  author       = {Carlos Garcia Cordero and
                  Emmanouil Vasilomanolakis and
                  Max M{\"{u}}hlh{\"{a}}user and
                  Mathias Fischer},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Community-Based Collaborative Intrusion Detection},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {665--681},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_44},
  doi          = {10.1007/978-3-319-28865-9\_44},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/CorderoVMF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/CrassJK15,
  author       = {Stefan Cra{\ss} and
                  Gerson Joskowicz and
                  Eva K{\"{u}}hn},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {A Decentralized Access Control Model for Dynamic Collaboration of
                  Autonomous Peers},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {519--537},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_28},
  doi          = {10.1007/978-3-319-28865-9\_28},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/CrassJK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/DashPG15,
  author       = {Priyabrat Dash and
                  Chris Perkins and
                  Ryan M. Gerdes},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Remote Activation of Hardware Trojans via a Covert Temperature Channel},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {294--310},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_16},
  doi          = {10.1007/978-3-319-28865-9\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/DashPG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/DingHZZ15,
  author       = {Xuejie Ding and
                  Wei{-}qing Huang and
                  Meng Zhang and
                  Jianlin Zhao},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {{POSTER:} {A} Security Adaptive Steganography System Applied on Digital
                  Audio},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {567--571},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_32},
  doi          = {10.1007/978-3-319-28865-9\_32},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/DingHZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/EbertMR015,
  author       = {Andr{\'{e}} Ebert and
                  Chadly Marouane and
                  Benno Rott and
                  Martin Werner},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {KeyPocket - Improving Security and Usability for Provider Independent
                  Login Architectures with Mobile Devices},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {41--57},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_3},
  doi          = {10.1007/978-3-319-28865-9\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/EbertMR015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/EmaraWS15,
  author       = {Karim Emara and
                  Wolfgang Woerndl and
                  Johann H. Schlichter},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {{POSTER:} Context-Adaptive User-Centric Privacy Scheme for {VANET}},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {590--593},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_37},
  doi          = {10.1007/978-3-319-28865-9\_37},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/EmaraWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/FangWSYW15,
  author       = {Yuejian Fang and
                  Zilong Wen and
                  Qingni Shen and
                  Yahui Yang and
                  Zhonghai Wu},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {{POSTER:} Ciphertext-Policy Attribute-Based Encryption Method with
                  Secure Decryption Key Generation and Outsourcing Decryption of {ABE}
                  Ciphertexts},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {585--589},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_36},
  doi          = {10.1007/978-3-319-28865-9\_36},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/FangWSYW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/FordS15,
  author       = {Vitaly Ford and
                  Ambareen Siraj},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {{POSTER:} Reliable and Efficient Protection of Consumer Privacy in
                  Advanced Metering Infrastructure},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {563--566},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_31},
  doi          = {10.1007/978-3-319-28865-9\_31},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/FordS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/GasconWYAR15,
  author       = {Hugo Gascon and
                  Christian Wressnegger and
                  Fabian Yamaguchi and
                  Daniel Arp and
                  Konrad Rieck},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {330--347},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_18},
  doi          = {10.1007/978-3-319-28865-9\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/GasconWYAR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/GengYLL15,
  author       = {Jinkun Geng and
                  Daren Ye and
                  Ping Luo and
                  Pin Lv},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {A Novel Clustering Algorithm for Database Anomaly Detection},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {682--696},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_45},
  doi          = {10.1007/978-3-319-28865-9\_45},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/GengYLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/GranadilloGD15,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Using a 3D Geometrical Model to Improve Accuracy in the Evaluation
                  and Selection of Countermeasures Against Complex Cyber Attacks},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {538--555},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_29},
  doi          = {10.1007/978-3-319-28865-9\_29},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/GranadilloGD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/HuCTYAS15,
  author       = {Chunqiang Hu and
                  Xiuzhen Cheng and
                  Zhi Tian and
                  Jiguo Yu and
                  Kemal Akkaya and
                  Limin Sun},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {An Attribute-Based Signcryption Scheme to Secure Attribute-Defined
                  Multicast Communications},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {418--437},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_23},
  doi          = {10.1007/978-3-319-28865-9\_23},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/HuCTYAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/KhanI15,
  author       = {M. Arif Khan and
                  Rafiqul Islam},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Secrecy Rate Based User Selection Algorithms for Massive {MIMO} Wireless
                  Networks},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {697--710},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_46},
  doi          = {10.1007/978-3-319-28865-9\_46},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/KhanI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/KimZ15,
  author       = {Dae Wook Kim and
                  Junjie Zhang},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {You Are How You Query: Deriving Behavioral Fingerprints from {DNS}
                  Traffic},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {348--366},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_19},
  doi          = {10.1007/978-3-319-28865-9\_19},
  timestamp    = {Fri, 17 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/KimZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LiDWL15,
  author       = {Song Li and
                  Hai{-}Xin Duan and
                  Zhiliang Wang and
                  Xing Li},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Route Leaks Identification by Detecting Routing Loops},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {313--329},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_17},
  doi          = {10.1007/978-3-319-28865-9\_17},
  timestamp    = {Thu, 25 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/LiDWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LiSSPM15,
  author       = {Yongfeng Li and
                  Tong Shen and
                  Xin Sun and
                  Xuerui Pan and
                  Bing Mao},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Detection, Classification and Characterization of Android Malware
                  Using {API} Data Dependency},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {23--40},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_2},
  doi          = {10.1007/978-3-319-28865-9\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/LiSSPM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LiYLV15,
  author       = {Yongbo Li and
                  Fan Yao and
                  Tian Lan and
                  Guru Venkataramani},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {{POSTER:} Semantics-Aware Rule Recommendation and Enforcement for
                  Event Paths},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {572--576},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_33},
  doi          = {10.1007/978-3-319-28865-9\_33},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/LiYLV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LiuLV15,
  author       = {Hong Liu and
                  Hongmin Li and
                  Eugene Y. Vasserman},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Practicality of Using Side-Channel Analysis for Software Integrity
                  Checking of Embedded Systems},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {277--293},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_15},
  doi          = {10.1007/978-3-319-28865-9\_15},
  timestamp    = {Fri, 15 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/LiuLV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/RabbiM15,
  author       = {Khandakar Rabbi and
                  Quazi Mamun},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {An Effective t-way Test Data Generation Strategy},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {633--648},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_42},
  doi          = {10.1007/978-3-319-28865-9\_42},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/RabbiM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/RastogiQMCC15,
  author       = {Vaibhav Rastogi and
                  Zhengyang Qu and
                  Jedidiah McClurg and
                  Yinzhi Cao and
                  Yan Chen},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Uranine: Real-time Privacy Leakage Monitoring without System Modification
                  for Android},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {256--276},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_14},
  doi          = {10.1007/978-3-319-28865-9\_14},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/RastogiQMCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/RayABG15,
  author       = {Apala Ray and
                  Johan {\AA}kerberg and
                  Mats Bj{\"{o}}rkman and
                  Mikael Gidlund},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {{POSTER:} An Approach to Assess Security, Capacity and Reachability
                  for Heterogeneous Industrial Networks},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {577--580},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_34},
  doi          = {10.1007/978-3-319-28865-9\_34},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/RayABG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/RodriguezP15,
  author       = {Juan D. Parra Rodriguez and
                  Joachim Posegga},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Why Web Servers Should Fear Their Clients - Abusing Websockets in
                  Browsers for DoS},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {401--417},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_22},
  doi          = {10.1007/978-3-319-28865-9\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/RodriguezP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/SinghAAMK15,
  author       = {Indrajeet Singh and
                  Masoud Akhoondi and
                  Mustafa Y. Arslan and
                  Harsha V. Madhyastha and
                  Srikanth V. Krishnamurthy},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Resource Efficient Privacy Preservation of Online Social Media Conversations},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {233--255},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_13},
  doi          = {10.1007/978-3-319-28865-9\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/SinghAAMK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/StecklinaLVKL15,
  author       = {Oliver Stecklina and
                  Peter Langend{\"{o}}rfer and
                  Frank Vater and
                  Thorsten Kranz and
                  Gregor Leander},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Intrinsic Code Attestation by Instruction Chaining for Embedded Devices},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {97--115},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_6},
  doi          = {10.1007/978-3-319-28865-9\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/StecklinaLVKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/SunWSC15,
  author       = {Hao Sun and
                  Xiaofeng Wang and
                  Jinshu Su and
                  Peixin Chen},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {RScam: Cloud-Based Anti-Malware via Reversible Sketch},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {157--174},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_9},
  doi          = {10.1007/978-3-319-28865-9\_9},
  timestamp    = {Wed, 14 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/SunWSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/SunZWOHA15,
  author       = {Degang Sun and
                  Xinping Zhou and
                  Zhu Wang and
                  Changhai Ou and
                  Wei{-}qing Huang and
                  Juan Ai},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {{POSTER:} Using Improved Singular Value Decomposition to Enhance Correlation
                  Power Analysis},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {598--601},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_39},
  doi          = {10.1007/978-3-319-28865-9\_39},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/SunZWOHA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/TianLHXF15,
  author       = {Dongdong Tian and
                  Xiaohong Li and
                  Jing Hu and
                  Guangquan Xu and
                  Zhiyong Feng},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {{POSTER:} API-Level Multi-policy Access Control Enforcement for Android
                  Middleware},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {559--562},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_30},
  doi          = {10.1007/978-3-319-28865-9\_30},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/TianLHXF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/TianWYLSLZYW15,
  author       = {Geng Tian and
                  Zhiliang Wang and
                  Xia Yin and
                  Zimu Li and
                  Xingang Shi and
                  Ziyi Lu and
                  Chao Zhou and
                  Yang Yu and
                  Dan Wu},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {{TADOOP:} Mining Network Traffic Anomalies with Hadoop},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {175--192},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_10},
  doi          = {10.1007/978-3-319-28865-9\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/TianWYLSLZYW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/TownsendA15,
  author       = {Ben Townsend and
                  Jemal H. Abawajy},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Security Considerations for Wireless Carrier Agonistic Bio-Monitoring
                  Systems},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {725--737},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_48},
  doi          = {10.1007/978-3-319-28865-9\_48},
  timestamp    = {Mon, 28 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/TownsendA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/WebsterGEPC15,
  author       = {Ashton Webster and
                  Margaret Gratian and
                  Ryan Eckenrod and
                  Daven Patel and
                  Michel Cukier},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {An Improved Method for Anomaly-Based Network Scan Detection},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {385--400},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_21},
  doi          = {10.1007/978-3-319-28865-9\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/WebsterGEPC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/XiaoHW15,
  author       = {Jidong Xiao and
                  Hai Huang and
                  Haining Wang},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Defeating Kernel Driver Purifier},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {116--134},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_7},
  doi          = {10.1007/978-3-319-28865-9\_7},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/XiaoHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/XiaoHW15a,
  author       = {Jidong Xiao and
                  Hai Huang and
                  Haining Wang},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Kernel Data Attack Is a Realistic Security Threat},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {135--154},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_8},
  doi          = {10.1007/978-3-319-28865-9\_8},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/XiaoHW15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/XiaoLZYG15,
  author       = {Xiaojun Xiao and
                  Yaping Lin and
                  Wei Zhang and
                  Xin Yao and
                  Qi Gu},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Authenticating Top-k Results of Secure Multi-keyword Search in Cloud
                  Computing},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {212--229},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_12},
  doi          = {10.1007/978-3-319-28865-9\_12},
  timestamp    = {Tue, 19 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/XiaoLZYG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/YanGC15,
  author       = {Lin Yan and
                  Yao Guo and
                  Xiangqun Chen},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {SplitDroid: Isolated Execution of Sensitive Components for Mobile
                  Applications},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {78--96},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_5},
  doi          = {10.1007/978-3-319-28865-9\_5},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/YanGC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/YangL15,
  author       = {Lei Yang and
                  Fengjun Li},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Enhancing Traffic Analysis Resistance for Tor Hidden Services with
                  Multipath Routing},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {367--384},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_20},
  doi          = {10.1007/978-3-319-28865-9\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/YangL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/YangYGYTG15,
  author       = {Chao Yang and
                  Guangliang Yang and
                  Ashish Gehani and
                  Vinod Yegneswaran and
                  Dawood Tariq and
                  Guofei Gu},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {58--77},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_4},
  doi          = {10.1007/978-3-319-28865-9\_4},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/YangYGYTG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZhangJLWSFW15,
  author       = {Xing Zhang and
                  Cancan Jin and
                  Cong Li and
                  Zilong Wen and
                  Qingni Shen and
                  Yuejian Fang and
                  Zhonghai Wu},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Ciphertext-Policy Attribute-Based Encryption with User and Authority
                  Accountability},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {500--518},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_27},
  doi          = {10.1007/978-3-319-28865-9\_27},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZhangJLWSFW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZhangYGC15,
  author       = {Yuan Zhang and
                  Min Yang and
                  Guofei Gu and
                  Hao Chen},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {FineDroid: Enforcing Permissions with System-Wide Application Execution
                  Context},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_1},
  doi          = {10.1007/978-3-319-28865-9\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZhangYGC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2015,
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9},
  doi          = {10.1007/978-3-319-28865-9},
  isbn         = {978-3-319-28864-2},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics