Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/iccns/iccns2017.bht:"
@inproceedings{DBLP:conf/iccns/BayouECC17, author = {Lyes Bayou and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {wirelessOrBAC: Towards an access-control-based {IDS} for Wireless Sensor Networks}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {96--103}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163077}, doi = {10.1145/3163058.3163077}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/BayouECC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChaiphetNAJGG17, author = {Chiraphat Chaiphet and Sudsanguan Ngamsuriyaroj and Ahmed Awad and Betran Jacob and Ioannis Gakos and Wiktor Grajkowski}, title = {Secure Enclave for {TLS} Web Server on Untrusted Environment}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {27--31}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163063}, doi = {10.1145/3163058.3163063}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ChaiphetNAJGG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChenJHCC17, author = {Sheng{-}Yu Chen and Tzung{-}Han Jeng and Chuan{-}Chiang Huang and Chien{-}Chih Chen and Kuo{-}Sen Chou}, title = {Doctrina: Annotated Bipartite Graph Mining for Malware-Control Domain Detection}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {67--75}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163061}, doi = {10.1145/3163058.3163061}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ChenJHCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/GuptaS17, author = {Ishu Gupta and Ashutosh Kumar Singh}, title = {A Probability based Model for Data Leakage Detection using Bigraph}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {1--5}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163060}, doi = {10.1145/3163058.3163060}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/GuptaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/IsmantoS17, author = {Romi Nur Ismanto and Muhammad Salman}, title = {Improving Security Level through Obfuscation Technique for Source Code Protection using {AES} Algorithm}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {18--22}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163071}, doi = {10.1145/3163058.3163071}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/IsmantoS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/JeonHN17, author = {Boosun Jeon and Young{-}Jun Heo and Jung{-}Chan Na}, title = {A Retransmission Method for Improving Transmission Reliability in One-way Transmission}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {109--113}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163075}, doi = {10.1145/3163058.3163075}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/JeonHN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/KhanFO17, author = {Muhammad Imran Khan and Simon N. Foley and Barry O'Sullivan}, title = {On database intrusion detection: {A} Query analytics-based model of normative behavior to detect insider attacks}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {12--17}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163068}, doi = {10.1145/3163058.3163068}, timestamp = {Tue, 19 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/KhanFO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/KimS17, author = {JaeHyu Kim and JooSeok Song}, title = {A Simple and Efficient Replay Attack Prevention Scheme for LoRaWAN}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {32--36}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163064}, doi = {10.1145/3163058.3163064}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/KimS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LashkariDKMG17, author = {Arash Habibi Lashkari and Gerard Draper{-}Gil and Jonathan Edward Keenan and Kenneth Fon Mbah and Ali A. Ghorbani}, title = {A Survey Leading to a New Evaluation Framework for Network-based Botnet Detection}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {59--66}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163059}, doi = {10.1145/3163058.3163059}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LashkariDKMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiGW17, author = {Huan Li and Chen Guo and Donglin Wang}, title = {Hybrid Sorting Method for Successive Cancellation List Decoding of Polar Codes}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {23--26}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163079}, doi = {10.1145/3163058.3163079}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/LiGW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/MandalMM17, author = {Susmita Mandal and Sujata Mohanty and Banshidhar Majhi}, title = {An ID-based Non-Interactive Deniable Authentication Protocol based on {ECC}}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {48--52}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163070}, doi = {10.1145/3163058.3163070}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/MandalMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/MoesriamiBarmawi17, author = {Ari Moesriami Barmawi and Dani Arumanegara}, title = {Strengthening Dynamic Identity Based Remote User Authentication Scheme Using Smart Card against Offline Password Guessing Attack}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {53--58}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163072}, doi = {10.1145/3163058.3163072}, timestamp = {Fri, 18 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/MoesriamiBarmawi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/RanaCADY17, author = {Khurram Gulzar Rana and Yongquan Cai and Muhammad Azeem and Allah Ditta and Haiyang Yu}, title = {Detection of Malicious Node in Wireless Ad Hoc Network by Using Acknowledgement Based Approach}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {76--80}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163062}, doi = {10.1145/3163058.3163062}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/RanaCADY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/SahooMM17, author = {Shreeya Swagatika Sahoo and Sujata Mohanty and Banshidhar Majhi}, title = {A Light Weight Three Factor based Authentication Scheme for Multi-server Environment using Smart Cards}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {43--47}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163069}, doi = {10.1145/3163058.3163069}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/SahooMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ShenCX17, author = {Congqi Shen and Huifang Chen and Lei Xie}, title = {Distributed Target Tracking under Byzantine Data Attacks}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {114--119}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163078}, doi = {10.1145/3163058.3163078}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ShenCX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangLC17, author = {Ching{-}Nung Yang and Jian{-}Ming Li and Yung{-}Shun Chou}, title = {On the Analysis of k-Secure t-Conference Key Distribution Scheme}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {91--95}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163076}, doi = {10.1145/3163058.3163076}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/YangLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangT17, author = {Wanxia Yang and Shanyu Tang}, title = {Steganalysis of {LSB} Speech with Low Embedding Rates based on Joint Probability}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {6--11}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163067}, doi = {10.1145/3163058.3163067}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/YangT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangZG17, author = {Xueqin Zhang and Li Zhang and Chunhua Gu}, title = {Security Risk Estimation of Social Network Privacy Issue}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {81--85}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163073}, doi = {10.1145/3163058.3163073}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ZhangZG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangZG17a, author = {Xueqin Zhang and Qianru Zhou and Chunhua Gu}, title = {Published Weighted Social Networks Privacy Preservation Based on Community Division}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {86--90}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163074}, doi = {10.1145/3163058.3163074}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ZhangZG17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhengD17, author = {Gengzhong Zheng and Xiaoqing Dong}, title = {Node Importance Evaluation in Wireless Sensor Networks based on Topology Contribution and Energy Efficiency}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {104--108}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163065}, doi = {10.1145/3163058.3163065}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ZhengD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhouT17, author = {Binhe Zhou and Bin Tian}, title = {Analysis and Research on Combinatorial Attack of Android Platform Applications}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {37--42}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163066}, doi = {10.1145/3163058.3163066}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ZhouT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccns/2017, title = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, publisher = {{ACM}}, year = {2017}, url = {http://dl.acm.org/citation.cfm?id=3163058}, isbn = {978-1-4503-5349-6}, timestamp = {Sun, 21 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.