Search dblp for Publications

export results for "toc:db/conf/iccns/iccns2017.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iccns/BayouECC17,
  author       = {Lyes Bayou and
                  David Espes and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {wirelessOrBAC: Towards an access-control-based {IDS} for Wireless
                  Sensor Networks},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {96--103},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163077},
  doi          = {10.1145/3163058.3163077},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/BayouECC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChaiphetNAJGG17,
  author       = {Chiraphat Chaiphet and
                  Sudsanguan Ngamsuriyaroj and
                  Ahmed Awad and
                  Betran Jacob and
                  Ioannis Gakos and
                  Wiktor Grajkowski},
  title        = {Secure Enclave for {TLS} Web Server on Untrusted Environment},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {27--31},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163063},
  doi          = {10.1145/3163058.3163063},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ChaiphetNAJGG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChenJHCC17,
  author       = {Sheng{-}Yu Chen and
                  Tzung{-}Han Jeng and
                  Chuan{-}Chiang Huang and
                  Chien{-}Chih Chen and
                  Kuo{-}Sen Chou},
  title        = {Doctrina: Annotated Bipartite Graph Mining for Malware-Control Domain
                  Detection},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {67--75},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163061},
  doi          = {10.1145/3163058.3163061},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ChenJHCC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/GuptaS17,
  author       = {Ishu Gupta and
                  Ashutosh Kumar Singh},
  title        = {A Probability based Model for Data Leakage Detection using Bigraph},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {1--5},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163060},
  doi          = {10.1145/3163058.3163060},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/GuptaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/IsmantoS17,
  author       = {Romi Nur Ismanto and
                  Muhammad Salman},
  title        = {Improving Security Level through Obfuscation Technique for Source
                  Code Protection using {AES} Algorithm},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {18--22},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163071},
  doi          = {10.1145/3163058.3163071},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/IsmantoS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/JeonHN17,
  author       = {Boosun Jeon and
                  Young{-}Jun Heo and
                  Jung{-}Chan Na},
  title        = {A Retransmission Method for Improving Transmission Reliability in
                  One-way Transmission},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {109--113},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163075},
  doi          = {10.1145/3163058.3163075},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/JeonHN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/KhanFO17,
  author       = {Muhammad Imran Khan and
                  Simon N. Foley and
                  Barry O'Sullivan},
  title        = {On database intrusion detection: {A} Query analytics-based model of
                  normative behavior to detect insider attacks},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {12--17},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163068},
  doi          = {10.1145/3163058.3163068},
  timestamp    = {Tue, 19 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/KhanFO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/KimS17,
  author       = {JaeHyu Kim and
                  JooSeok Song},
  title        = {A Simple and Efficient Replay Attack Prevention Scheme for LoRaWAN},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {32--36},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163064},
  doi          = {10.1145/3163058.3163064},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/KimS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LashkariDKMG17,
  author       = {Arash Habibi Lashkari and
                  Gerard Draper{-}Gil and
                  Jonathan Edward Keenan and
                  Kenneth Fon Mbah and
                  Ali A. Ghorbani},
  title        = {A Survey Leading to a New Evaluation Framework for Network-based Botnet
                  Detection},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {59--66},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163059},
  doi          = {10.1145/3163058.3163059},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LashkariDKMG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiGW17,
  author       = {Huan Li and
                  Chen Guo and
                  Donglin Wang},
  title        = {Hybrid Sorting Method for Successive Cancellation List Decoding of
                  Polar Codes},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {23--26},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163079},
  doi          = {10.1145/3163058.3163079},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/LiGW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/MandalMM17,
  author       = {Susmita Mandal and
                  Sujata Mohanty and
                  Banshidhar Majhi},
  title        = {An ID-based Non-Interactive Deniable Authentication Protocol based
                  on {ECC}},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {48--52},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163070},
  doi          = {10.1145/3163058.3163070},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/MandalMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/MoesriamiBarmawi17,
  author       = {Ari Moesriami Barmawi and
                  Dani Arumanegara},
  title        = {Strengthening Dynamic Identity Based Remote User Authentication Scheme
                  Using Smart Card against Offline Password Guessing Attack},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {53--58},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163072},
  doi          = {10.1145/3163058.3163072},
  timestamp    = {Fri, 18 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/MoesriamiBarmawi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/RanaCADY17,
  author       = {Khurram Gulzar Rana and
                  Yongquan Cai and
                  Muhammad Azeem and
                  Allah Ditta and
                  Haiyang Yu},
  title        = {Detection of Malicious Node in Wireless Ad Hoc Network by Using Acknowledgement
                  Based Approach},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {76--80},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163062},
  doi          = {10.1145/3163058.3163062},
  timestamp    = {Thu, 26 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/RanaCADY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/SahooMM17,
  author       = {Shreeya Swagatika Sahoo and
                  Sujata Mohanty and
                  Banshidhar Majhi},
  title        = {A Light Weight Three Factor based Authentication Scheme for Multi-server
                  Environment using Smart Cards},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {43--47},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163069},
  doi          = {10.1145/3163058.3163069},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/SahooMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ShenCX17,
  author       = {Congqi Shen and
                  Huifang Chen and
                  Lei Xie},
  title        = {Distributed Target Tracking under Byzantine Data Attacks},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {114--119},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163078},
  doi          = {10.1145/3163058.3163078},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ShenCX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangLC17,
  author       = {Ching{-}Nung Yang and
                  Jian{-}Ming Li and
                  Yung{-}Shun Chou},
  title        = {On the Analysis of k-Secure t-Conference Key Distribution Scheme},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {91--95},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163076},
  doi          = {10.1145/3163058.3163076},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/YangLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangT17,
  author       = {Wanxia Yang and
                  Shanyu Tang},
  title        = {Steganalysis of {LSB} Speech with Low Embedding Rates based on Joint
                  Probability},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {6--11},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163067},
  doi          = {10.1145/3163058.3163067},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/YangT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangZG17,
  author       = {Xueqin Zhang and
                  Li Zhang and
                  Chunhua Gu},
  title        = {Security Risk Estimation of Social Network Privacy Issue},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {81--85},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163073},
  doi          = {10.1145/3163058.3163073},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangZG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangZG17a,
  author       = {Xueqin Zhang and
                  Qianru Zhou and
                  Chunhua Gu},
  title        = {Published Weighted Social Networks Privacy Preservation Based on Community
                  Division},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {86--90},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163074},
  doi          = {10.1145/3163058.3163074},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangZG17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhengD17,
  author       = {Gengzhong Zheng and
                  Xiaoqing Dong},
  title        = {Node Importance Evaluation in Wireless Sensor Networks based on Topology
                  Contribution and Energy Efficiency},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {104--108},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163065},
  doi          = {10.1145/3163058.3163065},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhengD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhouT17,
  author       = {Binhe Zhou and
                  Bin Tian},
  title        = {Analysis and Research on Combinatorial Attack of Android Platform
                  Applications},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {37--42},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163066},
  doi          = {10.1145/3163058.3163066},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhouT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccns/2017,
  title        = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {http://dl.acm.org/citation.cfm?id=3163058},
  isbn         = {978-1-4503-5349-6},
  timestamp    = {Sun, 21 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics