default search action
Search dblp for Publications
export results for "stream:conf/cns:"
@inproceedings{DBLP:conf/cns/AbdeenAS23, author = {Basel Abdeen and Ehab Al{-}Shaer and Waseem G. Shadid}, title = {VeriActor: Dynamic Generation of Challenge-Response Questions for Enhanced Email Sender Verification}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10289040}, doi = {10.1109/CNS59707.2023.10289040}, timestamp = {Mon, 13 Nov 2023 09:18:17 +0100}, biburl = {https://dblp.org/rec/conf/cns/AbdeenAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AbubakerG23, author = {Radi Abubaker and Guang Gong}, title = {High-speed {OFDM} Physical-Layer Key Exchange}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288672}, doi = {10.1109/CNS59707.2023.10288672}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AbubakerG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlamiR23, author = {Hassan El Alami and Danda B. Rawat}, title = {Detection of Zero-Day Attacks using {CNN} and {LSTM} in Networked Autonomous Systems 'IEEE {CNS} 23 Poster'}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--2}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288680}, doi = {10.1109/CNS59707.2023.10288680}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AlamiR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BaiY23, author = {Ken Yihang Bai and Tuba Yavuz}, title = {{MMIO} Access-Based Coverage for Firmware Analysis}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10289061}, doi = {10.1109/CNS59707.2023.10289061}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/BaiY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BarutDL23, author = {Onur Barut and Lulin Deng and David Lu}, title = {Universal Network Traffic Analysis for Malicious Traffic Detection using RappNet: {A} Privacy-Preserving Approach : {IEEE} {CNS} 23 Poster}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--2}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10289115}, doi = {10.1109/CNS59707.2023.10289115}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/BarutDL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BegouVDK23, author = {Nils Begou and Jeremy Vinoy and Andrzej Duda and Maciej Korczynski}, title = {Exploring the Dark Side of {AI:} Advanced Phishing Attack Design and Deployment Using ChatGPT}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288940}, doi = {10.1109/CNS59707.2023.10288940}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/BegouVDK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChakrabortyRMHM23, author = {Trishna Chakraborty and Imranur Rahman and Hasan Murad and Md. Shohrab Hossain and Shagufta Mehnaz}, title = {SecureImgStego: {A} Keyed Shuffling-based Deep Learning Model for Secure Image Steganography}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288753}, doi = {10.1109/CNS59707.2023.10288753}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ChakrabortyRMHM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChakrabortyYZ23, author = {Nilesh Chakraborty and Youssef Yamout and Mohammad Zulkernine}, title = {The Tables Have Turned: {GPT-3} Distinguishing Passwords from Honeywords}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288643}, doi = {10.1109/CNS59707.2023.10288643}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ChakrabortyYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CorsiniY23, author = {Andrea Corsini and Shanchieh Jay Yang}, title = {Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288685}, doi = {10.1109/CNS59707.2023.10288685}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CorsiniY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CurranGPS23, author = {Noah T. Curran and Arun Ganesan and Mert D. Pes{\'{e}} and Kang G. Shin}, title = {Using Phone Sensors to Augment Vehicle Reliability}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10289103}, doi = {10.1109/CNS59707.2023.10289103}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/CurranGPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DenhamT23, author = {Byron Denham and Dale R. Thompson}, title = {Analysis of Decoy Strategies for Detecting Ransomware}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288691}, doi = {10.1109/CNS59707.2023.10288691}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/DenhamT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DoEC23, author = {Son Tung Do and Gabrielle Ebbrecht and Juntao Chen}, title = {Adversarial Manipulation of Learning in Linear-Quadratic Zero-Sum Differential Games via Cost Poisoning}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288942}, doi = {10.1109/CNS59707.2023.10288942}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/DoEC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DoughertyKHTT23, author = {Sean Dougherty and Abhinav Kumar and Jie Hou and Reza Tourani and Atena M. Tabakhi}, title = {A Stealthy Inference Attack on Split Learning with a Split-Fuse Defensive Measure}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288661}, doi = {10.1109/CNS59707.2023.10288661}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/DoughertyKHTT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DuttaACD23, author = {Ashutosh Dutta and Ehab Al{-}Shaer and Samrat Chatterjee and Qi Duan}, title = {Autonomous Cyber Defense Against Dynamic Multi-strategy Infrastructural DDoS Attacks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288937}, doi = {10.1109/CNS59707.2023.10288937}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/DuttaACD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/EarRFX23, author = {Ekzhin Ear and Jose L. C. Remy and Antonia Feffer and Shouhuai Xu}, title = {Characterizing Cyber Attacks against Space Systems with Missing Data: Framework and Case Study}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10289045}, doi = {10.1109/CNS59707.2023.10289045}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/EarRFX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ElmaghbubH23, author = {Abdurrahman Elmaghbub and Bechir Hamdaoui}, title = {A Needle in a Haystack: Distinguishable Deep Neural Network Features for Domain-Agnostic Device Fingerprinting}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288752}, doi = {10.1109/CNS59707.2023.10288752}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ElmaghbubH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FengLZJ23, author = {XiaMeng Feng and Xiaodong Li and SuYa Zhou and Xin Jin}, title = {Homomorphic Comparison Method Based on Dynamically Polynomial Composite Approximating Sign Function}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288803}, doi = {10.1109/CNS59707.2023.10288803}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/FengLZJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HalderGND23, author = {Subir Halder and Amrita Ghosal and Thomas Newe and Sajal K. Das}, title = {SmartLens: Robust Detection of Rogue Device via Frequency Domain Features in LoRa-Enabled IIoT}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288657}, doi = {10.1109/CNS59707.2023.10288657}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/HalderGND23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HassanSGMSK23, author = {Fahid Hassan and Zhambyl Shaikhanov and Hichem Guerboukha and Daniel M. Mittleman and Kaushik Sengupta and Edward W. Knightly}, title = {{RMDM:} Using Random Meta-Atoms to Send Directional Misinformation to Eavesdroppers}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288796}, doi = {10.1109/CNS59707.2023.10288796}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HassanSGMSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HouWZ23, author = {Jing Hou and Xuyu Wang and Amy Z. Zeng}, title = {Inter-Temporal Reward Decisions with Strategic Ethical Hackers}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288885}, doi = {10.1109/CNS59707.2023.10288885}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HouWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HuDCDZ23, author = {Yidan Hu and Yukun Dong and Wenxin Chen and Yingfei Dong and Rui Zhang}, title = {Authenticating Outsourced Location-Based Skyline Queries under Shortest Path Distance}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288754}, doi = {10.1109/CNS59707.2023.10288754}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/HuDCDZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HusakJ23, author = {Martin Hus{\'{a}}k and Michal Javorn{\'{\i}}k}, title = {Lightweight Impact Assessment and Projection of Lateral Movement and Malware Infection}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288665}, doi = {10.1109/CNS59707.2023.10288665}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/HusakJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/IntociSFPB23, author = {Francesco Intoci and Julian Sturm and Daniel Fraunholz and Apostolos Pyrgelis and Colin Barschel}, title = {{P3LI5:} Practical and confidEntial Lawful Interception on the 5G core}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288872}, doi = {10.1109/CNS59707.2023.10288872}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/IntociSFPB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/IqbalJ23, author = {Mehzabien Iqbal and Ahmad Y. Javaid}, title = {{IEEE} {CNS} 23 Poster: Cooperative Omnidirectional Beamformation for THz Band Phy-Security}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--2}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288805}, doi = {10.1109/CNS59707.2023.10288805}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/IqbalJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/IshtiaqAKAJH23, author = {Afifa Ishtiaq and Arash Asadi and Ladan Khaloopour and Waqar Ahmed and Vahid Jamali and Matthias Hollick}, title = {BeamSec: {A} Practical mmWave Physical Layer Security Scheme Against Strong Adversaries}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10289003}, doi = {10.1109/CNS59707.2023.10289003}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/IshtiaqAKAJH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JohnsonH23, author = {Benjamin Johnson and Bechir Hamdaoui}, title = {On the Domain Generalizability of {RF} Fingerprints Through Multifractal Dimension Representation}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10289056}, doi = {10.1109/CNS59707.2023.10289056}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/JohnsonH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KaranamARG23, author = {Venkat Sai Suman Lamba Karanam and Fahmida Afrin and Byrav Ramamurthy and Nirnimesh Ghose}, title = {Cross-layer Device Identification for Smart Grid Substation Networks : {IEEE} {CNS} 23 Poster}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--2}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288865}, doi = {10.1109/CNS59707.2023.10288865}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KaranamARG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KhalilR23, author = {Alvi Ataur Khalil and Mohammad Ashiqur Rahman}, title = {{SHIP:} Securing Hashed Timelock Contracts in Payment Channel Networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--2}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10289033}, doi = {10.1109/CNS59707.2023.10289033}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KhalilR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KhalilRK23, author = {Alvi Ataur Khalil and Mohammad Ashiqur Rahman and Hisham A. Kholidy}, title = {{FAKEY:} Fake Hashed Key Attack on Payment Channel Networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288911}, doi = {10.1109/CNS59707.2023.10288911}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KhalilRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KholoosiBY23, author = {M. Mehdi Kholoosi and Muhammad Ali Babar and Cemal Yilmaz}, title = {Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288690}, doi = {10.1109/CNS59707.2023.10288690}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KholoosiBY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KumarHOS23, author = {Shashwat Kumar and Francis Hahn and Xinming Ou and Anoop Singhal}, title = {Security Analysis of Trust on the Controller in the Matter Protocol Specification}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288747}, doi = {10.1109/CNS59707.2023.10288747}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KumarHOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiSFSZER23, author = {Jun Li and Devkishen Sisodia and Yebo Feng and Lumin Shi and Mingwei Zhang and Christopher Early and Peter L. Reiher}, title = {Toward Adaptive DDoS-Filtering Rule Generation}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288699}, doi = {10.1109/CNS59707.2023.10288699}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiSFSZER23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MartinB23, author = {Bryan Martin and Chad A. Bollmann}, title = {Self-similarity based network anomaly detection for industrial control systems}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288656}, doi = {10.1109/CNS59707.2023.10288656}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/MartinB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/McClanahanFLC23, author = {Kylie McClanahan and Jingyao Fan and Qinghua Li and Guohong Cao}, title = {Protecting Control Commands Using Low-Cost {EM} Sensors in the Smart Grid}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288961}, doi = {10.1109/CNS59707.2023.10288961}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/McClanahanFLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MensiR23, author = {Neji Mensi and Danda B. Rawat}, title = {Enhancing Security in NOMA-Based Networks: An Effective Deceptive Approach to Thwart Multiple Eavesdroppers}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288993}, doi = {10.1109/CNS59707.2023.10288993}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/MensiR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MughalHI23, author = {Umair Ahmad Mughal and Samuel Chase Hassler and Muhammad Ismail}, title = {Machine Learning-Based Intrusion Detection for Swarm of Unmanned Aerial Vehicles}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288962}, doi = {10.1109/CNS59707.2023.10288962}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MughalHI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MughalIR23, author = {Umair Ahmad Mughal and Muhammad Ismail and Syed Ali Asad Rizvi}, title = {Stealthy False Data Injection Attack on Unmanned Aerial Vehicles with Partial Knowledge}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10289001}, doi = {10.1109/CNS59707.2023.10289001}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MughalIR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MynuddinKMA23, author = {Mohammed Mynuddin and Sultan Uddin Khan and Mahmoud Nabil Mahmoud and Ahmad Alsharif}, title = {Adversarial Attacks on Deep Learning-Based {UAV} Navigation Systems}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10289004}, doi = {10.1109/CNS59707.2023.10289004}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/MynuddinKMA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/NafisCH23, author = {Akib Jawad Nafis and Omar Chowdhury and Md. Endadul Hoque}, title = {VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288667}, doi = {10.1109/CNS59707.2023.10288667}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/NafisCH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/OwusuRHXX23, author = {Evans Owusu and Mohamed Rahouti and D. Frank Hsu and Kaiqi Xiong and Yufeng Xin}, title = {Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion Analysis}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288981}, doi = {10.1109/CNS59707.2023.10288981}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/OwusuRHXX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PathakAH23, author = {Aditya Pathak and Irfan S. Al{-}Anbagi and Howard J. Hamilton}, title = {Early-stage Conflict Detection in HLF-based Delay-critical IoT Networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288697}, doi = {10.1109/CNS59707.2023.10288697}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/PathakAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RathoreG23, author = {Heena Rathore and Henry Griffith}, title = {Leveraging Neuro-Inspired Reinforcement Learning for Secure Reputation-based Communication in Connected Vehicles}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10289058}, doi = {10.1109/CNS59707.2023.10289058}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/RathoreG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SainiS23, author = {Shalini Saini and Nitesh Saxena}, title = {Speaker Anonymity and Voice Conversion Vulnerability: {A} Speaker Recognition Analysis}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10289030}, doi = {10.1109/CNS59707.2023.10289030}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SainiS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShehabyM23, author = {Mohamed el Shehaby and Ashraf Matrawy}, title = {The Impact of Dynamic Learning on Adversarial Attacks in Networks {(IEEE} {CNS} 23 Poster)}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--2}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288658}, doi = {10.1109/CNS59707.2023.10288658}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ShehabyM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShenHLLW23, author = {Dakun Shen and Tao Hou and Zhuo Lu and Yao Liu and Tao Wang}, title = {SecDINT: Preventing Data-oriented Attacks via Intel {SGX} Escorted Data Integrity}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10289062}, doi = {10.1109/CNS59707.2023.10289062}, timestamp = {Mon, 19 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ShenHLLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShiXTPLHWHLCXL23, author = {Jingwen Shi and Tian Xie and Guan{-}Hua Tu and Chunyi Peng and Chi{-}Yu Li and Andrew Z. Hou and Sihan Wang and Yiwen Hu and Xinyu Lei and Min{-}Yue Chen and Li Xiao and Xiaoming Liu}, title = {When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288900}, doi = {10.1109/CNS59707.2023.10288900}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ShiXTPLHWHLCXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SultanaTLM23, author = {Madeena Sultana and Adrian Taylor and Li Li and Suryadipta Majumdar}, title = {Towards Evaluation and Understanding of Large Language Models for Cyber Operation Automation}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288677}, doi = {10.1109/CNS59707.2023.10288677}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SultanaTLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TefekECM23, author = {Utku Tefek and Ertem Esiner and Carmen Cheh and Daisuke Mashima}, title = {A Smart Grid Ontology: Vulnerabilities, Attacks, and Security Policies}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10289085}, doi = {10.1109/CNS59707.2023.10289085}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TefekECM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WuF23, author = {Xingqi Wu and Junaid Farooq}, title = {Attack Resilient Wireless Backhaul Connectivity with Optimized Fronthaul Coverage in {UAV} Networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288893}, doi = {10.1109/CNS59707.2023.10288893}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/WuF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YeLS23, author = {Xiaokai Ye and Tao Lv and Xiaohan Sun}, title = {A Key Generation Scheme from Sensing Data for IoT Security : {IEEE} {CNS} 23 Poster}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--2}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288698}, doi = {10.1109/CNS59707.2023.10288698}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/YeLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangH23, author = {Zikai Zhang and Rui Hu}, title = {Byzantine-Robust Federated Learning with Variance Reduction and Differential Privacy}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288938}, doi = {10.1109/CNS59707.2023.10288938}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZhangH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangMAEM23, author = {Lu Zhang and Nabil Moukafih and Hamad Alamri and Gregory Epiphaniou and Carsten Maple}, title = {A BERT-based Empirical Study of Privacy Policies' Compliance with {GDPR}}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288797}, doi = {10.1109/CNS59707.2023.10288797}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZhangMAEM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangS23, author = {Qianqian Zhang and Chi{-}Jiun Su}, title = {Application-layer Characterization and Traffic Analysis for Encrypted {QUIC} Transport Protocol}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10289016}, doi = {10.1109/CNS59707.2023.10289016}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhangS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangXS23, author = {Kexin Zhang and Shengjie Xu and Bongsik Shin}, title = {Towards Adaptive Zero Trust Model for Secure {AI}}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--2}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288810}, doi = {10.1109/CNS59707.2023.10288810}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZhangXS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhaoSORXX23, author = {Shujun Zhao and Lesther Santana and Evans Owusu and Mohamed Rahouti and Kaiqi Xiong and Yufeng Xin}, title = {Enhancing ML-Based DoS Attack Detection with Feature Engineering : {IEEE} {CNS} 23 Poster}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--2}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288689}, doi = {10.1109/CNS59707.2023.10288689}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZhaoSORXX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cns/2023, title = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023}, doi = {10.1109/CNS59707.2023}, isbn = {979-8-3503-3945-1}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AkterS22, author = {Mst. Shapna Akter and Hossain Shahriar}, title = {Towards Unsupervised Learning based Denoising of Cyber Physical System Data to Mitigate Security Concerns}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.10044378}, doi = {10.1109/CNS56114.2022.10044378}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AkterS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlamHOK22, author = {Md Shah Alam and Sarkar Marshia Hossain and Jared Oluoch and Junghwan Kim}, title = {A Novel Secure Physical Layer Key Generation Method in Connected and Autonomous Vehicles (CAVs)}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947262}, doi = {10.1109/CNS56114.2022.9947262}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AlamHOK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AliASNLWC22, author = {Haider Ali and Mohannad Al Ameedi and Ananthram Swami and Rui Ning and Jiang Li and Hongyi Wu and Jin{-}Hee Cho}, title = {{ACADIA:} Efficient and Robust Adversarial Attacks Against Deep Reinforcement Learning}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947234}, doi = {10.1109/CNS56114.2022.9947234}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AliASNLWC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BecherSSS22, author = {Kilian Becher and Mirko Sch{\"{a}}fer and Axel Schr{\"{o}}pfer and Thorsten Strufe}, title = {Efficient Public Verification of Confidential Supply-Chain Transactions}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {308--316}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947231}, doi = {10.1109/CNS56114.2022.9947231}, timestamp = {Mon, 08 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BecherSSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BrantY22, author = {Christopher Brant and Tuba Yavuz}, title = {A Study on the Testing of Android Security Patches}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {217--225}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947240}, doi = {10.1109/CNS56114.2022.9947240}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/BrantY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BrownCV22, author = {Daniel Brown and Gabriele Cianfarani and Natalija Vlajic}, title = {Real World Snapshot of Trends in IoT Device and Protocol Deployment: {IEEE} {CNS} 22 Poster}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--2}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947257}, doi = {10.1109/CNS56114.2022.9947257}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/BrownCV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenGCG22, author = {Jiyu Chen and Yiwen Guo and Hao Chen and Neil Gong}, title = {Membership Inference Attack in Face of Data Transformations}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {299--307}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947254}, doi = {10.1109/CNS56114.2022.9947254}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChenGCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChungV22, author = {Jay Chung and Natalija Vlajic}, title = {Survey of Remote {TLS} Vulnerability Scanning Tools and Snapshot of {TLS} Use in Banking Sector}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--2}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947230}, doi = {10.1109/CNS56114.2022.9947230}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ChungV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CohenDYGSFKMM22, author = {Alejandro Cohen and Rafael G. L. D'Oliveira and Chia{-}Yi Yeh and Hichem Guerboukha and Rabi Shrestha and Zhaoji Fang and Edward W. Knightly and Muriel M{\'{e}}dard and Daniel M. Mittleman}, title = {Absolute Security in High-Frequency Wireless Links}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {46--54}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947269}, doi = {10.1109/CNS56114.2022.9947269}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/CohenDYGSFKMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FejrskovPV22, author = {Martin Fejrskov and Jens Myrup Pedersen and Emmanouil Vasilomanolakis}, title = {Detecting {DNS} hijacking by using NetFlow data}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {273--280}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947264}, doi = {10.1109/CNS56114.2022.9947264}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/FejrskovPV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GaskinHW22, author = {Jared Gaskin and Bechir Hamdaoui and Weng{-}Keen Wong}, title = {Tweak: Towards Portable Deep Learning Models for Domain-Agnostic LoRa Device Authentication}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.10227829}, doi = {10.1109/CNS56114.2022.10227829}, timestamp = {Sun, 03 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GaskinHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GeZ22, author = {Yunfei Ge and Quanyan Zhu}, title = {Trust Threshold Policy for Explainable and Adaptive Zero-Trust Defense in Enterprise Networks}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {359--364}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947263}, doi = {10.1109/CNS56114.2022.9947263}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/GeZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GeorgeS22, author = {Dominik Roy George and Savio Sciancalepore}, title = {{PRM} - Private Interference Discovery for {IEEE} 802.15 4 Networks}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {136--144}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947236}, doi = {10.1109/CNS56114.2022.9947236}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/GeorgeS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GowrisankarMOYE22, author = {Balachandar Gowrisankar and Daisuke Mashima and Wen Shei Ong and Quanqi Ye and Ertem Esiner and Binbin Chen and Zbigniew Kalbarczyk}, title = {GateKeeper: Operator-centric Trusted App Management Framework on {ARM} TrustZone}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {100--108}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947233}, doi = {10.1109/CNS56114.2022.9947233}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/GowrisankarMOYE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GuanCCZP22, author = {Chongqi Guan and Xianda Chen and Guohong Cao and Sencun Zhu and Thomas La Porta}, title = {HoneyCam: Scalable High-Interaction Honeypot for IoT Cameras Based on 360-Degree Video}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {82--90}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947265}, doi = {10.1109/CNS56114.2022.9947265}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/GuanCCZP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GuoHG22, author = {Yuanxiong Guo and Rui Hu and Yanmin Gong}, title = {Agent-Level Differentially Private Federated Learning via Compressed Model Perturbation}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {127--135}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947266}, doi = {10.1109/CNS56114.2022.9947266}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GuoHG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GuptaYK22, author = {Shreya Gupta and Chia{-}Yi Yeh and Edward W. Knightly}, title = {Stealthy Off-Target Coupled-Control-Plane Jamming}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {208--216}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947228}, doi = {10.1109/CNS56114.2022.9947228}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/GuptaYK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GvozdenovicBMS22, author = {Stefan Gvozdenovic and Johannes K. Becker and John Mikulskis and David Starobinski}, title = {Multi-Protocol IoT Network Reconnaissance}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {118--126}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947261}, doi = {10.1109/CNS56114.2022.9947261}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/GvozdenovicBMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HoqueRR22, author = {Naureen Hoque and Hanif Rahbari and Cullen Rezendes}, title = {Systematically Analyzing Vulnerabilities in the Connection Establishment Phase of Wi-Fi Systems}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {64--72}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947252}, doi = {10.1109/CNS56114.2022.9947252}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/HoqueRR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HouBWWLL22, author = {Tao Hou and Shengping Bi and Mingkui Wei and Tao Wang and Zhuo Lu and Yao Liu}, title = {When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {290--298}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947247}, doi = {10.1109/CNS56114.2022.9947247}, timestamp = {Mon, 19 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HouBWWLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HuWCLH22, author = {Yang Hu and Ning Wang and Yimin Chen and Wenjing Lou and Y. Thomas Hou}, title = {Transferability of Adversarial Examples in Machine Learning-based Malware Detection}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {28--36}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947226}, doi = {10.1109/CNS56114.2022.9947226}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/HuWCLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/IbrahimOP22, author = {Omar Adel Ibrahim and Gabriele Oligeri and Roberto Di Pietro}, title = {Eolo: IoT Proximity-based Authentication via Pressure Correlated Variations}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {109--117}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947258}, doi = {10.1109/CNS56114.2022.9947258}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/IbrahimOP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KimD22, author = {Yeongwoo Kim and Gy{\"{o}}rgy D{\'{a}}n}, title = {An Active Learning Approach to Dynamic Alert Prioritization for Real-time Situational Awareness}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {154--162}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947246}, doi = {10.1109/CNS56114.2022.9947246}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KimD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KleberK22, author = {Stephan Kleber and Frank Kargl}, title = {Refining Network Message Segmentation with Principal Component Analysis}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {281--289}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947242}, doi = {10.1109/CNS56114.2022.9947242}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KleberK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KumariASC22, author = {Ranju Kumari and Faheed A. F. Alenezi and Sejun Song and Baek{-}Young Choi}, title = {{ML-AWARE:} {A} Machine Learning Approach for Detecting Wormhole Attack Resonance}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.10092921}, doi = {10.1109/CNS56114.2022.10092921}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KumariASC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LeaoVMSPHBWB22, author = {Bruno P. Leao and Jagannadh Vempati and Ulrich M{\"{u}}nz and Shashank Shekhar and Amit Pandey and David Hingos and Siddharth Bhela and Jing Wang and Chris Bilby}, title = {Machine Learning-based False Data Injection Attack Detection and Localization in Power Grids}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947256}, doi = {10.1109/CNS56114.2022.9947256}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LeaoVMSPHBWB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LefebvreEN22, author = {Michael Lefebvre and Daniel W. Engels and Suku Nair}, title = {On {SDPN:} Integrating the Software-Defined Perimeter {(SDP)} and the Software-Defined Network {(SDN)} Paradigms}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {353--358}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947267}, doi = {10.1109/CNS56114.2022.9947267}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LefebvreEN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiGWGW22, author = {Haipeng Li and Kaustubh Gupta and Chenggang Wang and Nirnimesh Ghose and Boyang Wang}, title = {RadioNet: Robust Deep-Learning Based Radio Fingerprinting}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {190--198}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947255}, doi = {10.1109/CNS56114.2022.9947255}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiGWGW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiYCSC22, author = {Qi Li and Keyang Yu and Dong Chen and Mo Sha and Long Cheng}, title = {TrafficSpy: Disaggregating VPN-encrypted IoT Network Traffic for User Privacy Inference}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {145--153}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947251}, doi = {10.1109/CNS56114.2022.9947251}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiYCSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiuELEJ22, author = {Lisa Liu and Gints Engelen and Timothy M. Lynar and Daryl Essam and Wouter Joosen}, title = {Error Prevalence in {NIDS} datasets: {A} Case Study on {CIC-IDS-2017} and {CSE-CIC-IDS-2018}}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {254--262}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947235}, doi = {10.1109/CNS56114.2022.9947235}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiuELEJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiuSNW22, author = {Hao Liu and Wenhai Sun and Nan Niu and Boyang Wang}, title = {MultiEvasion: Evasion Attacks Against Multiple Malware Detectors}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {10--18}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947227}, doi = {10.1109/CNS56114.2022.9947227}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiuSNW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiuZ22, author = {Shutian Liu and Quanyan Zhu}, title = {On the Role of Risk Perceptions in Cyber Insurance Contracts}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {377--382}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947268}, doi = {10.1109/CNS56114.2022.9947268}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiuZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MensiRL22, author = {Neji Mensi and Danda B. Rawat and Chunmei Liu}, title = {Security Analysis of Mixed {RF-FSO} Blockage Attack Over Generalized {RF} Fading and Atmospheric Turbulence}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {344--352}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947271}, doi = {10.1109/CNS56114.2022.9947271}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/MensiRL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MiMW22, author = {Yu Mi and David Mohaisen and An Wang}, title = {AutoDefense: Reinforcement Learning Based Autoreactive Defense Against Network Attacks}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {163--171}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947232}, doi = {10.1109/CNS56114.2022.9947232}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/MiMW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Morin022, author = {Andrew Morin and Tyler Moore}, title = {Towards Cost-Balanced Intrusion Detection in {OT} Environments}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.10091442}, doi = {10.1109/CNS56114.2022.10091442}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Morin022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Morin022a, author = {Andrew Morin and Tyler Moore}, title = {Towards Cost-Balanced Intrusion Detection in {OT} Environments}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.10092920}, doi = {10.1109/CNS56114.2022.10092920}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Morin022a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/NiknamiW22, author = {Nadia Niknami and Jie Wu}, title = {Enhancing Load Balancing by Intrusion Detection System Chain on {SDN} Data Plane}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {264--272}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947270}, doi = {10.1109/CNS56114.2022.9947270}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/NiknamiW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/OlszewskiZSBT22, author = {Daniel Olszewski and Weidong Zhu and Sandeep Sathyanarayana and Kevin R. B. Butler and Patrick Traynor}, title = {HallMonitor: {A} Framework for Identifying Network Policy Violations in Software}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {245--253}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947243}, doi = {10.1109/CNS56114.2022.9947243}, timestamp = {Tue, 17 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/OlszewskiZSBT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PapastergiouPA22, author = {Thomas Papastergiou and Roberto Perdisci and Manos Antonakakis}, title = {Returning to Port: Efficient Detection of Home Router Devices}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {172--180}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947250}, doi = {10.1109/CNS56114.2022.9947250}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PapastergiouPA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PatanPPKG22, author = {Rizwan Patan and Reza M. Parizi and Seyedamin Pouriyeh and Mohammad S. Khan and Amir H. Gandomi}, title = {A Secured Certificateless Sign-encrypted Blockchain Communication for Intelligent Transport System}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947225}, doi = {10.1109/CNS56114.2022.9947225}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/PatanPPKG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PauleyTZM22, author = {Eric Pauley and Gang Tan and Danfeng Zhang and Patrick D. McDaniel}, title = {Performant Binary Fuzzing without Source Code using Static Instrumentation}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {226--235}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947273}, doi = {10.1109/CNS56114.2022.9947273}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/PauleyTZM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PritomX22, author = {Mir Mehedi Ahsan Pritom and Shouhuai Xu}, title = {Supporting Law-Enforcement to Cope with Blacklisted Websites: Framework and Case Study}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {181--189}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947260}, doi = {10.1109/CNS56114.2022.9947260}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/PritomX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RashidiSGNS22, author = {Leila Rashidi and Sogand SadrHaghighi and Majid Ghaderi and Cristina Nita{-}Rotaru and Reihaneh Safavi{-}Naini}, title = {Securing Communication Against Leaky Switches}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {335--343}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947245}, doi = {10.1109/CNS56114.2022.9947245}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/RashidiSGNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ReazW22, author = {Khan Reaz and Gerhard Wunder}, title = {Expectation Entropy as a Password Strength Metric}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--2}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947259}, doi = {10.1109/CNS56114.2022.9947259}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ReazW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SaeedLZC22, author = {Usama Saeed and Lingjia Liu and Kai Zeng and A. Robert Calderbank}, title = {Securing Wireless Channels: Reliable Shared Secret Extraction through {OTFS}}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {199--207}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947239}, doi = {10.1109/CNS56114.2022.9947239}, timestamp = {Mon, 06 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SaeedLZC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Sagduyu22, author = {Yalin E. Sagduyu}, title = {Free-Rider Games for Federated Learning with Selfish Clients in NextG Wireless Networks}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {365--370}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947274}, doi = {10.1109/CNS56114.2022.9947274}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/Sagduyu22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SendnerISJDK22, author = {Christoph Sendner and Lukas Iffl{\"{a}}nder and Sebastian Schindler and Michael Jobst and Alexandra Dmitrienko and Samuel Kounev}, title = {Ransomware Detection in Databases through Dynamic Analysis of Query Sequences}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {326--334}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947244}, doi = {10.1109/CNS56114.2022.9947244}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SendnerISJDK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SeveriJYWON22, author = {Giorgio Severi and Matthew Jagielski and G{\"{o}}kberk Yar and Yuxuan Wang and Alina Oprea and Cristina Nita{-}Rotaru}, title = {Network-Level Adversaries in Federated Learning}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {19--27}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947237}, doi = {10.1109/CNS56114.2022.9947237}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SeveriJYWON22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShezanLPWSL22, author = {Faysal Hossain Shezan and Yingjie Lao and Minlong Peng and Xin Wang and Mingming Sun and Ping Li}, title = {{NL2GDPR:} Automatically Develop {GDPR} Compliant Android Application Features from Natural Language}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.10273858}, doi = {10.1109/CNS56114.2022.10273858}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ShezanLPWSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SuLZWW22, author = {Dan Su and Jiqiang Liu and Sencun Zhu and Xiaoyang Wang and Wei Wang}, title = {Alexa Skills: Security Vulnerabilities and Countermeasures}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.10066153}, doi = {10.1109/CNS56114.2022.10066153}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SuLZWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SunZZS22, author = {Yuanyi Sun and Sencun Zhu and Yan Zhao and Pengfei Sun}, title = {A User-Friendly Two-Factor Authentication Method against Real-Time Phishing Attacks}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {91--99}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947253}, doi = {10.1109/CNS56114.2022.9947253}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SunZZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TorshiziUH22, author = {Ehsan Olyaei Torshizi and Utkrist Uprety and Werner Henkel}, title = {Highly Efficient {FDD} Secret Key Generation using {ESPRIT} and Jump Removal on Phase Differences}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947224}, doi = {10.1109/CNS56114.2022.9947224}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TorshiziUH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/VierhauserWR22, author = {Michael Vierhauser and Rebekka Wohlrab and Stefan Rass}, title = {Towards Cost-Benefit-Aware Adaptive Monitoring for Cyber-Physical Systems}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.10092919}, doi = {10.1109/CNS56114.2022.10092919}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/VierhauserWR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangF22, author = {Yuhui Wang and Junaid Farooq}, title = {Proactive and Resilient {UAV} Orchestration for QoS Driven Connectivity and Coverage of Ground Users}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {371--376}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947272}, doi = {10.1109/CNS56114.2022.9947272}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/WangF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangYPGFZ22, author = {Shan Wang and Ming Yang and Bryan Pearson and Tingjian Ge and Xinwen Fu and Wei Zhao}, title = {On Security of Proof-of-Policy (PoP) in the Execute-Order-Validate Blockchain Paradigm}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {317--325}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947249}, doi = {10.1109/CNS56114.2022.9947249}, timestamp = {Wed, 17 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangYPGFZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XingCWTSYL22, author = {Yunlong Xing and Jiahao Cao and Xinda Wang and Sadegh Torabi and Kun Sun and Fei Yan and Qi Li}, title = {SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {236--244}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947248}, doi = {10.1109/CNS56114.2022.9947248}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/XingCWTSYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XuZBS22, author = {Jiaqi Xu and Xingya Zhao and Arjun Bakshi and Kannan Srinivasan}, title = {Learning-Based Radio Fingerprinting for {RFID} Secure Authentication Scheme}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {55--63}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947229}, doi = {10.1109/CNS56114.2022.9947229}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/XuZBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YangFS22, author = {Edwin Yang and Song Fang and Dakun Shen}, title = {{DASK:} Driving-Assisted Secret Key Establishment}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {73--81}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947241}, doi = {10.1109/CNS56114.2022.9947241}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/YangFS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangK22, author = {Zhengguang Zhang and Marwan Krunz}, title = {{SIGTAM:} {A} Tampering Attack on Wi-Fi Preamble Signaling and Countermeasures}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.10059317}, doi = {10.1109/CNS56114.2022.10059317}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZhangK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhaoLYZL22, author = {Jinghao Zhao and Qianru Li and Zengwen Yuan and Zhehui Zhang and Songwu Lu}, title = {5G Messaging: System Insecurity and Defenses}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {37--45}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947238}, doi = {10.1109/CNS56114.2022.9947238}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZhaoLYZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZiviD22, author = {Afshin Zivi and Christian Doerr}, title = {Adding Zero Trust in {BYOD} Environments through Network Inspection}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.10092922}, doi = {10.1109/CNS56114.2022.10092922}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZiviD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cns/2022, title = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022}, doi = {10.1109/CNS56114.2022}, isbn = {978-1-6654-6255-6}, timestamp = {Fri, 25 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AbdelAtySCS21, author = {Maged AbdelAty and Sandra Scott{-}Hayward and Roberto Doriguzzi Corin and Domenico Siracusa}, title = {GADoT: GAN-based Adversarial Training for Robust DDoS Attack Detection}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {119--127}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705040}, doi = {10.1109/CNS53000.2021.9705040}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AbdelAtySCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AkestoridisT21, author = {Dimitrios{-}Georgios Akestoridis and Patrick Tague}, title = {HiveGuard: {A} Network Security Monitoring Architecture for Zigbee Networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {209--217}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705043}, doi = {10.1109/CNS53000.2021.9705043}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AkestoridisT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlrumayhLT21, author = {Abrar S. Alrumayh and Sarah M. Lehman and Chiu C. Tan}, title = {Understanding and Mitigating Privacy Leaks from Third-Party Smart Speaker Apps}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {1--9}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705042}, doi = {10.1109/CNS53000.2021.9705042}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AlrumayhLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AsadujjamanOJMP21, author = {A. S. M. Asadujjaman and Momen Oqaily and Yosr Jarraya and Suryadipta Majumdar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Artificial Packet-Pair Dispersion {(APPD):} {A} Blackbox Approach to Verifying the Integrity of {NFV} Service Chains}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {245--253}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705020}, doi = {10.1109/CNS53000.2021.9705020}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AsadujjamanOJMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BendaryKCP21, author = {Ahmed S. Bendary and C. Emre Koksal and Daniel Canaday and Andrew Pomerance}, title = {Unconditional Authentication for Constrained Applications via Strong PUFs}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {272--280}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705035}, doi = {10.1109/CNS53000.2021.9705035}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BendaryKCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenLNG21, author = {Wenhao Chen and Li Lin and Jennifer Newman and Yong Guan}, title = {Automatic Detection of Android Steganography Apps via Symbolic Execution and Tree Matching}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {254--262}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705047}, doi = {10.1109/CNS53000.2021.9705047}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChenLNG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DevalTBR21, author = {Shalin Kumar Deval and Meenakshi Tripathi and Bruhadeshwar Bezawada and Indrakshi Ray}, title = {"X-Phish: Days of Future Past"{\textdaggerdbl}: Adaptive {\&} Privacy Preserving Phishing Detection}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {227--235}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705052}, doi = {10.1109/CNS53000.2021.9705052}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/DevalTBR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DiasA21, author = {Micael A. Dias and Francisco Marcos de Assis}, title = {Evaluating the Eavesdropper Entropy via Bloch-Messiah Decomposition}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705021}, doi = {10.1109/CNS53000.2021.9705021}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/DiasA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FanCZX21, author = {Wenjun Fan and Sang{-}Yoon Chang and Xiaobo Zhou and Shouhuai Xu}, title = {ConMan: {A} Connection Manipulation-based Attack Against Bitcoin Networking}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {101--109}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705018}, doi = {10.1109/CNS53000.2021.9705018}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/FanCZX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FejrskovPBV21, author = {Martin Fejrskov and Jens Myrup Pedersen and Leon B{\"{o}}ck and Emmanouil Vasilomanolakis}, title = {An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in {DNS} records}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {164--172}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705029}, doi = {10.1109/CNS53000.2021.9705029}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/FejrskovPBV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GuoTCLW21, author = {Yunqi Guo and Zhaowei Tan and Kaiyuan Chen and Songwu Lu and Ying Nian Wu}, title = {A Model Obfuscation Approach to IoT Security}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {1--9}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705028}, doi = {10.1109/CNS53000.2021.9705028}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/GuoTCLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HardegenPEGRB21, author = {Christoph Hardegen and Mike Petersen and Chukwuebuka Ezelu and Timo Geier and Sebastian Rieger and Ulrich Buehler}, title = {A Hierarchical Architecture and Probabilistic Strategy for Collaborative Intrusion Detection}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {128--136}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705027}, doi = {10.1109/CNS53000.2021.9705027}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HardegenPEGRB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HoglundR21, author = {Joel H{\"{o}}glund and Shahid Raza}, title = {{LICE:} Lightweight certificate enrollment for IoT using application layer security}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {19--28}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705036}, doi = {10.1109/CNS53000.2021.9705036}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/HoglundR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HossainBS21, author = {Md Tamjid Hossain and Shahriar Badsha and Haoting Shen}, title = {Privacy, Security, and Utility Analysis of Differentially Private {CPES} Data}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {65--73}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705022}, doi = {10.1109/CNS53000.2021.9705022}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HossainBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HusaT21, author = {Eric Husa and Reza Tourani}, title = {Vibe: An Implicit Two-Factor Authentication using Vibration Signals}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {236--244}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705025}, doi = {10.1109/CNS53000.2021.9705025}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/HusaT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/IslamDSAWF21, author = {Md. Mazharul Islam and Ashutosh Dutta and Md Sajidul Islam Sajid and Ehab Al{-}Shaer and Jinpeng Wei and Sadegh Farhang}, title = {{CHIMERA:} Autonomous Planning and Orchestration for Malware Deception}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {173--181}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705030}, doi = {10.1109/CNS53000.2021.9705030}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/IslamDSAWF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/IvanovY21, author = {Nikolay Ivanov and Qiben Yan}, title = {EthClipper: {A} Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {191--199}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705033}, doi = {10.1109/CNS53000.2021.9705033}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/IvanovY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JiangW21, author = {Suhan Jiang and Jie Wu}, title = {On Game-theoretic Computation Power Diversification in the Bitcoin Mining Network}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {83--91}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705053}, doi = {10.1109/CNS53000.2021.9705053}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/JiangW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiuFS21, author = {Songsong Liu and Pengbin Feng and Kun Sun}, title = {HoneyBog: {A} Hybrid Webshell Honeypot Framework against Command Injection}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {218--226}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705039}, doi = {10.1109/CNS53000.2021.9705039}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiuFS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MitraKLM21, author = {Rupendra Nath Mitra and Mohamed M. Kassem and Jon Larrea and Mahesh K. Marina}, title = {{CUPS} Hijacking in Mobile {RAN} Slicing: Modeling, Prototyping, and Analysis}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {38--46}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705046}, doi = {10.1109/CNS53000.2021.9705046}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MitraKLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MoskalY21, author = {Stephen Moskal and Shanchieh Jay Yang}, title = {Translating Intrusion Alerts to Cyberattack Stages using Pseudo-Active Transfer Learning {(PATRL)}}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {110--118}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705037}, doi = {10.1109/CNS53000.2021.9705037}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/MoskalY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/OngunSMBOEHNDV21, author = {Talha Ongun and Oliver Spohngellert and Benjamin A. Miller and Simona Boboila and Alina Oprea and Tina Eliassi{-}Rad and Jason Hiser and Alastair Nottingham and Jack W. Davidson and Malathi Veeraraghavan}, title = {{PORTFILER:} Port-Level Network Profiling for Self-Propagating Malware Detection}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {182--190}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705045}, doi = {10.1109/CNS53000.2021.9705045}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/OngunSMBOEHNDV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PaudelDMR21, author = {Upakar Paudel and Andy Dolan and Suryadipta Majumdar and Indrakshi Ray}, title = {Context-Aware IoT Device Functionality Extraction from Specifications for Ensuring Consumer Security}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {155--163}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705050}, doi = {10.1109/CNS53000.2021.9705050}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/PaudelDMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RoitburdOHC21, author = {Gerbert Roitburd and Matthias Ortmann and Matthias Hollick and Jiska Classen}, title = {Very Pwnable Network: Cisco AnyConnect Security Analysis}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {56--64}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705023}, doi = {10.1109/CNS53000.2021.9705023}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/RoitburdOHC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SchwarzATH21, author = {Sara Beatriz Schwarz and Dimitrios{-}Georgios Akestoridis and Patrick Tague and Hanan Hibshi}, title = {Hiding the Topology of an {IEEE} 802.15.4 Network with Limited Energy}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {74--82}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705054}, doi = {10.1109/CNS53000.2021.9705054}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SchwarzATH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SciancaleporeTR21, author = {Savio Sciancalepore and Pietro Tedeschi and Usman Riasat and Roberto Di Pietro}, title = {Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted Channel Access}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {10--18}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705038}, doi = {10.1109/CNS53000.2021.9705038}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SciancaleporeTR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShahriarKRMC21, author = {Md Hasan Shahriar and Alvi Ataur Khalil and Mohammad Ashiqur Rahman and Mohammad Hossein Manshaei and Dong Chen}, title = {iAttackGen: Generative Synthesis of False Data Injection Attacks in Cyber-physical Systems}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {200--208}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705034}, doi = {10.1109/CNS53000.2021.9705034}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ShahriarKRMC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShariehF21, author = {Salah Sharieh and Alexander Ferworn}, title = {Securing APIs and Chaos Engineering}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {290--294}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705049}, doi = {10.1109/CNS53000.2021.9705049}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ShariehF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SlatteryTMGRB21, author = {Oliver Slattery and Xiao Tang and Lijun Ma and Thomas Gerrits and Anouar Rahmouni and Sumit Bhushan}, title = {The Quantum Communications and Networking Project at the Information Technology Laboratory of {NIST}}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705051}, doi = {10.1109/CNS53000.2021.9705051}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SlatteryTMGRB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TanDZLGL21, author = {Zhaowei Tan and Boyan Ding and Zhehui Zhang and Qianru Li and Yunqi Guo and Songwu Lu}, title = {Device-Centric Detection and Mitigation of Diameter Signaling Attacks against Mobile Core}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {29--37}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705031}, doi = {10.1109/CNS53000.2021.9705031}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/TanDZLGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TrestioreanuNMS21, author = {Lucian Trestioreanu and Cristina Nita{-}Rotaru and Aanchal Malhotra and Radu State}, title = {{SPON:} Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {92--100}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705048}, doi = {10.1109/CNS53000.2021.9705048}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/TrestioreanuNMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WrightFGPDC21, author = {Jordan Wright and Zane Fink and Michael Gowanlock and Christopher Robert Philabaum and Brian Donnelly and Bertrand Cambou}, title = {A Symmetric Cipher Response-Based Cryptography Engine Accelerated Using {GPGPU}}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {146--154}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705019}, doi = {10.1109/CNS53000.2021.9705019}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/WrightFGPDC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XuBS21, author = {Zhifan Xu and Melike Baykal{-}G{\"{u}}rsoy and Predrag Spasojevic}, title = {A Game-Theoretic Approach for Probabilistic Cooperative Jamming Strategies over Parallel Wireless Channels}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {47--55}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705044}, doi = {10.1109/CNS53000.2021.9705044}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/XuBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YangIWR21, author = {Fangfang Yang and Mohammad A. Islam and Fan Wu and Shaolei Ren}, title = {CompKey: Exploiting Computer's Electromagnetic Radiation for Secret Key Generation}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {281--289}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705032}, doi = {10.1109/CNS53000.2021.9705032}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/YangIWR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangCMF21, author = {Qisheng Zhang and Jin{-}Hee Cho and Terrence J. Moore and Frederica Free{-}Nelson}, title = {{DREVAN:} Deep Reinforcement Learning-based Vulnerability-Aware Network Adaptations for Resilient Networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {137--145}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705041}, doi = {10.1109/CNS53000.2021.9705041}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZhangCMF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cns/2021, title = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021}, doi = {10.1109/CNS53000.2021}, isbn = {978-1-6654-4496-5}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/0001BMLMERFMB20, author = {Federico Mancini and Solveig Bruvoll and John Melrose and Frederick A. Leve and Logan O. Mailloux and Raphael Ernst and Kellyn Rein and Stefano Fioravanti and Diego Merani and Robert Been}, title = {A Security Reference Model for Autonomous Vehicles in Military Operations}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162227}, doi = {10.1109/CNS48642.2020.9162227}, timestamp = {Thu, 13 Aug 2020 14:43:08 +0200}, biburl = {https://dblp.org/rec/conf/cns/0001BMLMERFMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/0001CZL20, author = {Ben Niu and Yahong Chen and Likun Zhang and Fenghua Li}, title = {Membership Inference Attacks against MemGuard : {IEEE} {CNS} 20 Poster}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--2}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162283}, doi = {10.1109/CNS48642.2020.9162283}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/0001CZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/0004SZB20, author = {Yuntao Wang and Zhou Su and Ning Zhang and Abderrahim Benslimane}, title = {Sweet: Secure Wireless Energy Transfer with Electric Vehicles in Vehicular Energy Networks}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162306}, doi = {10.1109/CNS48642.2020.9162306}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/0004SZB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/0007BPSS20, author = {Jens M{\"{u}}ller and Marcus Brinkmann and Damian Poddebniak and Sebastian Schinzel and J{\"{o}}rg Schwenk}, title = {Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162218}, doi = {10.1109/CNS48642.2020.9162218}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/0007BPSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Al-ShaerSC20, author = {Rawan Al{-}Shaer and Jonathan M. Spring and Eliana Christou}, title = {Learning the Associations of {MITRE} {ATT} {\&} {CK} Adversarial Techniques}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162207}, doi = {10.1109/CNS48642.2020.9162207}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Al-ShaerSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Aliyu0YL20, author = {Aliyu Aliyu and Ying He and Iryna Yevseyeva and Cunjin Luo}, title = {Cyber Security Decision Making Informed by Cyber Threat Intelligence {(CYDETI)} : {IEEE} {CNS} 20 Poster}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--2}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162162}, doi = {10.1109/CNS48642.2020.9162162}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Aliyu0YL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AyoadeASGAJKS20, author = {Gbadebo Ayoade and Khandakar Ashrafi Akbar and Pracheta Sahoo and Yang Gao and Anmol Agarwal and Kangkook Jee and Latifur Khan and Anoop Singhal}, title = {Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162264}, doi = {10.1109/CNS48642.2020.9162264}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AyoadeASGAJKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AzizTSP20, author = {Ahmed Aziz and Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro}, title = {SecureAIS - Securing Pairwise Vessels Communications}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162320}, doi = {10.1109/CNS48642.2020.9162320}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AzizTSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BachlMFZ20, author = {Maximilian Bachl and Fares Meghdouri and Joachim Fabini and Tanja Zseby}, title = {SparseIDS: Learning Packet Sampling with Reinforcement Learning}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162253}, doi = {10.1109/CNS48642.2020.9162253}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BachlMFZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Beemer0KKY20, author = {Allison Beemer and Eric Graves and J{\"{o}}rg Kliewer and Oliver Kosut and Paul L. Yu}, title = {Authentication and Partial Message Correction over Adversarial Multiple-Access Channels}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162198}, doi = {10.1109/CNS48642.2020.9162198}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Beemer0KKY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BendaryK20, author = {Ahmed S. Bendary and C. Emre Koksal}, title = {Order-Optimal Scaling of Covert Communication over {MIMO} {AWGN} Channels}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162192}, doi = {10.1109/CNS48642.2020.9162192}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BendaryK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BergesSGGC20, author = {Paul M. Berges and Basavesh Ammanaghatta Shivakumar and Timothy Graziano and Ryan M. Gerdes and Z. Berkay Celik}, title = {On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162216}, doi = {10.1109/CNS48642.2020.9162216}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BergesSGGC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BurgessCOS20, author = {Jonah Burgess and Domhnall Carlin and Philip O'Kane and Sakir Sezer}, title = {REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162304}, doi = {10.1109/CNS48642.2020.9162304}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BurgessCOS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CarlucciCCR20, author = {Mattia Carlucci and Stefano Cecconello and Mauro Conti and Piero Romare}, title = {Eathentication: {A} Chewing-based Authentication Method}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162343}, doi = {10.1109/CNS48642.2020.9162343}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CarlucciCCR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CerviaBS20, author = {Giulia Cervia and Germ{\'{a}}n Bassi and Mikael Skoglund}, title = {Secure Strong Coordination}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162268}, doi = {10.1109/CNS48642.2020.9162268}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CerviaBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChangPK020, author = {Sang{-}Yoon Chang and Younghee Park and Nikhil Vijayakumar Kengalahalli and Xiaobo Zhou}, title = {Query-Crafting DoS Threats Against Internet {DNS}}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162166}, doi = {10.1109/CNS48642.2020.9162166}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChangPK020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChaudharyOX20, author = {Sujita Chaudhary and Austin O'Brien and Shengjie Xu}, title = {Automated Post-Breach Penetration Testing through Reinforcement Learning}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--2}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162301}, doi = {10.1109/CNS48642.2020.9162301}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChaudharyOX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChaulagainPPRCL20, author = {Dewan Chaulagain and Prabesh Poudel and Prabesh Pathak and Sankardas Roy and Doina Caragea and Guojun Liu and Xinming Ou}, title = {Hybrid Analysis of Android Apps for Security Vetting using Deep Learning}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162341}, doi = {10.1109/CNS48642.2020.9162341}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChaulagainPPRCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenJMS20, author = {Olga Chen and Aaron D. Jaggard and Catherine Meadows and Michael C. Shlanta}, title = {NExtSteP: An Extensible Testbed for Network Covert Channels}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162247}, doi = {10.1109/CNS48642.2020.9162247}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChenJMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChoSKC20, author = {Kyong{-}Tak Cho and Kang G. Shin and Yu Seung Kim and Byung{-}Ho Cha}, title = {Off is Not Off: On the Security of Parked Vehicles}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162167}, doi = {10.1109/CNS48642.2020.9162167}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChoSKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CrescenzoBM20, author = {Giovanni Di Crescenzo and Lisa Bahler and Allen McIntosh}, title = {Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162267}, doi = {10.1109/CNS48642.2020.9162267}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CrescenzoBM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DOliveiraRHK20, author = {Rafael G. L. D'Oliveira and Salim El Rouayheb and Daniel Heinlein and David A. Karpuk}, title = {Notes on Communication and Computation in Secure Distributed Matrix Multiplication}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162296}, doi = {10.1109/CNS48642.2020.9162296}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DOliveiraRHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DjosicNS20, author = {Nebojsa Djosic and Bojan Nokovic and Salah Sharieh}, title = {Machine Learning in Action: Securing {IAM} {API} by Risk Authentication Decision Engine}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162317}, doi = {10.1109/CNS48642.2020.9162317}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DjosicNS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FuQQA20, author = {Shen Fu and Dong Qin and Daji Qiao and George T. Amariucai}, title = {RUMBA-Mouse: Rapid User Mouse-Behavior Authentication Using a {CNN-RNN} Approach}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162287}, doi = {10.1109/CNS48642.2020.9162287}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/FuQQA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Fukushi0AU20, author = {Naoki Fukushi and Daiki Chiba and Mitsuaki Akiyama and Masato Uchida}, title = {A Large-scale Analysis of Cloud Service Abuse}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162303}, doi = {10.1109/CNS48642.2020.9162303}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Fukushi0AU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GeganPGB20, author = {Ross K. Gegan and Brian Perry and Dipak Ghosal and Matt Bishop}, title = {Insider Attack Detection for Science DMZs Using System Performance Data}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162260}, doi = {10.1109/CNS48642.2020.9162260}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GeganPGB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Grana20, author = {Justin Grana}, title = {Perturbing Inputs to Prevent Model Stealing}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162336}, doi = {10.1109/CNS48642.2020.9162336}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Grana20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GrashoferTH20, author = {Jan Grash{\"{o}}fer and Christian Titze and Hannes Hartenstein}, title = {Attacks on Dynamic Protocol Detection of Open Source Network Security Monitoring Tools}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162332}, doi = {10.1109/CNS48642.2020.9162332}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GrashoferTH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GrittiFGPCKV20, author = {Fabio Gritti and Lorenzo Fontana and Eric Gustafson and Fabio Pagani and Andrea Continella and Christopher Kruegel and Giovanni Vigna}, title = {{SYMBION:} Interleaving Symbolic with Concrete Execution}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--10}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162164}, doi = {10.1109/CNS48642.2020.9162164}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GrittiFGPCKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HajarAK20, author = {Muhammad Shadi Hajar and M. Omar Al{-}Kadri and Harsha K. Kalutarage}, title = {{ETAREE:} An Effective Trend-Aware Reputation Evaluation Engine for Wireless Medical Sensor Networks}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162325}, doi = {10.1109/CNS48642.2020.9162325}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HajarAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HaradaTOM20, author = {Takashi Harada and Ken Tanaka and Ryohei Ogasawara and Kenji Mikawa}, title = {A Rule Reordering Method via Pairing Dependent Rules}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162170}, doi = {10.1109/CNS48642.2020.9162170}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HaradaTOM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Henze20, author = {Martin Henze}, title = {The Quest for Secure and Privacy-preserving Cloud-based Industrial Cooperation}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162199}, doi = {10.1109/CNS48642.2020.9162199}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Henze20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JandaJWB20, author = {Carsten Rudolf Janda and Eduard A. Jorswieck and Moritz Wiese and Holger Boche}, title = {Arbitrarily Varying Wiretap Channels with and without Non-Causal Side Information at the Jammer}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162323}, doi = {10.1109/CNS48642.2020.9162323}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/JandaJWB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JiaoWWCAL020, author = {Long Jiao and Pu Wang and Ning Wang and Songlin Chen and Amir Alipour{-}Fanid and Junqing Le and Kai Zeng}, title = {Efficient Physical Layer Group Key Generation in 5G Wireless Networks}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162261}, doi = {10.1109/CNS48642.2020.9162261}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/JiaoWWCAL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JinLX20, author = {Kun Jin and Chaoyue Liu and Cathy Xia}, title = {{OTDA:} a Unsupervised Optimal Transport framework with Discriminant Analysis for Keystroke Inference}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162258}, doi = {10.1109/CNS48642.2020.9162258}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/JinLX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JoshiD20, author = {Harshvardhan P. Joshi and Rudra Dutta}, title = {Identifying {P2P} Communities in Network Traffic Using Measures of Community Connections : {IEEE} {CNS} 20 Poster}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--2}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162244}, doi = {10.1109/CNS48642.2020.9162244}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/JoshiD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KabatianskyE20, author = {Grigory Kabatiansky and Elena Egorova}, title = {Adversarial multiple access channels and a new model of multimedia fingerprinting coding}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162248}, doi = {10.1109/CNS48642.2020.9162248}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KabatianskyE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KilariYMX20, author = {Vishnu Teja Kilari and Ruozhou Yu and Satyajayant Misra and Guoliang Xue}, title = {{EARS:} Enabling Private Feedback Updates in Anonymous Reputation Systems}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162328}, doi = {10.1109/CNS48642.2020.9162328}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KilariYMX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KustersRW20, author = {Lieneke Kusters and Alexandros Rikos and Frans M. J. Willems}, title = {Modeling Temperature Behavior in the Helper Data for Secret-Key Binding with {SRAM} PUFs}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162300}, doi = {10.1109/CNS48642.2020.9162300}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KustersRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LeZ20, author = {Duc C. Le and Nur Zincir{-}Heywood}, title = {Exploring Adversarial Properties of Insider Threat Detection}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162254}, doi = {10.1109/CNS48642.2020.9162254}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LeZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LehmanALT20, author = {Sarah M. Lehman and Abrar S. Alrumayh and Haibin Ling and Chiu C. Tan}, title = {Stealthy Privacy Attacks Against Mobile {AR} Apps}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162330}, doi = {10.1109/CNS48642.2020.9162330}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LehmanALT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LeiTLX20, author = {Xinyu Lei and Guan{-}Hua Tu and Alex X. Liu and Tian Xie}, title = {Fast and Secure kNN Query Processing in Cloud Computing}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162307}, doi = {10.1109/CNS48642.2020.9162307}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LeiTLX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiKPY20, author = {He Li and Vireshwar Kumar and Jung{-}Min Jerry Park and Yaling Yang}, title = {Cumulative Message Authentication Codes for Resource-Constrained Networks}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162217}, doi = {10.1109/CNS48642.2020.9162217}, timestamp = {Sat, 26 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiKPY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiL20, author = {Guanjie Li and Chengzhe Lai}, title = {Platoon Handover Authentication in 5G-V2X : {IEEE} {CNS} 20 Poster}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--2}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162271}, doi = {10.1109/CNS48642.2020.9162271}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiaoSKC20, author = {Jiachun Liao and Lalitha Sankar and Oliver Kosut and Fl{\'{a}}vio P. Calmon}, title = {Maximal {\(\alpha\)}-Leakage and its Properties}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162168}, doi = {10.1109/CNS48642.2020.9162168}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiaoSKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiuZ20, author = {Pinglan Liu and Wensheng Zhang}, title = {Game Theoretic Approach for Secure and Efficient Heavy-Duty Smart Contracts}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162290}, doi = {10.1109/CNS48642.2020.9162290}, timestamp = {Wed, 13 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiuZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MaillouxM20, author = {Logan O. Mailloux and Robert F. Mills}, title = {Autonomous Space Resupply Vehicle Systems Security Design Principle Case Study}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162169}, doi = {10.1109/CNS48642.2020.9162169}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MaillouxM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MamunGMKK20, author = {Sayed Ashraf Mamun and Amlan Ganguly and Panos P. Markopoulos and Andres Kwasinski and Minseok Kwon}, title = {Security Vulnerabilities of Server-Centric Wireless Datacenters}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162233}, doi = {10.1109/CNS48642.2020.9162233}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/MamunGMKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MergendahlL20, author = {Samuel Mergendahl and Jun Li}, title = {Rapid: Robust and Adaptive Detection of Distributed Denial-of-Service Traffic from the Internet of Things}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162278}, doi = {10.1109/CNS48642.2020.9162278}, timestamp = {Wed, 20 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MergendahlL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Naraparaju20, author = {Shriti Naraparaju}, title = {Fingerprinting Voice Applications on Smart Speakers over Encrypted Traffic}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--2}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162257}, doi = {10.1109/CNS48642.2020.9162257}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Naraparaju20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/NessaHF20, author = {Ahasanun Nessa and Fatima Hussain and Xavier N. Fernando}, title = {Adaptive Latency Reduction in LoRa for Mission Critical Communications in Mines}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162318}, doi = {10.1109/CNS48642.2020.9162318}, timestamp = {Mon, 14 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/NessaHF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/NewazSBU20, author = {A. K. M. Iqtidar Newaz and Amit Kumar Sikder and Leonardo Babun and A. Selcuk Uluagac}, title = {{HEKA:} {A} Novel Intrusion Detection System for Attacks to Personal Medical Devices}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162311}, doi = {10.1109/CNS48642.2020.9162311}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/NewazSBU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Nukala20, author = {Venkata Sai Krishna Avinash Nukala}, title = {Website Cryptojacking Detection Using Machine Learning : {IEEE} {CNS} 20 Poster}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--2}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162342}, doi = {10.1109/CNS48642.2020.9162342}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Nukala20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/NwekeW20, author = {Livinus Obiora Nweke and Stephen D. Wolthusen}, title = {Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162191}, doi = {10.1109/CNS48642.2020.9162191}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/NwekeW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/OxfordPR20, author = {Michael Oxford and David Parker and Mark Ryan}, title = {Quantitative Verification of Certificate Transparency Gossip Protocols}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162197}, doi = {10.1109/CNS48642.2020.9162197}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/OxfordPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PennekampAMMPW20, author = {Jan Pennekamp and Fritz Alder and Roman Matzutt and Jan Tobias M{\"{u}}hlberg and Frank Piessens and Klaus Wehrle}, title = {Secure End-to-End Sensing in Supply Chains}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162337}, doi = {10.1109/CNS48642.2020.9162337}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PennekampAMMPW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PhamACCVKL20, author = {Luan Huy Pham and Massimiliano Albanese and Ritu Chadha and Cho{-}Yu Jason Chiang and Sridhar Venkatesan and Charles A. Kamhoua and Nandi Leslie}, title = {A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162298}, doi = {10.1109/CNS48642.2020.9162298}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PhamACCVKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PurwantoPBJ20, author = {Rizka Purwanto and Arindam Pal and Alan Blair and Sanjay Jha}, title = {PhishZip: {A} New Compression-based Algorithm for Detecting Phishing Websites}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162211}, doi = {10.1109/CNS48642.2020.9162211}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PurwantoPBJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Saedi0PSUSBH20, author = {Mohammad Saedi and Adrian Moore and Philip Perry and Mohammad Shojafar and Hanif Ullah and Jonathan Synnott and Ruth Brown and Ian Herwono}, title = {Generation of realistic signal strength measurements for a 5G Rogue Base Station attack scenario}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162275}, doi = {10.1109/CNS48642.2020.9162275}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Saedi0PSUSBH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SajidWAAA20, author = {Md Sajidul Islam Sajid and Jinpeng Wei and Md Rabbi Alam and Ehsan Aghaei and Ehab Al{-}Shaer}, title = {DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162202}, doi = {10.1109/CNS48642.2020.9162202}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SajidWAAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SallsMDSKV20, author = {Christopher Salls and Aravind Machiry and Adam Doup{\'{e}} and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, title = {Exploring Abstraction Functions in Fuzzing}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162273}, doi = {10.1109/CNS48642.2020.9162273}, timestamp = {Fri, 14 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SallsMDSKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SenigagliesiBG20, author = {Linda Senigagliesi and Marco Baldi and Ennio Gambi}, title = {Physical Layer Authentication Techniques based on Machine Learning with Data Compression}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162280}, doi = {10.1109/CNS48642.2020.9162280}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SenigagliesiBG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SeyitogluYO20, author = {Efe U. A. Seyitoglu and Attila A. Yavuz and Muslum Ozgur Ozmen}, title = {Compact and Resilient Cryptographic Tools for Digital Forensics}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162236}, doi = {10.1109/CNS48642.2020.9162236}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SeyitogluYO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SeymenAL20, author = {Beste Seymen and Duygu Karaoglan Altop and Albert Levi}, title = {Augmented Randomness for Secure Key Agreement using Physiological Signals}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162286}, doi = {10.1109/CNS48642.2020.9162286}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SeymenAL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SoroushAMIMGFRB20, author = {Hamed Soroush and Massimiliano Albanese and Milad Asgari Mehrabadi and Ibifubara Iganibo and Marc Mosko and Jason H. Gao and David J. Fritz and Shantanu Rane and Eric Bier}, title = {{SCIBORG:} Secure Configurations for the IoT Based on optimization and Reasoning on Graphs}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--10}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162256}, doi = {10.1109/CNS48642.2020.9162256}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SoroushAMIMGFRB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SpenskyMBLHKV20, author = {Chad Spensky and Aravind Machiry and Marcel Busch and Kevin Leach and Rick Housley and Christopher Kruegel and Giovanni Vigna}, title = {{TRUST.IO:} Protecting Physical Interfaces on Cyber-physical Systems}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162246}, doi = {10.1109/CNS48642.2020.9162246}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SpenskyMBLHKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Sun0020, author = {Jianhua Sun and Kun Sun and Qi Li}, title = {Towards a Believable Decoy System: Replaying Network Activities from Real System}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162163}, doi = {10.1109/CNS48642.2020.9162163}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Sun0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TabajaC20, author = {Ali Tabaja and Reuven Cohen}, title = {When the Network of a Smart City Is Not So Smart}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162226}, doi = {10.1109/CNS48642.2020.9162226}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TabajaC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TabibanJZP0D20, author = {Azadeh Tabiban and Yosr Jarraya and Mengyuan Zhang and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162251}, doi = {10.1109/CNS48642.2020.9162251}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TabibanJZP0D20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TahsiniDGA20, author = {Alireza Tahsini and Noah Dunstatter and Mina Guirguis and Chuadhry Mujeeb Ahmed}, title = {DeepBLOC: {A} Framework for Securing {CPS} through Deep Reinforcement Learning on Stochastic Games}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162219}, doi = {10.1109/CNS48642.2020.9162219}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TahsiniDGA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TkaucTHA20, author = {Nathalie Tkauc and Thao Tran and Kevin Hernandez{-}Diaz and Fernando Alonso{-}Fernandez}, title = {Cloud-Based Face and Speech Recognition for Access Control Applications}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162165}, doi = {10.1109/CNS48642.2020.9162165}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TkaucTHA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WalkupEXUL20, author = {Gregory Walkup and Sriharsha Etigowni and Dongyan Xu and Vincent Urias and Han W. Lin}, title = {Forensic Investigation of Industrial Control Systems Using Deterministic Replay}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162232}, doi = {10.1109/CNS48642.2020.9162232}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WalkupEXUL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangLLJLZ20, author = {Ning Wang and Junqing Le and Weiwei Li and Long Jiao and Zhihao Li and Kai Zeng}, title = {Privacy Protection and Efficient Incumbent Detection in Spectrum Sharing Based on Federated Learning}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162291}, doi = {10.1109/CNS48642.2020.9162291}, timestamp = {Mon, 17 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangLLJLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangW0BJ20, author = {Xinda Wang and Shu Wang and Kun Sun and Archer L. Batcheller and Sushil Jajodia}, title = {A Machine Learning Approach to Classify Security Patches into Vulnerability Types}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162237}, doi = {10.1109/CNS48642.2020.9162237}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/WangW0BJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Wilkens020, author = {Florian Wilkens and Mathias Fischer}, title = {Towards Data-Driven Characterization of Brute-Force Attackers}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162326}, doi = {10.1109/CNS48642.2020.9162326}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Wilkens020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WuWS20, author = {Benjamin Wu and Aaron B. Wagner and G. Edward Suh}, title = {Optimal Mechanisms Under Maximal Leakage}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162276}, doi = {10.1109/CNS48642.2020.9162276}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WuWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangHML20, author = {Fengli Zhang and Philip Dale Huff and Kylie McClanahan and Qinghua Li}, title = {A Machine Learning-based Approach for Automated Vulnerability Remediation Analysis}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162309}, doi = {10.1109/CNS48642.2020.9162309}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhangHML20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangL20, author = {Fengli Zhang and Qinghua Li}, title = {Dynamic Risk-Aware Patch Scheduling}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162225}, doi = {10.1109/CNS48642.2020.9162225}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhangL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cns/2020, title = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/xpl/conhome/9153729/proceeding}, isbn = {978-1-7281-4760-4}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AkkayaBSUM19, author = {Kemal Akkaya and Vashish Baboolal and Nico Saputro and A. Selcuk Uluagac and Hamid Menouar}, title = {Privacy-Preserving Control of Video Transmissions for Drone-based Intelligent Transportation Systems}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802665}, doi = {10.1109/CNS.2019.8802665}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AkkayaBSUM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlbakriHM19, author = {Ashwag Albakri and Lein Harn and Mahesh Maddumala}, title = {Polynomial-based Lightweight Key Management in a Permissioned Blockchain}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802723}, doi = {10.1109/CNS.2019.8802723}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlbakriHM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Alipour-FanidDW19, author = {Amir Alipour{-}Fanid and Monireh Dabaghchian and Ning Wang and Pu Wang and Liang Zhao and Kai Zeng}, title = {Machine Learning-Based Delay-Aware {UAV} Detection Over Encrypted Wi-Fi Traffic}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802721}, doi = {10.1109/CNS.2019.8802721}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Alipour-FanidDW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlmashaqbehKBC19, author = {Ghada Almashaqbeh and Kevin Kelley and Allison Bishop and Justin Cappos}, title = {CAPnet: {A} Defense Against Cache Accounting Attacks on Content Distribution Networks}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {250--258}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802825}, doi = {10.1109/CNS.2019.8802825}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlmashaqbehKBC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AltaweelSGM19, author = {Ala Altaweel and Radu Stoleru and Guofei Gu and Arnab Kumar Maity}, title = {CollusiveHijack: {A} New Route Hijacking Attack and Countermeasures in Opportunistic Networks}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {73--81}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802699}, doi = {10.1109/CNS.2019.8802699}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AltaweelSGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Andriamanalimanana19, author = {Bruno Andriamanalimanana and Ali Tekeoglu and Korkut Bekiroglu and Saumendra Sengupta and Chen{-}Fu Chiang and Michael Reale and Jorge E. Novillo}, title = {Symmetric kullback-leibler divergence of softmaxed distributions for anomaly scores}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS44998.2019.8952588}, doi = {10.1109/CNS44998.2019.8952588}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Andriamanalimanana19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BeemerKKGY19, author = {Allison Beemer and Oliver Kosut and J{\"{o}}rg Kliewer and Eric Graves and Paul L. Yu}, title = {Authentication Against a Myopic Adversary}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802705}, doi = {10.1109/CNS.2019.8802705}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/BeemerKKGY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BiryukovF19, author = {Alex Biryukov and Daniel Feher}, title = {Privacy and Linkability of Mining in Zcash}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {118--123}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802711}, doi = {10.1109/CNS.2019.8802711}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BiryukovF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ButunOG19, author = {Ismail Butun and Patrik {\"{O}}sterberg and Mikael Gidlund}, title = {Preserving Location Privacy in Cyber-Physical Systems}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802666}, doi = {10.1109/CNS.2019.8802666}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ButunOG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CetinGL19, author = {Cagri Cetin and Dmitry B. Goldgof and Jay Ligatti}, title = {SQL-Identifier Injection Attacks}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {151--159}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802743}, doi = {10.1109/CNS.2019.8802743}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CetinGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChaliseS19, author = {Batu K. Chalise and Brian M. Sadler}, title = {Joint Data and Tag Precoder Optimization for {MIMO} Physical Layer Authentication with Embedded Fingerprinting}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802729}, doi = {10.1109/CNS.2019.8802729}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChaliseS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenDD19, author = {Wenxin Chen and Yingfei Dong and Zhenhai Duan}, title = {Manipulating Drone Position Control}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {10--18}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802817}, doi = {10.1109/CNS.2019.8802817}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChenDD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChoiS0C19, author = {SeokHwan Choi and Jin{-}Myeong Shin and Peng Liu and Yoon{-}Ho Choi}, title = {Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802809}, doi = {10.1109/CNS.2019.8802809}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChoiS0C19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CrescenzoKKS19, author = {Giovanni Di Crescenzo and Matluba Khodjaeva and Delaram Kahrobaei and Vladimir Shpilrain}, title = {Secure Delegation to a Single Malicious Server: Exponentiation in RSA-type Groups}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802691}, doi = {10.1109/CNS.2019.8802691}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/CrescenzoKKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DevirGMN19, author = {Nurit Devir and Orna Grumberg and Shaul Markovitch and Gabi Nakibly}, title = {Topology-Agnostic Runtime Detection of {OSPF} Routing Attacks}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {277--285}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802826}, doi = {10.1109/CNS.2019.8802826}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DevirGMN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DuttaA19, author = {Ashutosh Dutta and Ehab Al{-}Shaer}, title = {"What", "Where", and "Why" Cybersecurity Controls to Enforce for Optimal Risk Mitigation}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {160--168}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802745}, doi = {10.1109/CNS.2019.8802745}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DuttaA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Feng0JW19, author = {Yebo Feng and Jun Li and Lei Jiao and Xintao Wu}, title = {BotFlowMon: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {169--177}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802706}, doi = {10.1109/CNS.2019.8802706}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Feng0JW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GaihrePL19, author = {Anil Gaihre and Santosh Pandey and Hang Liu}, title = {Deanonymizing Cryptocurrency With Graph Learning: The Promises and Challenges}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--3}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802640}, doi = {10.1109/CNS.2019.8802640}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GaihrePL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GhalebTG19, author = {Asem Ghaleb and Issa Traor{\'{e}} and Karim Ganame}, title = {A Framework Architecture for Agentless Cloud Endpoint Security Monitoring}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802828}, doi = {10.1109/CNS.2019.8802828}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GhalebTG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GuLC019, author = {Xiaolan Gu and Ming Li and Yang Cao and Li Xiong}, title = {Supporting Both Range Queries and Frequency Estimation with Local Differential Privacy}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {124--132}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802778}, doi = {10.1109/CNS.2019.8802778}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/GuLC019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HalabiB19, author = {Talal Halabi and Martine Bella{\"{\i}}che}, title = {Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802752}, doi = {10.1109/CNS.2019.8802752}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/HalabiB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HanLDPSF19, author = {Peiyi Han and Chuanyi Liu and Yingfei Dong and Hezhong Pan and QiYang Song and Binxing Fang}, title = {FileCrypt: Transparent and Scalable Protection of Sensitive Data in Browser-based Cloud Storage}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {46--54}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802814}, doi = {10.1109/CNS.2019.8802814}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HanLDPSF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HoangDL19, author = {Tiep Minh Hoang and Trung Q. Duong and Sangarapillai Lambotharan}, title = {Secure Wireless Communication Using Support Vector Machines}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802716}, doi = {10.1109/CNS.2019.8802716}, timestamp = {Wed, 08 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/HoangDL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HuLZYTW19, author = {Boyang Hu and Qicheng Lin and Yao Zheng and Qiben Yan and Matthew Troglia and Qingyang Wang}, title = {Characterizing Location-based Mobile Tracking in Mobile Ad Networks}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {223--231}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802632}, doi = {10.1109/CNS.2019.8802632}, timestamp = {Wed, 29 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HuLZYTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HuangLZY19, author = {Qinlong Huang and Nan Li and Zhicheng Zhang and Yixian Yang}, title = {Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of Vehicles}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802649}, doi = {10.1109/CNS.2019.8802649}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HuangLZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JakariaRH19, author = {A. H. M. Jakaria and Mohammad Ashiqur Rahman and Md. Golam Moula Mehedi Hasan}, title = {Safety Analysis of {AMI} Networks Through Smart Fraud Detection}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802845}, doi = {10.1109/CNS.2019.8802845}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/JakariaRH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KaiialiSK19, author = {Mustafa Kaiiali and Sakir Sezer and Ayesha Khalid}, title = {Cloud computing in the quantum era}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--4}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS44998.2019.8952589}, doi = {10.1109/CNS44998.2019.8952589}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KaiialiSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KambouB19, author = {Samy Kambou and Ahmed Bouabdallah}, title = {Using Structural Diversity to Enforce Strong Authentication of Mobiles to the Cloud}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802823}, doi = {10.1109/CNS.2019.8802823}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KambouB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KennedyLWLWS19, author = {Sean Kennedy and Haipeng Li and Chenggang Wang and Hao Liu and Boyang Wang and Wenhai Sun}, title = {I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {232--240}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802686}, doi = {10.1109/CNS.2019.8802686}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KennedyLWLWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KrauseUK19, author = {Tim Krause and Rafael Uetz and Tim Kretschmann}, title = {Recognizing Email Spam from Meta Data Only}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {178--186}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802827}, doi = {10.1109/CNS.2019.8802827}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KrauseUK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiZLYZ19, author = {Jie Li and Lu Zhou and Huaxin Li and Lu Yan and Haojin Zhu}, title = {Dynamic Traffic Feature Camouflaging via Generative Adversarial Networks}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {268--276}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802772}, doi = {10.1109/CNS.2019.8802772}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiZLYZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LinX0L19, author = {Xuheng Lin and Ronghua Xu and Yu Chen and J. Koji Lum}, title = {A Blockchain-Enabled Decentralized Time Banking for a New Social Value System}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802734}, doi = {10.1109/CNS.2019.8802734}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LinX0L19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LingLCL0F19, author = {Zhen Ling and Zupei Li and Chen Chen and Junzhou Luo and Wei Yu and Xinwen Fu}, title = {I Know What You Enter on Gear {VR}}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {241--249}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802674}, doi = {10.1109/CNS.2019.8802674}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LingLCL0F19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiuSS19, author = {Yaoqing Liu and Guchuan Sun and Stephanie Schuckers}, title = {Enabling Secure and Privacy Preserving Identity Management via Smart Contract}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802771}, doi = {10.1109/CNS.2019.8802771}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiuSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiuWNWW19, author = {Hao Liu and Boyang Wang and Nan Niu and Shomir Wilson and Xuetao Wei}, title = {Vaccine: : Obfuscating Access Pattern Against File-Injection Attacks}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {109--117}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802803}, doi = {10.1109/CNS.2019.8802803}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiuWNWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Ma019, author = {Qiumao Ma and Wensheng Zhang}, title = {Efficient and Accountable Oblivious Cloud Storage with Three Servers}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {37--45}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802848}, doi = {10.1109/CNS.2019.8802848}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Ma019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MayoucheSTCO19, author = {Abderrahmane Mayouche and Danilo Spano and Christos G. Tsinos and Symeon Chatzinotas and Bj{\"{o}}rn E. Ottersten}, title = {{SER} -Constrained Symbol-Level Precoding for Physical-Layer Security}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802835}, doi = {10.1109/CNS.2019.8802835}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/MayoucheSTCO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MushtaqABALG19, author = {Maria Mushtaq and Ayaz Akram and Muhammad Khurram Bhatti and Usman Ali and Vianney Lapotre and Guy Gogniat}, title = {Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {64--72}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802805}, doi = {10.1109/CNS.2019.8802805}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MushtaqABALG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MuttavarapuDT19, author = {Anudeep Sai Muttavarapu and Ram Dantu and Mark A. Thompson}, title = {Distributed Ledger for Spammers' Resume}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802789}, doi = {10.1109/CNS.2019.8802789}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MuttavarapuDT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/NguyenLDLC19, author = {Quoc Phong Nguyen and Kar Wai Lim and Dinil Mon Divakaran and Kian Hsiang Low and Mun Choon Chan}, title = {{GEE:} {A} Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {91--99}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802833}, doi = {10.1109/CNS.2019.8802833}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/NguyenLDLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/OkutanYMW19, author = {Ahmet Okutan and Shanchieh Jay Yang and Katie McConky and Gordon Werner}, title = {{CAPTURE:} Cyberattack Forecasting Using Non-Stationary Features with Time Lags}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {205--213}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802639}, doi = {10.1109/CNS.2019.8802639}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/OkutanYMW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/OzmenYB19, author = {Muslum Ozgur Ozmen and Attila A. Yavuz and Rouzbeh Behnia}, title = {Energy-Aware Digital Signatures for Embedded Medical Devices}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {55--63}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802675}, doi = {10.1109/CNS.2019.8802675}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/OzmenYB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PerazzoneYSB19, author = {Jake Bailey Perazzone and Paul L. Yu and Brian M. Sadler and Rick S. Blum}, title = {Fingerprint Embedding Authentication with Artificial Noise: {MISO} Regime}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802636}, doi = {10.1109/CNS.2019.8802636}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PerazzoneYSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PietroJLS19, author = {Roberto Di Pietro and Leonardo Jero and Flavio Lombardi and Agusti Solanas}, title = {{GPU} Algorithms for K-Anonymity in Microdata}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802735}, doi = {10.1109/CNS.2019.8802735}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/PietroJLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PietroOT19, author = {Roberto Di Pietro and Gabriele Oligeri and Pietro Tedeschi}, title = {{JAM-ME:} Exploiting Jamming to Accomplish Drone Mission}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802717}, doi = {10.1109/CNS.2019.8802717}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/PietroOT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/QuanLWLZ19, author = {Hanyu Quan and Hao Liu and Boyang Wang and Ming Li and Yuqing Zhang}, title = {Randex: Mitigating Range Injection Attacks on Searchable Encryption}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {133--141}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802641}, doi = {10.1109/CNS.2019.8802641}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/QuanLWLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/QuinkertLRKH19, author = {Florian Quinkert and Tobias Lauinger and William K. Robertson and Engin Kirda and Thorsten Holz}, title = {It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {259--267}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802671}, doi = {10.1109/CNS.2019.8802671}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/QuinkertLRKH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SaadAM19, author = {Muhammad Saad and Ashar Ahmad and Aziz Mohaisen}, title = {Fighting Fake News Propagation with Blockchains}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--4}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802670}, doi = {10.1109/CNS.2019.8802670}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SaadAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SattarM19, author = {Danish Sattar and Ashraf Matrawy}, title = {Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {82--90}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802852}, doi = {10.1109/CNS.2019.8802852}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SattarM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SciancaleporeP19, author = {Savio Sciancalepore and Roberto Di Pietro}, title = {{DRAKE:} Distributed Relay-Assisted Key Establishment}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {100--108}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802764}, doi = {10.1109/CNS.2019.8802764}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SciancaleporeP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Shang019, author = {Jiacheng Shang and Jie Wu}, title = {A Usable Authentication System Using Wrist-Worn Photoplethysmography Sensors on Smartwatches}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802738}, doi = {10.1109/CNS.2019.8802738}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Shang019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SiyariK19, author = {Peyman Siyari and Marwan Krunz}, title = {Linear Precoding with Friendly Jamming in Overloaded {MU-MIMO} Wiretap Networks}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802693}, doi = {10.1109/CNS.2019.8802693}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SiyariK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TianYS19, author = {Yifan Tian and Jiawei Yuan and Houbing Song}, title = {Secure and Reliable Decentralized Truth Discovery Using Blockchain}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802712}, doi = {10.1109/CNS.2019.8802712}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TianYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TiwariKATY19, author = {Trishita Tiwari and Avraham Klausner and Mikhail Andreev and Ari Trachtenberg and Arkady Yerukhimovich}, title = {Location Leakage from Network Access Patterns}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {214--222}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802847}, doi = {10.1109/CNS.2019.8802847}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TiwariKATY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TuL19, author = {Wenwen Tu and Lifeng Lai}, title = {Secret Key and Private Key Capacities Over an Unauthenticated Public Channel}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802730}, doi = {10.1109/CNS.2019.8802730}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TuL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangTZ19, author = {Ning Wang and Jie Tang and Kai Zeng}, title = {Spoofing Attack Detection in Mm-Wave and Massive {MIMO} 5G Communication}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802768}, doi = {10.1109/CNS.2019.8802768}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangTZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Xiao0GPHL19, author = {Mingyan Xiao and Ming Li and Linke Guo and Miao Pan and Zhu Han and Pan Li}, title = {Securing Task Allocation in Mobile Crowd Sensing: An Incentive Design Approach}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {19--27}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802697}, doi = {10.1109/CNS.2019.8802697}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Xiao0GPHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YangCC19, author = {Huan Yang and Liang Cheng and Mooi Choo Chuah}, title = {Deep-Learning-Based Network Intrusion Detection for {SCADA} Systems}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802785}, doi = {10.1109/CNS.2019.8802785}, timestamp = {Wed, 12 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YangCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YingMBCBP19, author = {Xuhang Ying and Joanna Mazer and Giuseppe Bernieri and Mauro Conti and Linda Bushnell and Radha Poovendran}, title = {Detecting {ADS-B} Spoofing Attacks Using Deep Neural Networks}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {187--195}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802732}, doi = {10.1109/CNS.2019.8802732}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YingMBCBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Zha0GMC19, author = {Zili Zha and An Wang and Yang Guo and Doug Montgomery and Songqing Chen}, title = {BotSifter: An SDN-based Online Bot Detection Framework in Data Centers}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {142--150}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802854}, doi = {10.1109/CNS.2019.8802854}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/Zha0GMC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangHLLZZ19, author = {Lili Zhang and Dianqi Han and Ang Li and Tao Li and Yan Zhang and Yanchao Zhang}, title = {WristUnlock: Secure and Usable Smartphone Unlocking with Wrist Wearables}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {28--36}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802715}, doi = {10.1109/CNS.2019.8802715}, timestamp = {Wed, 14 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhangHLLZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhouHLPXY19, author = {Xinyu Zhou and Aiqun Hu and Guyue Li and Linning Peng and Yuexiu Xing and Jiabao Yu}, title = {Design of a Robust {RF} Fingerprint Generation and Classification Scheme for Practical Device Identification}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {196--204}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802783}, doi = {10.1109/CNS.2019.8802783}, timestamp = {Tue, 13 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhouHLPXY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cns/2019, title = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8790401/proceeding}, isbn = {978-1-5386-7117-7}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/0001HS18, author = {Ignacio Mart{\'{\i}}n and Jos{\'{e}} Alberto Hern{\'{a}}ndez and Sergio de los Santos}, title = {SignatureMiner: {A} Fast Anti-Virus Signature Intelligence Tool}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433141}, doi = {10.1109/CNS.2018.8433141}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/0001HS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/0017SLHT18, author = {Ning Zhang and Wenhai Sun and Wenjing Lou and Y. Thomas Hou and Wade Trappe}, title = {{ROSTER:} Radio Context Attestation in Cognitive Radio Network}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433187}, doi = {10.1109/CNS.2018.8433187}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/0017SLHT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AdebayoRGN18, author = {Abdulhamid Adebayo and Danda B. Rawat and Moses Garuba and Laurent Njilla}, title = {Aggregated-Query-as-a-Secure-Service for {RF} Spectrum Database-Driven Opportunistic Wireless Communications}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433129}, doi = {10.1109/CNS.2018.8433129}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AdebayoRGN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AdomnicaiFM18, author = {Alexandre Adomnicai and Jacques J. A. Fournier and Laurent Masson}, title = {Hardware Security Threats Against Bluetooth Mesh Networks}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433184}, doi = {10.1109/CNS.2018.8433184}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AdomnicaiFM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlhanahnahLYZC18, author = {Mohannad Alhanahnah and Qicheng Lin and Qiben Yan and Ning Zhang and Zhenxiang Chen}, title = {Efficient Signature Generation for Classifying Cross-Architecture IoT Malware}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433203}, doi = {10.1109/CNS.2018.8433203}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlhanahnahLYZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AllamiMJ18, author = {Ali Ataeemh Allami and Mukesh K. Mohania and Wei Jiang}, title = {Privacy-Preserving Watermarking Transformation Technique in a Distributed Environment}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433162}, doi = {10.1109/CNS.2018.8433162}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AllamiMJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlshehriAAAFLZ18, author = {Ali Alshehri and Hani Alshahrani and Abdulrahman Alzahrani and Raed Alharthi and Huirong Fu and Anyi Liu and Ye Zhu}, title = {{DOPA:} Detecting Open Ports in Android {OS}}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433207}, doi = {10.1109/CNS.2018.8433207}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlshehriAAAFLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AragonTMHR18, author = {Santiago Aragon and Marco Tiloca and Max Maass and Matthias Hollick and Shahid Raza}, title = {{ACE} of Spades in the IoT Security Game: {A} Flexible IPsec Security Profile for Access Control}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433209}, doi = {10.1109/CNS.2018.8433209}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AragonTMHR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BanihaniAAFC18, author = {Abdelnasser Banihani and Abdulrahman Alzahrani and Raed Alharthi and Huirong Fu and George P. Corser}, title = {{T-PAAD:} Trajectory Privacy Attack on Autonomous Driving}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433168}, doi = {10.1109/CNS.2018.8433168}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BanihaniAAFC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BegnaRGN18, author = {Geremew Begna and Danda B. Rawat and Moses Garuba and Laurent Njilla}, title = {SecureCASH: Securing Context-Aware Distributed Storage and Query Processing in Hybrid Cloud Framework}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433144}, doi = {10.1109/CNS.2018.8433144}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BegnaRGN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BelguithGCR18, author = {Sana Belguith and Sarada Prasad Gochhayat and Mauro Conti and Giovanni Russello}, title = {Emergency Access Control Management Via Attribute Based Encrypted {QR} Codes}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433186}, doi = {10.1109/CNS.2018.8433186}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/BelguithGCR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChaY18, author = {Shi{-}Cho Cha and Kuo{-}Hui Yeh}, title = {An {ISO/IEC} 15408-2 Compliant Security Auditing System with Blockchain Technology}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433185}, doi = {10.1109/CNS.2018.8433185}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ChaY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenDD18, author = {Wenxin Chen and Yingfei Dong and Zhenhai Duan}, title = {Manipulating Drone Dynamic State Estimation to Compromise Navigation}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433205}, doi = {10.1109/CNS.2018.8433205}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChenDD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenLWLHC18, author = {LiuFei Chen and Yushan Li and Hong Wen and WenXin Lei and Wenjing Hou and Jie Chen}, title = {Block Chain Based Secure Scheme For Mobile Communication}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433155}, doi = {10.1109/CNS.2018.8433155}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChenLWLHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChiWD0R18, author = {Haotian Chi and Longfei Wu and Xiaojiang Du and Qiang Zeng and E. Paul Ratazzi}, title = {e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433213}, doi = {10.1109/CNS.2018.8433213}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChiWD0R18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChuRLJ18, author = {Xu Chu and Na Ruan and Ming Li and Weijia Jia}, title = {Pseudonym Inference in Cooperative Vehicular Traffic Scenarios}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433132}, doi = {10.1109/CNS.2018.8433132}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ChuRLJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ContiGGT18, author = {Mauro Conti and Ankit Gangwal and Sarada Prasad Gochhayat and Gabriele Tolomei}, title = {Spot the Difference: Your Bucket is Leaking : {A} Novel Methodology to Expose {A/B} Testing Effortlessly}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433122}, doi = {10.1109/CNS.2018.8433122}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ContiGGT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DongHLK18, author = {Qiuxiang Dong and Dijiang Huang and Jim Luo and Myong H. Kang}, title = {Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433128}, doi = {10.1109/CNS.2018.8433128}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DongHLK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DongZCLPW18, author = {Jiankuo Dong and Fangyu Zheng and Juanjuan Cheng and Jingqiang Lin and Wuqiong Pan and Ziyang Wang}, title = {Towards High-performance {X25519/448} Key Agreement in General Purpose GPUs}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433161}, doi = {10.1109/CNS.2018.8433161}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DongZCLPW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DuanAIJ18, author = {Qi Duan and Ehab Al{-}Shaer and Mazharul Islam and Jafar Haadi Jafarian}, title = {{CONCEAL:} {A} Strategy Composition for Resilient Cyber Deception-Framework, Metrics and Deployment}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433196}, doi = {10.1109/CNS.2018.8433196}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DuanAIJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FanKT0C18, author = {Jingyao Fan and Youssef Khazbak and Jue Tian and Ting Liu and Guohong Cao}, title = {Mitigating Stealthy False Data Injection Attacks Against State Estimation in Smart Grid}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433215}, doi = {10.1109/CNS.2018.8433215}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/FanKT0C18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GaoWGKTM18, author = {Peng Gao and Binghui Wang and Neil Zhenqiang Gong and Sanjeev R. Kulkarni and Kurt Thomas and Prateek Mittal}, title = {{SYBILFUSE:} Combining Local Attributes with Global Structure to Perform Robust Sybil Detection}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433147}, doi = {10.1109/CNS.2018.8433147}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GaoWGKTM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GaoZAW18, author = {Huan Gao and Chunlei Zhang and Muaz Ahmad and Yongqiang Wang}, title = {Privacy-Preserving Average Consensus on Directed Graphs Using Push-Sum}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433217}, doi = {10.1109/CNS.2018.8433217}, timestamp = {Fri, 28 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GaoZAW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GopeS18, author = {Prosanta Gope and Biplab Sikdar}, title = {An Efficient Privacy-Preserving Dynamic Pricing-based Billing Scheme for Smart Grids}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433191}, doi = {10.1109/CNS.2018.8433191}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GopeS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GuirguisTSNMJD18, author = {Mina Guirguis and Alireza Tahsini and Khan Siddique and Clara Novoa and Justin Moore and Christine Julien and Noah Dunstatter}, title = {{BLOC:} {A} Game-Theoretic Approach to Orchestrate {CPS} against Cyber Attacks}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433145}, doi = {10.1109/CNS.2018.8433145}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GuirguisTSNMJD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GuoCS18, author = {Yingjie Guo and Liwei Chen and Gang Shi}, title = {Function-Oriented Programming: {A} New Class of Code Reuse Attack in {C} Applications}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433189}, doi = {10.1109/CNS.2018.8433189}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GuoCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GuoG18, author = {Yuanxiong Guo and Yanmin Gong}, title = {Practical Collaborative Learning for Crowdsensing in the Internet of Things with Differential Privacy}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433181}, doi = {10.1109/CNS.2018.8433181}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/GuoG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HaradaTM18, author = {Takashi Harada and Ken Tanaka and Kenji Mikawa}, title = {Acceleration of Packet Classification via Inclusive Rules}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433137}, doi = {10.1109/CNS.2018.8433137}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HaradaTM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HasanSHSC18, author = {Kamrul Hasan and Sachin Shetty and Amin Hassanzadeh and Malek Ben Salem and Jay Chen}, title = {Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433172}, doi = {10.1109/CNS.2018.8433172}, timestamp = {Mon, 30 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HasanSHSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HeZLZ18, author = {Fannv He and Yuqing Zhang and Huizheng Liu and Wei Zhou}, title = {SCPN-based Game Model for Security Situational Awareness in the Intenet of Things}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433188}, doi = {10.1109/CNS.2018.8433188}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HeZLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HuG18, author = {Rui Hu and Yanmin Gong}, title = {Secret Dispersion: Secure Data Delivery in Cyber Physical System}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433166}, doi = {10.1109/CNS.2018.8433166}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HuG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HuZYA0Z18, author = {Boyang Hu and Baojian Zhou and Qiben Yan and Adil Alim and Feng Chen and Huacheng Zeng}, title = {PSCluster: Differentially Private Spatial Cluster Detection for Mobile Crowdsourcing Applications}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433174}, doi = {10.1109/CNS.2018.8433174}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HuZYA0Z18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JiangLT18, author = {Bo Jiang and Ming Li and Ravi Tandon}, title = {Context-aware Data Aggregation with Localized Information Privacy}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433200}, doi = {10.1109/CNS.2018.8433200}, timestamp = {Fri, 14 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/JiangLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JiaoL18, author = {Wang Jiao and Victor O. K. Li}, title = {Support Vector Machine Detection of Data Framing Attack in Smart Grid}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433210}, doi = {10.1109/CNS.2018.8433210}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/JiaoL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JiaoTZ18, author = {Long Jiao and Jie Tang and Kai Zeng}, title = {Physical Layer Key Generation Using Virtual AoA and AoD of mmWave Massive {MIMO} Channel}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433175}, doi = {10.1109/CNS.2018.8433175}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/JiaoTZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JinLGY18, author = {Wenqiang Jin and Ming Li and Linke Guo and Lei Yang}, title = {{DPDA:} {A} Differentially Private Double Auction Scheme for Mobile Crowd Sensing}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433135}, doi = {10.1109/CNS.2018.8433135}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/JinLGY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KhazbakFZC18, author = {Youssef Khazbak and Jingyao Fan and Sencun Zhu and Guohong Cao}, title = {Preserving Location Privacy in Ride-Hailing Service}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433221}, doi = {10.1109/CNS.2018.8433221}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KhazbakFZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KongWLW18, author = {Junli Kong and Baocang Wang and Caiyun Liu and Gaofei Wu}, title = {An Approach for Predicting the Popularity of Online Security News Articles}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433152}, doi = {10.1109/CNS.2018.8433152}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KongWLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LeiTLLX18, author = {Xinyu Lei and Guan{-}Hua Tu and Alex X. Liu and Chi{-}Yu Li and Tian Xie}, title = {The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433167}, doi = {10.1109/CNS.2018.8433167}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LeiTLLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiCCXCW18, author = {Yushan Li and LiuFei Chen and Jie Chen and FeiYi Xie and Songlin Chen and Hong Wen}, title = {A Low Complexity Feature Extraction for the {RF} Fingerprinting Process}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433156}, doi = {10.1109/CNS.2018.8433156}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiCCXCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiWX18, author = {Dongfang Li and Zhaoguo Wang and Yibo Xue}, title = {Fine-grained Android Malware Detection based on Deep Learning}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433204}, doi = {10.1109/CNS.2018.8433204}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiWX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiYF18, author = {Guoquan Li and Zheng Yan and Yulong Fu}, title = {A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433148}, doi = {10.1109/CNS.2018.8433148}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiYF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Liu18, author = {Xingya Liu}, title = {Blind Rendezvous: {A} Promising Candidate of Secure Spectrum Access for {D2D} communications in IoT}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433153}, doi = {10.1109/CNS.2018.8433153}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Liu18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiuL18, author = {Pengfei Liu and Ting Liu}, title = {Physical Intrusion Detection for Industrial Control System}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433194}, doi = {10.1109/CNS.2018.8433194}, timestamp = {Mon, 20 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiuL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiuWPWPW18, author = {Qin Liu and SiXia Wu and Shuyu Pei and Jie Wu and Tao Peng and Guojun Wang}, title = {Secure and Efficient Multi-Attribute Range Queries based on Comparable Inner Product Encoding}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433179}, doi = {10.1109/CNS.2018.8433179}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiuWPWPW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LoreSR18, author = {Kin Gwn Lore and Devu Manikantan Shila and Lingyu Ren}, title = {Detecting Data Integrity Attacks on Correlated Solar Farms Using Multi-layer Data Driven Algorithm}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433159}, doi = {10.1109/CNS.2018.8433159}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LoreSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LundGHJW18, author = {Mass Soldal Lund and Jorgen Emil Gulland and Odd Sveinung Hareide and {\O}yvind J{\o}sok and Karl Olav Carlsson Weum}, title = {Integrity of Integrated Navigation Systems}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433151}, doi = {10.1109/CNS.2018.8433151}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LundGHJW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MelchorDGLR18, author = {Carlos Aguilar Melchor and Jean{-}Christophe Deneuville and Philippe Gaborit and Tancr{\`{e}}de Lepoint and Thomas Ricosset}, title = {Delegating Elliptic-Curve Operations with Homomorphic Encryption}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433140}, doi = {10.1109/CNS.2018.8433140}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MelchorDGLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/OzmenBY18, author = {Muslum Ozgur Ozmen and Rouzbeh Behnia and Attila A. Yavuz}, title = {Compact Energy and Delay-Aware Authentication}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433134}, doi = {10.1109/CNS.2018.8433134}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/OzmenBY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PanZZW18, author = {Shiran Pan and Fangyu Zheng and Wen Tao Zhu and Qiongxiao Wang}, title = {Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix Factorization}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433195}, doi = {10.1109/CNS.2018.8433195}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PanZZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Peng0C18, author = {Mengfei Peng and Wei Shi and Jean{-}Pierre Corriveau}, title = {Repairing Faulty Nodes and Locating a Dynamically Spawned Black Hole Search Using Tokens}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433160}, doi = {10.1109/CNS.2018.8433160}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Peng0C18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PietroOSS18, author = {Roberto Di Pietro and Gabriele Oligeri and Xavier Salleras and Matteo Signorini}, title = {N-Guard: a Solution to Secure Access to {NFC} tags}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433182}, doi = {10.1109/CNS.2018.8433182}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PietroOSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PletinckxTD18, author = {Stijn Pletinckx and Cyril Trap and Christian Doerr}, title = {Malware Coordination using the Blockchain: An Analysis of the Cerber Ransomware}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433199}, doi = {10.1109/CNS.2018.8433199}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PletinckxTD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/QinCWH18, author = {Tao Qin and Ruoya Chen and Lei Wang and Chao He}, title = {{LMHADC:} Lightweight Method for Host based Anomaly Detection in Cloud using Mobile Agents}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433208}, doi = {10.1109/CNS.2018.8433208}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/QinCWH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/QinHJC18, author = {Tao Qin and Chao He and Hezhi Jiang and Ruoya Chen}, title = {Behavior Rhythm: An Effective Model for Massive Logs Characterizing and Security Monitoring in Cloud}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433138}, doi = {10.1109/CNS.2018.8433138}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/QinHJC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RahbariLP18, author = {Hanif Rahbari and Jinshan Liu and Jung{-}Min "Jerry" Park}, title = {SecureMatch: Scalable Authentication and Key Relegation for IoT Using Physical-Layer Techniques}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433177}, doi = {10.1109/CNS.2018.8433177}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/RahbariLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RekikGB18, author = {Mouna Rekik and Christophe Gransart and Marion Berbineau}, title = {Cyber-Physical Security Risk Assessment for Train Control and Monitoring Systems}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433201}, doi = {10.1109/CNS.2018.8433201}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/RekikGB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SciancaleporeOP18, author = {Savio Sciancalepore and Gabriele Oligeri and Roberto Di Pietro}, title = {Shooting to the Stars: Secure Location Verification via Meteor Burst Communications}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433171}, doi = {10.1109/CNS.2018.8433171}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SciancaleporeOP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShresthaSS18, author = {Prakash Shrestha and Babins Shrestha and Nitesh Saxena}, title = {Home Alone: The Insider Threat of Unattended Wearables and {A} Defense using Audio Proximity}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433216}, doi = {10.1109/CNS.2018.8433216}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ShresthaSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SinghTMA18, author = {Rajkarn Singh and George Theodorakopoulos and Mahesh K. Marina and Myrto Arapinis}, title = {On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory Data Sharing}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433178}, doi = {10.1109/CNS.2018.8433178}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SinghTMA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SuiZ18, author = {Guangye Sui and Yunlei Zhao}, title = {Revisiting {OAKE} in the eCK Security Model}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433130}, doi = {10.1109/CNS.2018.8433130}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SuiZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SunLG18, author = {Mingshun Sun and Ming Li and Ryan M. Gerdes}, title = {Truth-aware Optimal Decision-making Framework with Driver Preferences for {V2V} Communications}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433197}, doi = {10.1109/CNS.2018.8433197}, timestamp = {Tue, 18 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SunLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SunZLH18, author = {Wenhai Sun and Ning Zhang and Wenjing Lou and Y. Thomas Hou}, title = {Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433173}, doi = {10.1109/CNS.2018.8433173}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SunZLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TabibanM0D18, author = {Azadeh Tabiban and Suryadipta Majumdar and Lingyu Wang and Mourad Debbabi}, title = {{PERMON:} An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433180}, doi = {10.1109/CNS.2018.8433180}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TabibanM0D18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangHCKS18, author = {Xiao{-}Si Wang and Ian Herwono and Francesco Di Cerbo and Paul Kearney and Mark Shackleton}, title = {Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433212}, doi = {10.1109/CNS.2018.8433212}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangHCKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangJZ18, author = {Ning Wang and Long Jiao and Kai Zeng}, title = {Pilot Contamination Attack Detection for {NOMA} in Mm-Wave and Massive {MIMO} 5G Communication}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433154}, doi = {10.1109/CNS.2018.8433154}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangJZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangLCLW18, author = {Chen Wang and Jian Liu and Yingying Chen and Hongbo Liu and Yan Wang}, title = {Towards In-baggage Suspicious Object Detection Using Commodity WiFi}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433142}, doi = {10.1109/CNS.2018.8433142}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/WangLCLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangZYW18, author = {Mingyue Wang and Wen{-}Tao Zhu and Shen Yan and Qiongxiao Wang}, title = {SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433202}, doi = {10.1109/CNS.2018.8433202}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangZYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WeiQ18, author = {Dongdi Wei and Xiaofeng Qiu}, title = {Status-based Detection of malicious code in Internet of Things (IoT) devices}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433183}, doi = {10.1109/CNS.2018.8433183}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WeiQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WenCSL18, author = {Elliott Wen and Jiannong Cao and Jiaxing Shen and Xuefeng Liu}, title = {Fraus: Launching Cost-efficient and Scalable Mobile Click Fraud Has Never Been So Easy}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433126}, doi = {10.1109/CNS.2018.8433126}, timestamp = {Sat, 31 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WenCSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XieTLPLZ18, author = {Tian Xie and Guan{-}Hua Tu and Chi{-}Yu Li and Chunyi Peng and Jiawei Li and Mi Zhang}, title = {The Dark Side of Operational Wi-Fi Calling Services}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433136}, doi = {10.1109/CNS.2018.8433136}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/XieTLPLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XinS18, author = {Liangxiao Xin and David Starobinski}, title = {Mitigation of Cascading Denial of Service Attacks on Wi-Fi Networks}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433124}, doi = {10.1109/CNS.2018.8433124}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/XinS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XuLLLG18, author = {Hao Xu and Yu Long and Zhiqiang Liu and Zhen Liu and Dawu Gu}, title = {Dynamic Practical Byzantine Fault Tolerance}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433150}, doi = {10.1109/CNS.2018.8433150}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/XuLLLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XuLLS18, author = {Yifei Xu and Ting Liu and Pengfei Liu and Hong Sun}, title = {A Search-based Firmware Code Analysis Method for IoT Devices}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433163}, doi = {10.1109/CNS.2018.8433163}, timestamp = {Mon, 20 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/XuLLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YanSH18, author = {Shiwei Yan and Yong Shang and Yanbo Huang}, title = {Social-aware Jamming Allocation for Physical-layer Security in {D2D} Multicast Network}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433158}, doi = {10.1109/CNS.2018.8433158}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YanSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YangCC18, author = {Huan Yang and Liang Cheng and Mooi Choo Chuah}, title = {Detecting Payload Attacks on Programmable Logic Controllers (PLCs)}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433146}, doi = {10.1109/CNS.2018.8433146}, timestamp = {Wed, 12 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YangCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YangL18, author = {Lei Yang and Fengjun Li}, title = {Cloud-Assisted Privacy-Preserving Classification for IoT Applications}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433157}, doi = {10.1109/CNS.2018.8433157}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YangL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YangWMYY18, author = {Li Yang and Teng Wei and Jianfeng Ma and Shui Yu and Chao Yang}, title = {Inference Attack in Android Activity based on Program Fingerprint}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433169}, doi = {10.1109/CNS.2018.8433169}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/YangWMYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YangZD18, author = {Zhi Yang and Yusi Zhang and Yafei Dai}, title = {Defending against Social Network Sybils with Interaction Graph Embedding}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433127}, doi = {10.1109/CNS.2018.8433127}, timestamp = {Wed, 23 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YangZD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YaoZW18, author = {Yao Yao and Lipeng Zhu and He Wang}, title = {Real-time Detection of Passive Backdoor Behaviors on Android System}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433190}, doi = {10.1109/CNS.2018.8433190}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/YaoZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YehK18, author = {Chia{-}Yi Yeh and Edward W. Knightly}, title = {Feasibility of Passive Eavesdropping in Massive {MIMO:} An Experimental Approach}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433139}, doi = {10.1109/CNS.2018.8433139}, timestamp = {Thu, 16 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YehK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YuXK018, author = {Ruozhou Yu and Guoliang Xue and Vishnu Teja Kilari and Xiang Zhang}, title = {Deploying Robust Security in Internet of Things}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433219}, doi = {10.1109/CNS.2018.8433219}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YuXK018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YuYWWGLCTW18, author = {Wenqian Yu and Ping Yu and Junyuan Wang and Changzheng Wei and Lu Gong and Weigang Li and Bo Cui and Hari K. Tadepalli and Brian Will}, title = {Protecting Your Own Private Key in Cloud: Security, Scalability and Performance}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433170}, doi = {10.1109/CNS.2018.8433170}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/YuYWWGLCTW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YuanHLZZH18, author = {Lizhou Yuan and Yidan Hu and Yunzhi Li and Rui Zhang and Yanchao Zhang and Terri Hedgpeth}, title = {Secure RSS-Fingerprint-Based Indoor Positioning: Attacks and Countermeasures}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433131}, doi = {10.1109/CNS.2018.8433131}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YuanHLZZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhouZWHJ18, author = {Anni Zhou and Pan Zhou and Dapeng Oliver Wu and Yuchong Hu and Shouling Ji}, title = {T-PriDO: {A} Tree-based Privacy-Preserving and Contextual Collaborative Online Big Data Processing System}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433149}, doi = {10.1109/CNS.2018.8433149}, timestamp = {Thu, 20 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhouZWHJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cns/2018, title = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8410986/proceeding}, isbn = {978-1-5386-4586-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/0004K17, author = {Xu Zhang and Edward W. Knightly}, title = {Massive {MIMO} pilot distortion attack and zero-startup-cost detection: Analysis and experiments}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228634}, doi = {10.1109/CNS.2017.8228634}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/0004K17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AbdelazizK17, author = {Amr Abdelaziz and C. Emre Koksal}, title = {Fundamental limits of covert communication over {MIMO} {AWGN} channel}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228657}, doi = {10.1109/CNS.2017.8228657}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AbdelazizK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AbubakerDA17, author = {Nabil Abubaker and Leonard Dervishi and Erman Ayday}, title = {Privacy-preserving fog computing paradigm}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {502--509}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228709}, doi = {10.1109/CNS.2017.8228709}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AbubakerDA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AkgunKK17, author = {Berk Akgun and Marwan Krunz and Onur Ozan Koyluoglu}, title = {Pilot contamination attacks in massive {MIMO} systems}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228655}, doi = {10.1109/CNS.2017.8228655}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AkgunKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AndersonM17, author = {Blake Anderson and David A. McGrew}, title = {{OS} fingerprinting: New techniques and a study of information gain and obfuscation}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228647}, doi = {10.1109/CNS.2017.8228647}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AndersonM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AndrewsGL17, author = {Seth Andrews and Ryan M. Gerdes and Ming Li}, title = {Towards physical layer identification of cognitive radio devices}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228658}, doi = {10.1109/CNS.2017.8228658}, timestamp = {Tue, 18 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AndrewsGL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AslCHS17, author = {Farshad Rahimi Asl and Fei Chiang and Wenbo He and Reza Samavi}, title = {Privacy aware web services in the cloud}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {458--466}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228682}, doi = {10.1109/CNS.2017.8228682}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AslCHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AslanM17, author = {Mohamed Aslan and Ashraf Matrawy}, title = {Could network view inconsistency affect virtualized network security functions?}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {510--512}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228698}, doi = {10.1109/CNS.2017.8228698}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AslanM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BacisBBVFPRS17, author = {Enrico Bacis and Alan Barnett and Andrew Byrne and Sabrina De Capitani di Vimercati and Sara Foresti and Stefano Paraboschi and Marco Rosa and Pierangela Samarati}, title = {Distributed shuffle index: Analysis and implementation in an industrial testbed}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {396--397}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228695}, doi = {10.1109/CNS.2017.8228695}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BacisBBVFPRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BacisRS17, author = {Enrico Bacis and Marco Rosa and Ali Sajjad}, title = {EncSwift and key management: An integrated approach in an industrial setting}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {483--486}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228711}, doi = {10.1109/CNS.2017.8228711}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BacisRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BarrereL17, author = {Mart{\'{\i}}n Barr{\`{e}}re and Emil C. Lupu}, title = {Naggen: {A} network attack graph generation tool - {IEEE} {CNS} 17 poster}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {378--379}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228667}, doi = {10.1109/CNS.2017.8228667}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/BarrereL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BaurB17, author = {Sebastian Baur and Holger Boche}, title = {Storage of general data sources on a public database with security and privacy constraints}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {555--559}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228678}, doi = {10.1109/CNS.2017.8228678}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/BaurB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BeckerGZ17, author = {Daniela Becker and Jorge Guajardo and Karl{-}Heinz Zimmermann}, title = {Towards a new privacy-preserving social media advertising architecture (invited position paper)}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {45--457}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228712}, doi = {10.1109/CNS.2017.8228712}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/BeckerGZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BhattacharjeeGS17, author = {Shameek Bhattacharjee and Nirnay Ghosh and Vijay K. Shah and Sajal K. Das}, title = {QnQ: {A} reputation model to secure mobile crowdsourcing applications from incentive losses}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228635}, doi = {10.1109/CNS.2017.8228635}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BhattacharjeeGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BlassN17, author = {Erik{-}Oliver Blass and Guevara Noubir}, title = {Secure logging with crash tolerance}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--10}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228649}, doi = {10.1109/CNS.2017.8228649}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/BlassN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BoyarinovH17, author = {Konstantin Boyarinov and Aaron Hunter}, title = {Security and trust for surveillance cameras}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {384--385}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228676}, doi = {10.1109/CNS.2017.8228676}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BoyarinovH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BusireddygariK17, author = {Prashanth Busireddygari and Subhash C. Kak}, title = {Binary primes sequence for cryptography and secure communication}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {570--574}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228686}, doi = {10.1109/CNS.2017.8228686}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/BusireddygariK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenCHC17, author = {Chang{-}Wu Chen and Sang{-}Yoon Chang and Yih{-}Chun Hu and Yen{-}Wen Chen}, title = {Protecting vehicular networks privacy in the presence of a single adversarial authority}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228648}, doi = {10.1109/CNS.2017.8228648}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ChenCHC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChengXJWSOZ17, author = {Wei Cheng and Aidong Xu and Yixin Jiang and Hong Wen and Huanhuan Song and Kai Ouyang and Xiping Zhu}, title = {A method of reconciling the key discrepancy by exploiting unconditional secure transmission}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {372--373}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228664}, doi = {10.1109/CNS.2017.8228664}, timestamp = {Tue, 24 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChengXJWSOZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChengXJWSOZ17a, author = {Wei Cheng and Aidong Xu and Yixin Jiang and Hong Wen and Huanhuan Song and Kai Ouyang and Xiping Zhu}, title = {The realization of key extraction based on {USRP} and {OFDM} channel response}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {374--375}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228665}, doi = {10.1109/CNS.2017.8228665}, timestamp = {Tue, 24 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChengXJWSOZ17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ClarkLO17, author = {Gradeigh D. Clark and Janne Lindqvist and Antti Oulasvirta}, title = {Composition policies for gesture passwords: User choice, security, usability and memorability}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228644}, doi = {10.1109/CNS.2017.8228644}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ClarkLO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Cornevaux-Juignet17, author = {Franck Cornevaux{-}Juignet and Matthieu Arzel and Pierre{-}Henri Horrein and Tristan Groleat and Christian Person}, title = {Combining FPGAs and processors for high-throughput forensics {IEEE} {CNS} 17 poster}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {388--389}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228684}, doi = {10.1109/CNS.2017.8228684}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Cornevaux-Juignet17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Cornevaux-Juignet17a, author = {Franck Cornevaux{-}Juignet and Matthieu Arzel and Pierre{-}Henri Horrein and Tristan Groleat and Christian Person}, title = {Open-source flexible packet parser for high data rate agile network probe}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {610--618}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228685}, doi = {10.1109/CNS.2017.8228685}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Cornevaux-Juignet17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CrescenzoKKS17, author = {Giovanni Di Crescenzo and Matluba Khodjaeva and Delaram Kahrobaei and Vladimir Shpilrain}, title = {Computing multiple exponentiations in discrete log and {RSA} groups: From batch verification to batch delegation}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {531--539}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228702}, doi = {10.1109/CNS.2017.8228702}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/CrescenzoKKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DuL17, author = {Wei Du and Qinghua Li}, title = {Secure and efficient outsourcing of large-scale nonlinear programming}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228633}, doi = {10.1109/CNS.2017.8228633}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/DuL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FangML17, author = {Song Fang and Ian D. Markwood and Yao Liu}, title = {Manipulatable wireless key establishment}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228625}, doi = {10.1109/CNS.2017.8228625}, timestamp = {Sat, 14 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/FangML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FreyBS17, author = {Matthias Frey and Igor Bjelakovic and Slawomir Stanczak}, title = {{MAC} resolvability: First and second order results}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {560--564}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228683}, doi = {10.1109/CNS.2017.8228683}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/FreyBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FritschekW17, author = {Rick Fritschek and Gerhard Wunder}, title = {On full-duplex secure key generation with deterministic models}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {550--554}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228687}, doi = {10.1109/CNS.2017.8228687}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/FritschekW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GarnaevT17, author = {Andrey Garnaev and Wade Trappe}, title = {An OFDM-based dual radar/communication system facing uncertain jamming power}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228632}, doi = {10.1109/CNS.2017.8228632}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/GarnaevT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GrissaYH17, author = {Mohamed Grissa and Attila A. Yavuz and Bechir Hamdaoui}, title = {When the hammer meets the nail: Multi-server {PIR} for database-driven {CRN} with location privacy assurance}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228646}, doi = {10.1109/CNS.2017.8228646}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GrissaYH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HabibCBP17, author = {Bilal Habib and Bertrand Cambou and Duane Booher and Christopher Robert Philabaum}, title = {Public key exchange scheme that is addressable {(PKA)}}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {392--393}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228693}, doi = {10.1109/CNS.2017.8228693}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/HabibCBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HaneyGT17, author = {Julie M. Haney and Simson L. Garfinkel and Mary Frances Theofanos}, title = {Organizational practices in cryptographic development and testing}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228643}, doi = {10.1109/CNS.2017.8228643}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HaneyGT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HarshanCKH17, author = {Jagadeesh Harshan and Sang{-}Yoon Chang and Seungmin Kang and Yih{-}Chun Hu}, title = {Securing balise-based train control systems using cryptographic random fountains}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {405--410}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228689}, doi = {10.1109/CNS.2017.8228689}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/HarshanCKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HouleARM17, author = {J. P. Houle and S. Ahmadi and B. C. A. Robart and Ashraf Matrawy}, title = {Leveraging inter-controller communication to MitigateDDoS attacks in {SDN} networks}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {376--377}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228666}, doi = {10.1109/CNS.2017.8228666}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HouleARM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HuangG17, author = {Zonghao Huang and Yanmin Gong}, title = {Differential location privacy for crowdsourced spectrum sensing}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228652}, doi = {10.1109/CNS.2017.8228652}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/HuangG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/IyerAVM17, author = {R. Padmavathi Iyer and Pradeep K. Atrey and Gaurav Varshney and Manoj Misra}, title = {Email spoofing detection using volatile memory forensics}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {619--625}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228692}, doi = {10.1109/CNS.2017.8228692}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/IyerAVM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JiZW17, author = {Yujie Ji and Xinyang Zhang and Ting Wang}, title = {Backdoor attacks against learning systems}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228656}, doi = {10.1109/CNS.2017.8228656}, timestamp = {Wed, 04 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/JiZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JinFPTMZL17, author = {Kun Jin and Si Fang and Chunyi Peng and Zhiyang Teng and XuFei Mao and Lan Zhang and Xiangyang Li}, title = {ViViSnoop: Someone is snooping your typing without seeing it!}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228624}, doi = {10.1109/CNS.2017.8228624}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/JinFPTMZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KerglRR17, author = {Dennis Kergl and Robert Roedler and Gabi Dreo Rodosek}, title = {VulMap: Global information security vulnerabilities {IEEE} {CNS} 17 poster}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {362--363}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228659}, doi = {10.1109/CNS.2017.8228659}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KerglRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KhavariBB17, author = {Mani Khavari and Sebastian Baur and Holger Boche}, title = {Optimal capacity region for PUF-based authentication with a constraint on the number of challenge-response pairs}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {575--579}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228679}, doi = {10.1109/CNS.2017.8228679}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KhavariBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KhazbakC17, author = {Youssef Khazbak and Guohong Cao}, title = {Deanonymizing mobility traces with co-location information}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228621}, doi = {10.1109/CNS.2017.8228621}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KhazbakC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KumarS17, author = {R. James Ranjith Kumar and Biplab Sikdar}, title = {Efficient detection of false data injection attacks on {AC} state estimation in smart grids}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {411--415}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228707}, doi = {10.1109/CNS.2017.8228707}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KumarS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KyungHTDSZDA17, author = {Sukwha Kyung and Wonkyu Han and Naveen Tiwari and Vaibhav Hemant Dixit and Lakshmi Srinivas and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {HoneyProxy: Design and implementation of next-generation honeynet via {SDN}}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228653}, doi = {10.1109/CNS.2017.8228653}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KyungHTDSZDA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LawrenceHTZ17, author = {Heather Lawrence and Andrew Hughes and Robert Tonic and Cliff C. Zou}, title = {D-miner: {A} framework for mining, searching, visualizing, and alerting on darknet events}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228628}, doi = {10.1109/CNS.2017.8228628}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LawrenceHTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LeeKKK17, author = {Jong{-}Hoon Lee and Young Soo Kim and Jong{-}Hyun Kim and Ik{-}Kyun Kim}, title = {Toward the {SIEM} architecture for cloud-based security services}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {398--399}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228696}, doi = {10.1109/CNS.2017.8228696}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LeeKKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LehmanT17, author = {Sarah M. Lehman and Chiu C. Tan}, title = {PrivacyManager: An access control framework for mobile augmented reality applications}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228630}, doi = {10.1109/CNS.2017.8228630}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LehmanT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiaoWPSJXX17, author = {Runfa Liao and Hong Wen and Fei Pan and Huanhuan Song and Yixin Jiang and FeiYi Xie and Aidong Xu}, title = {A physical layer secure transmission method based on channel prediction and QoS}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {366--367}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228661}, doi = {10.1109/CNS.2017.8228661}, timestamp = {Tue, 24 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiaoWPSJXX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiuLSC17, author = {Hongbo Liu and Bo Liu and Cong Shi and Yingying Chen}, title = {Secret key distribution leveraging color shift over visible light channel}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228626}, doi = {10.1109/CNS.2017.8228626}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiuLSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiuSW17, author = {Changwei Liu and Anoop Singhal and Duminda Wijesekera}, title = {A layered graphical model for mission attack impact analysis}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {602--609}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228706}, doi = {10.1109/CNS.2017.8228706}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiuSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MandalMM017, author = {Avradip Mandal and John C. Mitchell and Hart William Montgomery and Arnab Roy}, title = {Privacy for targeted advertising}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {438--443}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228673}, doi = {10.1109/CNS.2017.8228673}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MandalMM017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MasriV17, author = {Marmara El Masri and Natalija Vlajic}, title = {Current state of client-side extensions aimed at protecting against CSRF-like attacks}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {390--391}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228690}, doi = {10.1109/CNS.2017.8228690}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/MasriV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Mitchell17, author = {Robert C. Mitchell}, title = {Epidemic-resistant configurations for intrusion detection systems}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {487--494}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228672}, doi = {10.1109/CNS.2017.8228672}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/Mitchell17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MitchellMJ17, author = {Robert Mitchell and Marci McBride and John Jarocki}, title = {Linkography abstraction refinement and cyber security}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {595--601}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228675}, doi = {10.1109/CNS.2017.8228675}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/MitchellMJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/OzgurNSAS17, author = {Utku Ozgur and Harikrishnan T. Nair and Aditya Sundararajan and Kemal Akkaya and Arif I. Sarwat}, title = {An efficient {MQTT} framework for control and protection of networked cyber-physical systems}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {421--426}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228674}, doi = {10.1109/CNS.2017.8228674}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/OzgurNSAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PanWLJXOZ17, author = {Fei Pan and Hong Wen and Runfa Liao and Yixin Jiang and Aidong Xu and Kai Ouyang and Xiping Zhu}, title = {Physical layer authentication based on channel information and machine learning}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {364--365}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228660}, doi = {10.1109/CNS.2017.8228660}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PanWLJXOZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PassmannLS17, author = {Steffen Passmann and Anne Lauber{-}Roensberg and Thorsten Strufe}, title = {Privacy-preserving audience measurement in practice - Opportunities and challenges}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {444--449}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228680}, doi = {10.1109/CNS.2017.8228680}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PassmannLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PatilPSA17, author = {Vikram Patil and Shivam Parikh and Priyanka Singh and Pradeep K. Atrey}, title = {GeoSecure: Towards secure outsourcing of {GPS} data over cloud}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {495--501}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228699}, doi = {10.1109/CNS.2017.8228699}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PatilPSA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PawlickZ17, author = {Jeffrey Pawlick and Quanyan Zhu}, title = {Quantitative models of imperfect deception in network security using signaling games with evidence {[IEEE} {CNS} 17 Poster]}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {394--395}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228694}, doi = {10.1109/CNS.2017.8228694}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/PawlickZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RefaeyLD17, author = {Ahmed Refaey and Khaled Loukhaoukha and Adel Omar Dahmane}, title = {Cryptanalysis of stream cipher using density evolution}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {382--383}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228669}, doi = {10.1109/CNS.2017.8228669}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/RefaeyLD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RingmannL17, author = {Sandra Domenique Ringmann and Hanno Langweg}, title = {Determining security requirements for cloud-supported routing of physical goods}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {514--521}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228691}, doi = {10.1109/CNS.2017.8228691}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/RingmannL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RiosIMR17, author = {Erkuden Rios and Eider Iturbe and Wissam Mallouli and Massimiliano Rak}, title = {Dynamic security assurance in multi-cloud DevOps}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {467--475}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228701}, doi = {10.1109/CNS.2017.8228701}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/RiosIMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RothMM17, author = {John D. Roth and Jeremy Martin and Travis Mayberry}, title = {A graph-theoretic approach to virtual access point correlation}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228645}, doi = {10.1109/CNS.2017.8228645}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/RothMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SeeligerSA17, author = {Robert Seeliger and Daniel Silhavy and Stefan Arbanowski}, title = {Dynamic ad-insertion and content orchestration workflows through manifest manipulation in {HLS} and {MPEG-DASH}}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {450--455}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228708}, doi = {10.1109/CNS.2017.8228708}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SeeligerSA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SongZWXJLCC17, author = {Huanhuan Song and Luping Zhang and Hong Wen and Aidong Xu and Yixin Jiang and Runfa Liao and Songlin Chen and Yi Chen}, title = {Performance analysis of cooperative secure transmission system}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {368--369}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228662}, doi = {10.1109/CNS.2017.8228662}, timestamp = {Tue, 24 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SongZWXJLCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SunLG17, author = {Mingshun Sun and Ming Li and Ryan M. Gerdes}, title = {A data trust framework for VANETs enabling false data detection and secure vehicle tracking}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228654}, doi = {10.1109/CNS.2017.8228654}, timestamp = {Tue, 18 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SunLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SunSL17, author = {Jianhua Sun and Kun Sun and Qi Li}, title = {CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228642}, doi = {10.1109/CNS.2017.8228642}, timestamp = {Tue, 27 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SunSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SuzicRM17, author = {Bojan Suzic and Andreas Reiter and Alexander Marsalek}, title = {Structuring the Scope: Enabling adaptive and multilateral authorization management}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {522--530}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228700}, doi = {10.1109/CNS.2017.8228700}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SuzicRM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TahmasbiB17, author = {Mehrdad Tahmasbi and Matthieu R. Bloch}, title = {Covert secret key generation}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {540--544}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228681}, doi = {10.1109/CNS.2017.8228681}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/TahmasbiB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TaiebC17, author = {Mohamed Haj Taieb and Jean{-}Yves Chouinard}, title = {Physical layer security using {BCH} and {LDPC} codes with adaptive granular {HARQ}}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {564--569}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228670}, doi = {10.1109/CNS.2017.8228670}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/TaiebC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TanTJ17, author = {Hailun Tan and Gene Tsudik and Sanjay Jha}, title = {{MTRA:} Multiple-tier remote attestation in IoT networks}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228638}, doi = {10.1109/CNS.2017.8228638}, timestamp = {Tue, 29 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/TanTJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TianHY17, author = {Yifan Tian and Yantian Hou and Jiawei Yuan}, title = {{CAPIA:} Cloud assisted privacy-preserving image annotation}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228627}, doi = {10.1109/CNS.2017.8228627}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/TianHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TuenoKBF17, author = {Anselme Tueno and Florian Kerschbaum and Daniel Bernau and Sara Foresti}, title = {Selective access for supply chain management in the cloud}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {476--482}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228710}, doi = {10.1109/CNS.2017.8228710}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/TuenoKBF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/UchitelevaSR17, author = {Elena Uchiteleva and Abdallah Shami and Ahmed Refaey}, title = {Time-varying keys for encryption in WSNs: {IEEE} {CNS} 17 poster}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {380--381}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228668}, doi = {10.1109/CNS.2017.8228668}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/UchitelevaSR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangX0C17, author = {Huangxin Wang and Zhonghua Xi and Fei Li and Songqing Chen}, title = {WebTrap: {A} dynamic defense scheme against economic denial of sustainability attacks}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228640}, doi = {10.1109/CNS.2017.8228640}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/WangX0C17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WongH17, author = {Ken Wong and Aaron Hunter}, title = {Bluetooth for decoy systems: {A} practical study}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {86--387}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228677}, doi = {10.1109/CNS.2017.8228677}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WongH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WongH17a, author = {Kenneth C. K. Wong and Aaron Hunter}, title = {Managing cybersecurity break-ins using bluetooth low energy devices to verify attackers: {A} practical study}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {432--437}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228697}, doi = {10.1109/CNS.2017.8228697}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WongH17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WuMC17, author = {Yuanyi Wu and Dongyu Meng and Hao Chen}, title = {Evaluating private modes in desktop and mobile browsers and their resistance to fingerprinting}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228636}, doi = {10.1109/CNS.2017.8228636}, timestamp = {Wed, 20 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WuMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XiangLL17, author = {Liyao Xiang and Baochun Li and Bo Li}, title = {Privacy-preserving inference in crowdsourcing systems}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228623}, doi = {10.1109/CNS.2017.8228623}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/XiangLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XinLGL17, author = {Jiajun Xin and Ming Li and Linke Guo and Pan Li}, title = {Practical privacy-preserving spectrum query schemes for database-driven CRNs with multiple service providers}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228651}, doi = {10.1109/CNS.2017.8228651}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/XinLGL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XuZ17, author = {Zhiheng Xu and Quanyan Zhu}, title = {Secure and practical output feedback control for cloud-enabled cyber-physical systems}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {416--420}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228703}, doi = {10.1109/CNS.2017.8228703}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/XuZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YanYVI17, author = {Qiben Yan and Hao Yang and Mehmet C. Vuran and Suat Irmak}, title = {{SPRIDE:} Scalable and private continual geo-distance evaluation for precision agriculture}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228620}, doi = {10.1109/CNS.2017.8228620}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YanYVI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YangJXWWCOZ17, author = {Qing Yang and Yixin Jiang and Aidong Xu and Hong Wen and Feng Wang and LiuFei Chen and Kai Ouyang and Xiping Zhu}, title = {A model divides the mobile security level based on {SVM}}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {370--371}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228663}, doi = {10.1109/CNS.2017.8228663}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YangJXWWCOZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YauCYC17, author = {Ken Yau and Kam{-}Pui Chow and Siu{-}Ming Yiu and Chun{-}Fai Chan}, title = {Detecting anomalous behavior of {PLC} using semi-supervised machine learning}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {580--585}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228713}, doi = {10.1109/CNS.2017.8228713}, timestamp = {Thu, 30 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YauCYC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YuanYLW17, author = {Xu Yuan and Xingliang Yuan and Baochun Li and Cong Wang}, title = {Secure multi-client data access with boolean queries in distributed key-value stores}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228619}, doi = {10.1109/CNS.2017.8228619}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YuanYLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZengCLY17, author = {Huacheng Zeng and Chen Cao and Hongxiang Li and Qiben Yan}, title = {Enabling jamming-resistant communications in wireless {MIMO} networks}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228622}, doi = {10.1109/CNS.2017.8228622}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZengCLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangD17, author = {Jiapeng Zhang and Yingfei Dong}, title = {Cyber attacks on remote relays in smart grid}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228637}, doi = {10.1109/CNS.2017.8228637}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZhangD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangJG17, author = {Xiaonan Zhang and Qi Jia and Linke Guo}, title = {Secure and optimized unauthorized secondary user detection in dynamic spectrum access}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228639}, doi = {10.1109/CNS.2017.8228639}, timestamp = {Thu, 01 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZhangJG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangL17, author = {Fengli Zhang and Qinghua Li}, title = {Deep learning-based data forgery detection in automatic generation control}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {400--404}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228705}, doi = {10.1109/CNS.2017.8228705}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZhangL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangRMP17, author = {Liyang Zhang and Francesco Restuccia and Tommaso Melodia and Scott M. Pudlewski}, title = {Learning to detect and mitigate cross-layer attacks in wireless networks: Framework and applications}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228631}, doi = {10.1109/CNS.2017.8228631}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZhangRMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangV17, author = {Ruochi Zhang and Parv Venkitasubramaniam}, title = {A game theoretic approach to analyze false data injection and detection in {LQG} system}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {427--431}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228704}, doi = {10.1109/CNS.2017.8228704}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZhangV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangZYLHY17, author = {Ning Zhang and Ruide Zhang and Qiben Yan and Wenjing Lou and Y. Thomas Hou and Danfeng Yao}, title = {Black penguin: On the feasibility of detecting intrusion with homogeneous memory}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {586--594}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228671}, doi = {10.1109/CNS.2017.8228671}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhangZYLHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhengHSLYX17, author = {Yuwei Zheng and Lin Huang and Haoqi Shan and Jun Li and Qing Yang and Wenyuan Xu}, title = {Ghost telephonist impersonates you: Vulnerability in 4G {LTE} {CS} fallback}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228629}, doi = {10.1109/CNS.2017.8228629}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhengHSLYX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhengJBR17, author = {Zhiyuan Zheng and Shan Jin and Riccardo Bettati and A. L. Narasimha Reddy}, title = {Securing cyber-physical systems with adaptive commensurate response}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228641}, doi = {10.1109/CNS.2017.8228641}, timestamp = {Sat, 23 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZhengJBR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhengLAW17, author = {Qingji Zheng and Qi Li and Aytac Azgin and Jian Weng}, title = {Data verification in information-centric networking with efficient revocable certificateless signature}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228650}, doi = {10.1109/CNS.2017.8228650}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZhengLAW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZouLS17, author = {Shaofeng Zou and Yingbin Liang and Shlomo Shamai}, title = {Gaussian fading channel with secrecy outside a bounded range}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {545--549}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228688}, doi = {10.1109/CNS.2017.8228688}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZouLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cns/2017, title = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, publisher = {{IEEE}}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8170165/proceeding}, isbn = {978-1-5386-0683-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AbdelazizKG16, author = {Amr Abdelaziz and Can Emre Koksal and Hesham El Gamal}, title = {On the security of Angle of Arrival estimation}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {109--117}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860476}, doi = {10.1109/CNS.2016.7860476}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AbdelazizKG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AmbrosinHMCP16, author = {Moreno Ambrosin and Hossein Hosseini and Kalikinkar Mandal and Mauro Conti and Radha Poovendran}, title = {Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {163--171}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860482}, doi = {10.1109/CNS.2016.7860482}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AmbrosinHMCP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AqilAKYSRLPSC16, author = {Azeem Aqil and Ahmed Osama Fathy Atya and Srikanth V. Krishnamurthy and Paul L. Yu and Ananthram Swami and Jeff Rowe and Karl N. Levitt and Alexander Poylisher and Constantin Serban and Ritu Chadha}, title = {Automated cross layer feature selection for effective intrusion detection in networked systems}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {270--278}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860494}, doi = {10.1109/CNS.2016.7860494}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AqilAKYSRLPSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AroraVAM16, author = {Shashank Arora and Gaurav Varshney and Pradeep K. Atrey and Manoj Mishra}, title = {SecureCEdit: An approach for secure cloud-based document editing}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {561--564}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860548}, doi = {10.1109/CNS.2016.7860548}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AroraVAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AsselinAJ16, author = {Eric Asselin and Carlos Aguilar Melchor and Gentian Jakllari}, title = {Anomaly detection for web server log reduction: {A} simple yet efficient crawling based approach}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {586--590}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860553}, doi = {10.1109/CNS.2016.7860553}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AsselinAJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BabunAU16, author = {Leonardo Babun and Hidayet Aksu and A. Selcuk Uluagac}, title = {A framework for counterfeit smart grid device detection}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {382--383}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860522}, doi = {10.1109/CNS.2016.7860522}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BabunAU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BadraYPC16, author = {Nadim Badra and Jiaxin Yang and Ioannis N. Psaromiligkos and Beno{\^{\i}}t Champagne}, title = {Robust and secure beamformer design for {MIMO} relaying with imperfect eavesdropper {CSI}}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {442--449}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860534}, doi = {10.1109/CNS.2016.7860534}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BadraYPC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BendaryMD16, author = {Ahmed S. Bendary and Yahya Z. Mohasseb and Hisham Dahshan}, title = {On the secure Degrees of Freedom for the K-user symmetric {MIMO} Wiretap {MAC} channel}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {591--595}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860554}, doi = {10.1109/CNS.2016.7860554}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BendaryMD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BicakciYG16, author = {Kemal Bicakci and Davut Deniz Yavuz and Sezin Gurkan}, title = {TwinCloud: Secure cloud sharing without explicit key management}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {581--585}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860552}, doi = {10.1109/CNS.2016.7860552}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BicakciYG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ButtnerH16, author = {Carsten B{\"{u}}ttner and Sorin A. Huss}, title = {Attribute-based authorization tickets for Car-to-X communication}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {234--242}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860490}, doi = {10.1109/CNS.2016.7860490}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ButtnerH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CaronLR16, author = {Eddy Caron and Arnaud Lefray and Jonathan Rouzaud{-}Cornabas}, title = {Secured systems in Clouds with Model-Driven Orchestration}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {498--506}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860541}, doi = {10.1109/CNS.2016.7860541}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CaronLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CervantesSLX16, author = {Diana K. Anguiano Cervantes and Ghouri Mohammad Saaduddin and Yanyan Li and Mengjun Xie}, title = {Comparison between fingerprint and behavioral biometric authentication using 2D and 3D gestures}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {372--373}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860517}, doi = {10.1109/CNS.2016.7860517}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CervantesSLX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChangC16, author = {Wentao Chang and Songqing Chen}, title = {ExtensionGuard: Towards runtime browser extension information leakage detection}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {154--162}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860481}, doi = {10.1109/CNS.2016.7860481}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChangC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenJSXC16, author = {Kuan{-}yin Chen and Anudeep Reddy Junuthula and Ishant Kumar Siddhrau and Yang Xu and H. Jonathan Chao}, title = {SDNShield: Towards more comprehensive defense against DDoS attacks on {SDN} control plane}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {28--36}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860467}, doi = {10.1109/CNS.2016.7860467}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ChenJSXC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChoPK16, author = {Eunsang Cho and Minkyung Park and Ted Taekyoung Kwon}, title = {TwinPeaks: {A} new approach for certificateless public key distribution}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {10--18}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860465}, doi = {10.1109/CNS.2016.7860465}, timestamp = {Wed, 18 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChoPK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChukwuOM16, author = {Julian Chukwu and Ose Osamudiamen and Ashraf Matrawy}, title = {IDSaaS in {SDN:} Intrusion Detection System as a service in software defined networks}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {356--357}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860509}, doi = {10.1109/CNS.2016.7860509}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChukwuOM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChungFKIWS16, author = {Key{-}whan Chung and Valerio Formicola and Zbigniew T. Kalbarczyk and Ravishankar K. Iyer and Alexander Withers and Adam J. Slagell}, title = {Attacking supercomputers through targeted alteration of environmental control: {A} data driven case study}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {406--410}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860528}, doi = {10.1109/CNS.2016.7860528}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChungFKIWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Crescenzo16, author = {Giovanni Di Crescenzo}, title = {Server-assisted fully homomorphic computation protocols}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {534--542}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860545}, doi = {10.1109/CNS.2016.7860545}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Crescenzo16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DabaghchianAZW16, author = {Monireh Dabaghchian and Amir Alipour{-}Fanid and Kai Zeng and Qingsi Wang}, title = {Online learning-based optimal primary user emulation attacks in cognitive radio networks}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {100--108}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860475}, doi = {10.1109/CNS.2016.7860475}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DabaghchianAZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DaltonA16, author = {Brandon Dalton and Nitin Agarwal}, title = {Analyzing deviant behaviors on social media using cyber forensics-based methodologies}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {378--379}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860520}, doi = {10.1109/CNS.2016.7860520}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DaltonA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DeshmukhCHTB16, author = {Siddhant Deshmukh and Henry Carter and Grant Hernandez and Patrick Traynor and Kevin R. B. Butler}, title = {Efficient and secure template blinding for biometric authentication}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {480--488}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860539}, doi = {10.1109/CNS.2016.7860539}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DeshmukhCHTB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DoerrMKM16, author = {Christian Doerr and Mourad el Maouchi and Sille Kamoen and Jarno Moree}, title = {Scan prediction and reconnaissance mitigation through commodity graphics cards}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {287--295}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860496}, doi = {10.1109/CNS.2016.7860496}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DoerrMKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FaisalCW16, author = {Mustafa Faisal and Alvaro A. C{\'{a}}rdenas and Avishai Wool}, title = {Modeling Modbus {TCP} for intrusion detection}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {386--390}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860524}, doi = {10.1109/CNS.2016.7860524}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/FaisalCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FayedKL16, author = {Abdallah Fayed and Tamer Khattab and Lifeng Lai}, title = {On secure communication over the Z-Channel}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {606--610}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860557}, doi = {10.1109/CNS.2016.7860557}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/FayedKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GeganAOG16, author = {Ross K. Gegan and Vishal Ahuja and John D. Owens and Dipak Ghosal}, title = {Real-time GPU-based timing channel detection using entropy}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {296--305}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860497}, doi = {10.1109/CNS.2016.7860497}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GeganAOG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GiontaEL16, author = {Jason Gionta and William Enck and Per Larsen}, title = {Preventing kernel code-reuse attacks through disclosure resistant code diversification}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {189--197}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860485}, doi = {10.1109/CNS.2016.7860485}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/GiontaEL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HaasKMMF16, author = {Steffen Haas and Shankar Karuppayah and Selvakumar Manickam and Max M{\"{u}}hlh{\"{a}}user and Mathias Fischer}, title = {On the resilience of P2P-based botnet graphs}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {225--233}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860489}, doi = {10.1109/CNS.2016.7860489}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/HaasKMMF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HallgrenOS16, author = {Per A. Hallgren and Mart{\'{\i}}n Ochoa and Andrei Sabelfeld}, title = {MaxPace: Speed-constrained location queries}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {136--144}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860479}, doi = {10.1109/CNS.2016.7860479}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/HallgrenOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HanHKKMK16, author = {Mee Lan Han and Hee Chan Han and Ah Reum Kang and Byung Il Kwak and Aziz Mohaisen and Huy Kang Kim}, title = {{WHAP:} Web-hacking profiling using Case-Based Reasoning}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {344--345}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860503}, doi = {10.1109/CNS.2016.7860503}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HanHKKMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HuangJXWCGGW16, author = {Jianli Huang and Yixin Jiang and Aidong Xu and Hong Wen and Huajun Chen and Xiaobin Guo and Zewu Guan and Zhiming Wang}, title = {Joint beamforming and antenna subarray formation for secrecy capacity maximization in {MIMO} wiretap channels}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {368--369}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860515}, doi = {10.1109/CNS.2016.7860515}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HuangJXWCGGW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HusztiO16, author = {Andrea Huszti and Norbert Olah}, title = {A simple authentication scheme for clouds}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {565--569}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860549}, doi = {10.1109/CNS.2016.7860549}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HusztiO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/IsmailGS16, author = {Hatem Ismail and Daniel Germanus and Neeraj Suri}, title = {Malicious peers eviction for {P2P} overlays}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {216--224}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860488}, doi = {10.1109/CNS.2016.7860488}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/IsmailGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KangM16, author = {Ah Reum Kang and Aziz Mohaisen}, title = {Transparency of the new gTLD's centralized zone data service: {A} measurement study}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {354--355}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860508}, doi = {10.1109/CNS.2016.7860508}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KangM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KangM16a, author = {Ah Reum Kang and Aziz Mohaisen}, title = {Assessing {DNS} privacy under partial deployment of special-use Domain Names}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {358--359}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860510}, doi = {10.1109/CNS.2016.7860510}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KangM16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KangM16b, author = {Ah Reum Kang and Aziz Mohaisen}, title = {Automatic alerts annotation for improving DDoS mitigation systems}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {362--363}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860512}, doi = {10.1109/CNS.2016.7860512}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KangM16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KoSK16, author = {Woo{-}Hyun Ko and Bharadwaj Satchidanandan and P. R. Kumar}, title = {Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {416--420}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860529}, doi = {10.1109/CNS.2016.7860529}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KoSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LeibengerFS16, author = {Dominik Leibenger and Jonas Fortmann and Christoph Sorge}, title = {EncFS goes multi-user: Adding access control to an encrypted file system}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {525--533}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860544}, doi = {10.1109/CNS.2016.7860544}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LeibengerFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LewisLX16, author = {Antwane Lewis and Yanyan Li and Mengjun Xie}, title = {Real time motion-based authentication for smartwatch}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {380--381}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860521}, doi = {10.1109/CNS.2016.7860521}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LewisLX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiXB16, author = {Yanyan Li and Mengjun Xie and Jiang Bian}, title = {{SEGAUTH:} {A} segment-based approach to behavioral biometric authentication}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860464}, doi = {10.1109/CNS.2016.7860464}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiXB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiZ16, author = {Depeng Li and Rui Zhang}, title = {A framework to mitigate airliner risk in air traffic management}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {324--332}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860500}, doi = {10.1109/CNS.2016.7860500}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiZZ16, author = {Tao Li and Rui Zhang and Yanchao Zhang}, title = {PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access control}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {333--341}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860501}, doi = {10.1109/CNS.2016.7860501}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LinYLXX16, author = {Jian Lin and Dejun Yang and Ming Li and Jia Xu and Guoliang Xue}, title = {BidGuard: {A} framework for privacy-preserving crowdsensing incentive mechanisms}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {145--153}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860480}, doi = {10.1109/CNS.2016.7860480}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LinYLXX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LuP16, author = {Rui Lu and Derek Chi{-}Wai Pao}, title = {Optimized Aho-Corasick string matching algorithm for smart phones}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {342--343}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860502}, doi = {10.1109/CNS.2016.7860502}, timestamp = {Thu, 20 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LuP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MadaniV16, author = {Pooria Madani and Natalija Vlajic}, title = {Towards sequencing malicious system calls}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {376--377}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860519}, doi = {10.1109/CNS.2016.7860519}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MadaniV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MansourBS16, author = {Ahmed S. Mansour and Holger Boche and Rafael F. Schaefer}, title = {List decoding for arbitrarily varying wiretap channels}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {611--615}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860558}, doi = {10.1109/CNS.2016.7860558}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MansourBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MartensAEM16, author = {Marcus M{\"{a}}rtens and Hadi Asghari and Michel van Eeten and Piet Van Mieghem}, title = {A time-dependent SIS-model for long-term computer worm evolution}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {207--215}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860487}, doi = {10.1109/CNS.2016.7860487}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MartensAEM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MartinezCT16, author = {Daniel T. Martinez and Claire M. Cochrane and Chiu C. Tan}, title = {Encryption-based privacy protection for police body-worn cameras}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {364--365}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860513}, doi = {10.1109/CNS.2016.7860513}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MartinezCT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MichaelsAU16, author = {Spencer Michaels and Kemal Akkaya and A. Selcuk Uluagac}, title = {Inducing data loss in Zigbee networks via join/association handshake spoofing}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {401--405}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860527}, doi = {10.1109/CNS.2016.7860527}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MichaelsAU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MingX16, author = {Jonathan Ming and Mengjun Xie}, title = {Remote live forensics for Android devices}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {374--375}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860518}, doi = {10.1109/CNS.2016.7860518}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MingX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MohsinAHAR16, author = {Mujahid Mohsin and Zahid Anwar and Ghaith Husari and Ehab Al{-}Shaer and Mohammad Ashiqur Rahman}, title = {IoTSAT: {A} formal framework for security analysis of the internet of things (IoT)}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {180--188}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860484}, doi = {10.1109/CNS.2016.7860484}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MohsinAHAR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MukherjeeU16, author = {Pritam Mukherjee and Sennur Ulukus}, title = {Covert bits through queues}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {626--630}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860561}, doi = {10.1109/CNS.2016.7860561}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MukherjeeU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/OlmoF16, author = {Jaume del Olmo and Javier Rodr{\'{\i}}guez Fonollosa}, title = {Strong secrecy on a class of Degraded Broadcast Channels using polar codes}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {601--605}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860556}, doi = {10.1109/CNS.2016.7860556}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/OlmoF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PanW016, author = {Yao Pan and Jules White and Yu Sun}, title = {Assessing the threat of web worker distributed attacks}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {306--314}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860498}, doi = {10.1109/CNS.2016.7860498}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PanW016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PengGSSLH16, author = {Wei Peng and Tianchong Gao and Devkishen Sisodia and Tanay Kumar Saha and Feng Li and Mohammad Al Hasan}, title = {{ACTS:} Extracting Android App topologiCal signature through graphleT Sampling}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {37--45}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860468}, doi = {10.1109/CNS.2016.7860468}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PengGSSLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PhamAV16, author = {Luan Huy Pham and Massimiliano Albanese and Sridhar Venkatesan}, title = {A quantitative risk assessment framework for adaptive Intrusion Detection in the cloud}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {489--497}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860540}, doi = {10.1109/CNS.2016.7860540}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PhamAV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PisharodyCH16, author = {Sandeep Pisharody and Ankur Chowdhary and Dijiang Huang}, title = {Security policy checking in distributed {SDN} based clouds}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {19--27}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860466}, doi = {10.1109/CNS.2016.7860466}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PisharodyCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PradhanNVKB16, author = {Parth Pradhan and Kyatsandra G. Nagananda and Parv Venkitasubramaniam and Shalinee Kishore and Rick S. Blum}, title = {{GPS} spoofing attack characterization and detection in smart grids}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {391--395}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860525}, doi = {10.1109/CNS.2016.7860525}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PradhanNVKB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RahbariK16, author = {Hanif Rahbari and Marwan Krunz}, title = {Rolling preambles: Mitigating stealthy {FO} estimation attacks in OFDM-based 802.11 systems}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {118--126}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860477}, doi = {10.1109/CNS.2016.7860477}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/RahbariK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RahmanFDA16, author = {Mohammad Ashiqur Rahman and Abdullah Al Farooq and Amarjit Datta and Ehab Al{-}Shaer}, title = {Automated synthesis of resiliency configurations for cyber networks}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {243--251}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860491}, doi = {10.1109/CNS.2016.7860491}, timestamp = {Sun, 30 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/RahmanFDA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RashidiF16, author = {Bahman Rashidi and Carol J. Fung}, title = {XDroid: An Android permission control using Hidden Markov chain and online learning}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {46--54}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860469}, doi = {10.1109/CNS.2016.7860469}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/RashidiF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Rawat16, author = {Danda B. Rawat}, title = {Analyzing energy efficient physical layer security in large-scale {MIMO} enabled {CRN} with QoS requirements}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {465--471}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860537}, doi = {10.1109/CNS.2016.7860537}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Rawat16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ReimairKM16, author = {Florian Reimair and Christian Kollmann and Alexander Marsalek}, title = {Emulating {U2F} authenticator devices}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {543--551}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860546}, doi = {10.1109/CNS.2016.7860546}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ReimairKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ReimairPRE16, author = {Florian Reimair and Bernd Pr{\"{u}}nster and Andreas Reiter and Christian Ertler}, title = {Applied dynamic policy selection}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {507--515}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860542}, doi = {10.1109/CNS.2016.7860542}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ReimairPRE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SanatiniaN16, author = {Amirali Sanatinia and Guevara Noubir}, title = {Honey Onions: {A} framework for characterizing and identifying misbehaving Tor HSDirs}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {127--135}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860478}, doi = {10.1109/CNS.2016.7860478}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SanatiniaN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SchabhuserDB16, author = {Lucas Schabh{\"{u}}ser and Denise Demirel and Johannes Buchmann}, title = {An unconditionally hiding auditing procedure for computations over distributed data}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {552--560}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860547}, doi = {10.1109/CNS.2016.7860547}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SchabhuserDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShenMSL16, author = {Dakun Shen and Ian D. Markwood and Dan Shen and Yao Liu}, title = {Virtual Safe: Unauthorized movement detection for mobile devices}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {315--323}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860499}, doi = {10.1109/CNS.2016.7860499}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ShenMSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShiS16, author = {Yi Shi and Yalin E. Sagduyu}, title = {Spectrum learning and access for cognitive satellite communications under jamming}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {472--479}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860538}, doi = {10.1109/CNS.2016.7860538}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ShiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShinKCH16, author = {SeongHan Shin and Kazukuni Kobara and Chia{-}Chuan Chuang and Weicheng Huang}, title = {A security framework for {MQTT}}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {432--436}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860532}, doi = {10.1109/CNS.2016.7860532}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ShinKCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SoysaCM16, author = {Madushanka Soysa and Pamela C. Cosman and Laurence B. Milstein}, title = {Video cognitive radio networks for tactical scenarios}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {457--464}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860536}, doi = {10.1109/CNS.2016.7860536}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SoysaCM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SpauldingKUM16, author = {Jeffrey Spaulding and Ah Reum Kang and Shambhu J. Upadhyaya and Aziz Mohaisen}, title = {A user study of the effectiveness of typosquatting techniques}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {360--361}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860511}, doi = {10.1109/CNS.2016.7860511}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SpauldingKUM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Suh-LeeJK16, author = {Candace Suh{-}Lee and Ju{-}Yeon Jo and Yoohwan Kim}, title = {Text mining for security threat detection discovering hidden information in unstructured log messages}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {252--260}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860492}, doi = {10.1109/CNS.2016.7860492}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Suh-LeeJK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SunDLSY16, author = {Xiaoyan Sun and Jun Dai and Peng Liu and Anoop Singhal and John Yen}, title = {Towards probabilistic identification of zero-day attack paths}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {64--72}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860471}, doi = {10.1109/CNS.2016.7860471}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SunDLSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Suthaharan16, author = {Shan Suthaharan}, title = {A correlation-based subspace analysis for data confidentiality and classification as utility in {CPS}}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {426--431}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860531}, doi = {10.1109/CNS.2016.7860531}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/Suthaharan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SuthaharanS16, author = {Shan Suthaharan and Weining Shen}, title = {Pairing of most relevant variables and bootstrap samples with ridge regression for data sharing}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {384--385}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860523}, doi = {10.1109/CNS.2016.7860523}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SuthaharanS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Takabi16, author = {Hassan Takabi}, title = {Firewall for brain: Towards a privacy preserving ecosystem for {BCI} applications}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {370--371}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860516}, doi = {10.1109/CNS.2016.7860516}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Takabi16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TangYKH16, author = {Bo Tang and Jun Yan and Steven Kay and Haibo He}, title = {Detection of false data injection attacks in smart grid under colored Gaussian noise}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {172--179}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860483}, doi = {10.1109/CNS.2016.7860483}, timestamp = {Wed, 11 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TangYKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TaylorS16, author = {Curtis R. Taylor and Craig A. Shue}, title = {Validating security protocols with cloud-based middleboxes}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {261--269}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860493}, doi = {10.1109/CNS.2016.7860493}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TaylorS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ThompsonMC16, author = {Brian Thompson and James R. Morris{-}King and Hasan Cam}, title = {Effectiveness of proactive reset for mitigating impact of stealthy attacks on networks of autonomous systems}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {437--441}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860533}, doi = {10.1109/CNS.2016.7860533}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ThompsonMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TianYY16, author = {Yifan Tian and Jiawei Yuan and Shucheng Yu}, title = {{SBPA:} Social behavior based cross Social Network phishing attacks}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {366--367}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860514}, doi = {10.1109/CNS.2016.7860514}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TianYY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TrappeG16, author = {Wade Trappe and Andrey Garnaev}, title = {Bargaining over secrecy and reliability for low {SNR} {OFDM} communications}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {596--600}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860555}, doi = {10.1109/CNS.2016.7860555}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TrappeG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TuGLP16, author = {Wenwen Tu and Mario Goldenbaum and Lifeng Lai and H. Vincent Poor}, title = {Multiple key generation with restricted public discussion structure}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {641--645}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860564}, doi = {10.1109/CNS.2016.7860564}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TuGLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Vasilomanolakis16, author = {Emmanouil Vasilomanolakis and Michael Stahn and Carlos Garcia Cordero and Max M{\"{u}}hlh{\"{a}}user}, title = {On probe-response attacks in Collaborative Intrusion Detection Systems}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {279--286}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860495}, doi = {10.1109/CNS.2016.7860495}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Vasilomanolakis16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/VenkatesanAAJW16, author = {Sridhar Venkatesan and Massimiliano Albanese and Kareem Amin and Sushil Jajodia and Mason Wright}, title = {A moving target defense approach to mitigate DDoS attacks against proxy-based architectures}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {198--206}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860486}, doi = {10.1109/CNS.2016.7860486}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/VenkatesanAAJW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/VenugopalanPS16, author = {Vivek Venugopalan and Cameron D. Patterson and Devu Manikantan Shila}, title = {Detecting and thwarting hardware trojan attacks in cyber-physical systems}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {421--425}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860530}, doi = {10.1109/CNS.2016.7860530}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/VenugopalanPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Walsh16, author = {Kevin Walsh}, title = {{TLS} with trustworthy certificate authorities}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {516--524}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860543}, doi = {10.1109/CNS.2016.7860543}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Walsh16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangSTHW16, author = {Xuanxuan Wang and Rafael F. Schaefer and Lars Thiele and Thomas Haustein and Yongming Wang}, title = {Ergodic secrecy sum rate for multiuser {MIMO} downlink systems using block diagonalization}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {636--640}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860563}, doi = {10.1109/CNS.2016.7860563}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangSTHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WebbR16, author = {Allen T. Webb and A. L. Narasima Reddy}, title = {Finding proxy users at the service using anomaly detection}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {82--90}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860473}, doi = {10.1109/CNS.2016.7860473}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WebbR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WeiYTLY16, author = {Zhexiong Wei and F. Richard Yu and Helen Tang and Chengehao Liang and Qiao Yan}, title = {Securing cognitive radio vehicular Ad hoc networks with trusted lightweight cloud computing}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {450--456}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860535}, doi = {10.1109/CNS.2016.7860535}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/WeiYTLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WieseO16, author = {Moritz Wiese and Tobias J. Oechtering}, title = {Secure distributed estimation of linear systems}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {616--620}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860559}, doi = {10.1109/CNS.2016.7860559}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WieseO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WuBDJ16, author = {Longfei Wu and Benjamin Brandt and Xiaojiang Du and Bo Ji}, title = {Analysis of clickjacking attacks and an effective defense scheme for Android devices}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {55--63}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860470}, doi = {10.1109/CNS.2016.7860470}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WuBDJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XinSN16, author = {Liangxiao Xin and David Starobinski and Guevara Noubir}, title = {Cascading denial of service attacks on Wi-Fi networks}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {91--99}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860474}, doi = {10.1109/CNS.2016.7860474}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/XinSN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YangCC16, author = {Huan Yang and Liang Cheng and Mooi Choo Chuah}, title = {Evaluation of utility-privacy trade-offs of data manipulation techniques for smart metering}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {396--400}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860526}, doi = {10.1109/CNS.2016.7860526}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YangCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YuCZY16, author = {Xiaoqi Yu and Nairen Cao and Jun Zhang and Siu{-}Ming Yiu}, title = {Dynamic Proofs of Retrievability with improved worst case overhead}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {576--580}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860551}, doi = {10.1109/CNS.2016.7860551}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YuCZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YuLWW16, author = {Wenqian Yu and Weigang Li and Junyuan Wang and Changzheng Wei}, title = {A study of {HSM} based key protection in encryption file system}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {352--353}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860507}, doi = {10.1109/CNS.2016.7860507}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/YuLWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YuPSB16, author = {Paul L. Yu and Jake B. Perazzone and Brian M. Sadler and Rick S. Blum}, title = {Authenticated side channel via physical layer fingerprinting}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {631--635}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860562}, doi = {10.1109/CNS.2016.7860562}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YuPSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZewailY16, author = {Ahmed A. Zewail and Aylin Yener}, title = {Coded caching for resolvable networks with security requirements}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {621--625}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860560}, doi = {10.1109/CNS.2016.7860560}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZewailY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangWSJZZ16, author = {Zhengguang Zhang and Hong Wen and Huanhuan Song and Yixin Jiang and Jinling Zhang and Xiping Zhu}, title = {A {MIMO} cross-layer secure communication scheme based on spatial modulation}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {350--351}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860506}, doi = {10.1109/CNS.2016.7860506}, timestamp = {Tue, 24 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhangWSJZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangWSJZZZ16, author = {Jinling Zhang and Hong Wen and Huanhuan Song and Yixin Jiang and Zhengguang Zhang and Luping Zhang and Xiping Zhu}, title = {Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {348--349}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860505}, doi = {10.1109/CNS.2016.7860505}, timestamp = {Tue, 24 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhangWSJZZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangWSTJDZ16, author = {Luping Zhang and Hong Wen and Huanhuan Song and Jie Tang and Yixin Jiang and Weihua Dong and Xiping Zhu}, title = {The performance of the {MIMO} physical layer security system with imperfect {CSI}}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {346--347}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860504}, doi = {10.1109/CNS.2016.7860504}, timestamp = {Tue, 24 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhangWSTJDZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhengPGZM16, author = {Chengyu Zheng and Mila Dalla Preda and Jorge Granjal and Stefano Zanero and Federico Maggi}, title = {On-chip system call tracing: {A} feasibility study and open prototype}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {73--81}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860472}, doi = {10.1109/CNS.2016.7860472}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhengPGZM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZiadAAS16, author = {M. Tarek Ibn Ziad and Amr Al{-}Anwar and Moustafa Alzantot and Mani B. Srivastava}, title = {CryptoImg: Privacy preserving processing over encrypted images}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {570--575}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860550}, doi = {10.1109/CNS.2016.7860550}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZiadAAS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cns/2016, title = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7854080/proceeding}, isbn = {978-1-5090-3065-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AbodunrinMH15, author = {Dare Abodunrin and Yoan Miche and Silke Holtmanns}, title = {Some dangers from 2G networks legacy support and a possible mitigation}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {585--593}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346872}, doi = {10.1109/CNS.2015.7346872}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/AbodunrinMH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AkdoganAL15, author = {Dilara Akdogan and Duygu Karaoglan Altop and Albert Levi}, title = {Secure key agreement using pure biometrics}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {191--199}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346828}, doi = {10.1109/CNS.2015.7346828}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AkdoganAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Al-DuwairiAAP15, author = {Basheer Al{-}Duwairi and Ahmad T. Al{-}Hammouri and Monther Aldwairi and Vern Paxson}, title = {GFlux: {A} google-based system for Fast Flux detection}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {755--756}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346920}, doi = {10.1109/CNS.2015.7346920}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/Al-DuwairiAAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlbaneseBJ15, author = {Massimiliano Albanese and Ermanno Battista and Sushil Jajodia}, title = {A deception based approach for defeating {OS} and service fingerprinting}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {317--325}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346842}, doi = {10.1109/CNS.2015.7346842}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlbaneseBJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AliAAD15, author = {Muhammad Qasim Ali and Ayesha Binte Ashfaq and Ehab Al{-}Shaer and Qi Duan}, title = {Towards a science of anomaly detection system evasion}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {460--468}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346858}, doi = {10.1109/CNS.2015.7346858}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AliAAD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AmbrosinHMCP15, author = {Moreno Ambrosin and Hossein Hosseini and Kalikinkar Mandal and Mauro Conti and Radha Poovendran}, title = {Verifiable and privacy-preserving fine-grained data-collection for smart metering}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {655--658}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346882}, doi = {10.1109/CNS.2015.7346882}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AmbrosinHMCP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ArchibaldG15, author = {Rennie Archibald and Dipak Ghosal}, title = {Design and analysis of a model-based Covert Timing Channel for Skype traffic}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {236--244}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346833}, doi = {10.1109/CNS.2015.7346833}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ArchibaldG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AriyapalaCP15, author = {Kanishka Ariyapala and Mauro Conti and Cristina M. Pinotti}, title = {CaT: Evaluating cloud-aided {TLS} for smartphone energy efficiency}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {601--609}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346874}, doi = {10.1109/CNS.2015.7346874}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AriyapalaCP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ArmandoRTW15, author = {Alessandro Armando and Silvio Ranise and Riccardo Traverso and Konrad S. Wrona}, title = {Compiling {NATO} authorization policies for enforcement in the cloud and SDNs}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {741--742}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346913}, doi = {10.1109/CNS.2015.7346913}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ArmandoRTW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AyacheEF15, author = {Meryeme Ayache and Mohammed Erradi and Bernd Freisleben}, title = {curlX: {A} middleware to enforce access control policies within a cloud environment}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {771--772}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346928}, doi = {10.1109/CNS.2015.7346928}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AyacheEF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AydinB15, author = {Mustafa Aydin and Nazife Baykal}, title = {Feature extraction and classification phishing websites based on {URL}}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {769--770}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346927}, doi = {10.1109/CNS.2015.7346927}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AydinB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AzraouiEOM15, author = {Monir Azraoui and Kaoutar Elkhiyaoui and Melek {\"{O}}nen and Refik Molva}, title = {Publicly verifiable conjunctive keyword search in outsourced databases}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {619--627}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346876}, doi = {10.1109/CNS.2015.7346876}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AzraouiEOM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BacisMCP15, author = {Enrico Bacis and Simone Mutti and Steven Capelli and Stefano Paraboschi}, title = {DockerPolicyModules: Mandatory Access Control for Docker containers}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {749--750}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346917}, doi = {10.1109/CNS.2015.7346917}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BacisMCP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BariliL15, author = {Antonio Barili and Dario Lanterna}, title = {On the effects of large-scale {DNS} Poisoning}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {723--724}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346904}, doi = {10.1109/CNS.2015.7346904}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BariliL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BarretoCVFP15, author = {Luciano Barreto and Antonio Celesti and Massimo Villari and Maria Fazio and Antonio Puliafito}, title = {Identity management in IoT Clouds: {A} {FIWARE} case of study}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {680--684}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346887}, doi = {10.1109/CNS.2015.7346887}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/BarretoCVFP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BasciftciKA15, author = {Yuksel Ozan Basciftci and Can Emre Koksal and Alexei E. Ashikhmin}, title = {Securing massive {MIMO} at the physical layer}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {272--280}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346837}, doi = {10.1109/CNS.2015.7346837}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BasciftciKA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BekermanSRB15, author = {Dmitri Bekerman and Bracha Shapira and Lior Rokach and Ariel Bar}, title = {Unknown malware detection using network traffic classification}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {134--142}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346821}, doi = {10.1109/CNS.2015.7346821}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/BekermanSRB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BenedettoGLW15, author = {Francesco Benedetto and Gaetano Giunta and Angelo Liguori and Arno Wacker}, title = {A novel method for securing critical infrastructures by detecting hidden flows of data}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {648--654}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346881}, doi = {10.1109/CNS.2015.7346881}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/BenedettoGLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BentonCKS15, author = {Kevin Benton and L. Jean Camp and Timothy Kelley and Martin Swany}, title = {Filtering {IP} source spoofing using feasible path reverse path forwarding with {SDN}}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {733--734}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346909}, doi = {10.1109/CNS.2015.7346909}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BentonCKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BittlGMBSE15, author = {Sebastian Bittl and Arturo A. Gonzalez and Matthias Myrtus and Hanno Beckmann and Stefan Sailer and Bernd Eissfeller}, title = {Emerging attacks on {VANET} security based on {GPS} Time Spoofing}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {344--352}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346845}, doi = {10.1109/CNS.2015.7346845}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BittlGMBSE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BockKGMF15, author = {Leon Bock and Shankar Karuppayah and Tim Grube and Max M{\"{u}}hlh{\"{a}}user and Mathias Fischer}, title = {Hide and seek: Detecting sensors in {P2P} botnets}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {731--732}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346908}, doi = {10.1109/CNS.2015.7346908}, timestamp = {Thu, 17 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/BockKGMF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BustinSPS15, author = {Ronit Bustin and Rafael F. Schaefer and H. Vincent Poor and Shlomo Shamai}, title = {An {I-MMSE} based graphical representation of rate and equivocation for the Gaussian broadcast channel}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {53--58}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346810}, doi = {10.1109/CNS.2015.7346810}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BustinSPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CalvinoRD15, author = {Aida Calvino and Sara Ricci and Josep Domingo{-}Ferrer}, title = {Privacy-preserving distributed statistical computation to a semi-honest multi-cloud}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {506--514}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346863}, doi = {10.1109/CNS.2015.7346863}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/CalvinoRD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CantaliEGAC15, author = {Gokcan Cantali and Orhan Ermis and G{\"{u}}rkan G{\"{u}}r and Fatih Alag{\"{o}}z and M. Ufuk {\c{C}}aglayan}, title = {Lightweight context-aware security system for wireless Internet access}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {765--766}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346925}, doi = {10.1109/CNS.2015.7346925}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/CantaliEGAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CaoPC15, author = {Yinzhi Cao and Xiang Pan and Yan Chen}, title = {SafePay: Protecting against credit card forgery with existing magnetic card readers}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {164--172}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346825}, doi = {10.1109/CNS.2015.7346825}, timestamp = {Fri, 20 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CaoPC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CarlierSBSMA15, author = {Matthias Carlier and Kris Steenhaut and An Braeken and Ruben Smeets and Nele Mentens and Kris Aerts}, title = {Study on impact of adding security in a 6LoWPAN based network}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {577--584}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346871}, doi = {10.1109/CNS.2015.7346871}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CarlierSBSMA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChandrasekharS15, author = {Santosh Chandrasekhar and Mukesh Singhal}, title = {Efficient and scalable aggregate signcryption scheme based on multi-trapdoor hash functions}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {610--618}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346875}, doi = {10.1109/CNS.2015.7346875}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChandrasekharS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChangHL15, author = {Sang{-}Yoon Chang and Yih{-}Chun Hu and Zhuotao Liu}, title = {Securing wireless medium access control against insider denial-of-service attackers}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {370--378}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346848}, doi = {10.1109/CNS.2015.7346848}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChangHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChatterjeeS15, author = {Ayantika Chatterjee and Indranil Sengupta}, title = {Windowing technique for Lazy Sorting of Encrypted data}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {633--637}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346878}, doi = {10.1109/CNS.2015.7346878}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChatterjeeS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CheaML15, author = {Visal Chea and Miguel Vargas Martin and Ramiro Liscano}, title = {Hamming distance as a metric for the detection of CRC-based side-channel communications in 802.11 wireless networks}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {218--226}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346831}, doi = {10.1109/CNS.2015.7346831}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CheaML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenG15, author = {Yao Chen and Guang Gong}, title = {Integer arithmetic over ciphertext and homomorphic data aggregation}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {628--632}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346877}, doi = {10.1109/CNS.2015.7346877}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChenG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenMP15, author = {Xihui Chen and Andrzej Mizera and Jun Pang}, title = {Activity tracking: {A} new attack on location privacy}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {22--30}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346806}, doi = {10.1109/CNS.2015.7346806}, timestamp = {Sat, 31 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChenMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChoiKC15, author = {SeokHwan Choi and Da{-}Hyeon Kim and Yoon{-}Ho Choi}, title = {Timely login status control using mobile app}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {743--744}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346914}, doi = {10.1109/CNS.2015.7346914}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChoiKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChuatSPLM15, author = {Laurent Chuat and Pawel Szalachowski and Adrian Perrig and Ben Laurie and Eran Messeri}, title = {Efficient gossip protocols for verifying the consistency of Certificate logs}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {415--423}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346853}, doi = {10.1109/CNS.2015.7346853}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ChuatSPLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ClassenSH15, author = {Jiska Classen and Matthias Schulz and Matthias Hollick}, title = {Practical covert channels for WiFi systems}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {209--217}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346830}, doi = {10.1109/CNS.2015.7346830}, timestamp = {Wed, 03 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ClassenSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Clemente15, author = {F{\'{e}}lix J. Garc{\'{\i}}a Clemente}, title = {A privacy-preserving recommender system for mobile commerce}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {725--726}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346905}, doi = {10.1109/CNS.2015.7346905}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Clemente15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CohenHN15, author = {Reuven Cohen and Raziel Hess{-}Green and Gabi Nakibly}, title = {Small lies, lots of damage: a partition attack on link-state routing protocols}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {397--405}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346851}, doi = {10.1109/CNS.2015.7346851}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CohenHN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CompagnoCLLM15, author = {Alberto Compagno and Mauro Conti and Daniele Lain and Giulio Lovisotto and Luigi Vincenzo Mancini}, title = {Boten {ELISA:} {A} novel approach for botnet C{\&}C in Online Social Networks}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {74--82}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346813}, doi = {10.1109/CNS.2015.7346813}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/CompagnoCLLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CorderoVMKHM15, author = {Carlos Garcia Cordero and Emmanouil Vasilomanolakis and Nikolay Milanov and Christian Koch and David Hausheer and Max M{\"{u}}hlh{\"{a}}user}, title = {{ID2T:} {A} {DIY} dataset creation toolkit for Intrusion Detection Systems}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {739--740}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346912}, doi = {10.1109/CNS.2015.7346912}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CorderoVMKHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Costin15, author = {Andrei Costin}, title = {All your cluster-grids are belong to us: Monitoring the (in)security of infrastructure monitoring systems}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {550--558}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346868}, doi = {10.1109/CNS.2015.7346868}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Costin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Cuff15, author = {Paul Cuff}, title = {A stronger soft-covering lemma and applications}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {40--43}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346808}, doi = {10.1109/CNS.2015.7346808}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Cuff15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DrazenEG15, author = {Whitney A. Drazen and Emmanuel Ekwedike and Rosario Gennaro}, title = {Highly scalable verifiable encrypted search}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {497--505}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346862}, doi = {10.1109/CNS.2015.7346862}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DrazenEG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Ducatel15, author = {Gery Ducatel}, title = {Identity as a service: {A} cloud based common capability}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {675--679}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346886}, doi = {10.1109/CNS.2015.7346886}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Ducatel15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/EsayasMSBB15, author = {Samson Yoseph Esayas and Tobias Mahler and Fredrik Seehusen and Frode Bjornstad and Veda Brubakk}, title = {An integrated method for compliance and risk assessment}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {568--576}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346870}, doi = {10.1109/CNS.2015.7346870}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/EsayasMSBB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Espinosa-Aranda15, author = {Jos{\'{e}} Luis Espinosa{-}Aranda and Noelia V{\'{a}}llez and Carlos Sanchez{-}Bueno and Daniel Aguado{-}Araujo and Gloria Bueno Garc{\'{\i}}a and Oscar D{\'{e}}niz}, title = {Pulga, a tiny open-source {MQTT} broker for flexible and secure IoT deployments}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {690--694}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346889}, doi = {10.1109/CNS.2015.7346889}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Espinosa-Aranda15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FanLC15, author = {Jingyao Fan and Qinghua Li and Guohong Cao}, title = {Privacy-aware and trustworthy data aggregation in mobile sensing}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {31--39}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346807}, doi = {10.1109/CNS.2015.7346807}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/FanLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FarhangHZ15, author = {Sadegh Farhang and Yezekael Hayel and Quanyan Zhu}, title = {PHY-layer location privacy-preserving access point selection mechanism in next-generation wireless networks}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {263--271}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346836}, doi = {10.1109/CNS.2015.7346836}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/FarhangHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FisherKZJ15, author = {Andrew Fisher and Carson Kent and David Zage and John Jarocki}, title = {Using linkography to understand cyberattacks}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {290--298}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346839}, doi = {10.1109/CNS.2015.7346839}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/FisherKZJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FoleyN15, author = {Simon N. Foley and Ultan Neville}, title = {A firewall algebra for OpenStack}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {541--549}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346867}, doi = {10.1109/CNS.2015.7346867}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/FoleyN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ForestiPS15, author = {Sara Foresti and Vincenzo Piuri and Gerson Antunes Soares}, title = {On the use of fuzzy logic in dependable cloud management}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {767--768}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346926}, doi = {10.1109/CNS.2015.7346926}, timestamp = {Fri, 12 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ForestiPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ForutanF15, author = {Vahid Forutan and Robert F. H. Fischer}, title = {Security-enhanced network coding through public-key cryptography}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {717--718}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346901}, doi = {10.1109/CNS.2015.7346901}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ForutanF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FunkeDWKM15, author = {Sebastian Funke and J{\"{o}}rg Daubert and Alexander Wiesmaier and Panayotis Kikiras and Max M{\"{u}}hlh{\"{a}}user}, title = {End-2-End privacy architecture for IoT}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {705--706}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346895}, doi = {10.1109/CNS.2015.7346895}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/FunkeDWKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GabryLJ15, author = {Frederic Gabry and Pin{-}Hsun Lin and Eduard A. Jorswieck}, title = {Energy efficiency performance of cooperative schemes in cognitive radio networks with secrecy}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {753--754}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346919}, doi = {10.1109/CNS.2015.7346919}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GabryLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GabryTS15, author = {Frederic Gabry and Ragnar Thobaben and Mikael Skoglund}, title = {Secrecy games in cognitive radio networks with multiple secondary users}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {143--148}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346822}, doi = {10.1109/CNS.2015.7346822}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GabryTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GeramiXSS15, author = {Majid Gerami and Ming Xiao and Somayeh Salimi and Mikael Skoglund}, title = {Secure partial repair in wireless caching networks with broadcast channels}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {353--360}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346846}, doi = {10.1109/CNS.2015.7346846}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GeramiXSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GodefroyTHM15, author = {Erwan Godefroy and Eric Totel and Michel Hurfin and Fr{\'{e}}d{\'{e}}ric Majorczyk}, title = {Generation and assessment of correlation rules to detect complex attack scenarios}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {707--708}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346896}, doi = {10.1109/CNS.2015.7346896}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GodefroyTHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GunluKS15, author = {Onur G{\"{u}}nl{\"{u}} and Gerhard Kramer and Maciej Skorski}, title = {Privacy and secrecy with multiple measurements of physical and biometric identifiers}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {89--94}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346815}, doi = {10.1109/CNS.2015.7346815}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GunluKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HeMJJ15, author = {Ying He and Leandros A. Maglaras and Helge Janicke and Kevin I. Jones}, title = {An Industrial Control Systems incident response decision framework}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {761--762}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346923}, doi = {10.1109/CNS.2015.7346923}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HeMJJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HiranCS15, author = {Rahul Hiran and Niklas Carlsson and Nahid Shahmehri}, title = {Crowd-based detection of routing anomalies on the internet}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {388--396}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346850}, doi = {10.1109/CNS.2015.7346850}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HiranCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HsuL15, author = {Ruei{-}Hau Hsu and Jemin Lee}, title = {Group anonymous {D2D} communication with end-to-end security in {LTE-A}}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {451--459}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346857}, doi = {10.1109/CNS.2015.7346857}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HsuL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HuZL15, author = {Bocan Hu and Yan Zhang and Loukas Lazos}, title = {{PHYVOS:} Physical layer voting for secure and fast cooperation}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {245--253}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346834}, doi = {10.1109/CNS.2015.7346834}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HuZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HuangZG15, author = {Chu Huang and Sencun Zhu and Quanlong Guan}, title = {Multi-objective software assignment for active cyber defense}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {299--307}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346840}, doi = {10.1109/CNS.2015.7346840}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HuangZG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JandaWNBJ15, author = {Carsten Rudolf Janda and Moritz Wiese and Janis N{\"{o}}tzel and Holger Boche and Eduard A. Jorswieck}, title = {Wiretap-channels under constrained active and passive attacks}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {16--21}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346805}, doi = {10.1109/CNS.2015.7346805}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/JandaWNBJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JinZ15, author = {Rong Jin and Kai Zeng}, title = {SecNFC: Securing inductively-coupled Near Field Communication at physical layer}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {149--157}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346823}, doi = {10.1109/CNS.2015.7346823}, timestamp = {Thu, 16 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/JinZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JinZ15a, author = {Rong Jin and Kai Zeng}, title = {Physical layer key agreement under signal injection attacks}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {254--262}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346835}, doi = {10.1109/CNS.2015.7346835}, timestamp = {Thu, 16 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/JinZ15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KaoCHSLLH15, author = {Chia{-}Nan Kao and Yung{-}Cheng Chang and Nen{-}Fu Huang and I. Salim S and I{-}Ju Liao and Rong{-}Tai Liu and Hsien{-}Wei Hung}, title = {A predictive zero-day network defense using long-term port-scan recording}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {695--696}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346890}, doi = {10.1109/CNS.2015.7346890}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KaoCHSLLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KittichokechaiC15, author = {Kittipong Kittichokechai and Giuseppe Caire}, title = {Optimal tradeoff of secure PUF-based authentication}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {83--88}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346814}, doi = {10.1109/CNS.2015.7346814}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KittichokechaiC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KlickLMMR15, author = {Johannes Klick and Stephan Lau and Daniel Marzin and Jan{-}Ole Malchow and Volker Roth}, title = {Internet-facing PLCs as a network backdoor}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {524--532}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346865}, doi = {10.1109/CNS.2015.7346865}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KlickLMMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KotsonS15, author = {Michael C. Kotson and Alexia Schulz}, title = {Characterizing phishing threats with Natural Language Processing}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {308--316}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346841}, doi = {10.1109/CNS.2015.7346841}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KotsonS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LatifT15, author = {Waqas A. Latif and Chiu C. Tan}, title = {SmartArgos: Improving mobile surveillance systems with software defined networks}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {763--764}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346924}, doi = {10.1109/CNS.2015.7346924}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LatifT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LazzerettiP15, author = {Riccardo Lazzeretti and Tommaso Pignata}, title = {Privacy preserving cloud computing through piecewise approximation of multivariate functions}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {515--523}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346864}, doi = {10.1109/CNS.2015.7346864}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LazzerettiP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LeeSSCC15, author = {Changmin Lee and Chen Shen and Gokhan Sahin and Kwanghee Choi and Hyeong{-}Ah Choi}, title = {A novel and scalable communication-history-based Knapsack authentication framework for {IEEE} 802.11 networks}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {44--52}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346809}, doi = {10.1109/CNS.2015.7346809}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LeeSSCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiDC15, author = {QianQian Li and Ding Ding and Mauro Conti}, title = {Brain-Computer Interface applications: Security and privacy challenges}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {663--666}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346884}, doi = {10.1109/CNS.2015.7346884}, timestamp = {Tue, 01 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiDC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiguoriBGKW15, author = {Angelo Liguori and Francesco Benedetto and Gaetano Giunta and Nils Kopal and Arno Wacker}, title = {Analysis and monitoring of hidden {TCP} traffic based on an open-source covert timing channel}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {667--674}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346885}, doi = {10.1109/CNS.2015.7346885}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiguoriBGKW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiuBMC15, author = {Weijie Liu and Rakesh B. Bobba and Sibin Mohan and Roy H. Campbell}, title = {Inter-flow consistency: {A} novel {SDN} update abstraction for supporting inter-flow constraints}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {469--478}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346859}, doi = {10.1109/CNS.2015.7346859}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiuBMC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiuYWWW15, author = {Guangchi Liu and Qing Yang and Honggang Wang and Shaoen Wu and Mike P. Wittie}, title = {Uncovering the mystery of trust in an online social network}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {488--496}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346861}, doi = {10.1109/CNS.2015.7346861}, timestamp = {Fri, 26 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiuYWWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LuoTZSLNM15, author = {Pengkui Luo and Ruben Torres and Zhi{-}Li Zhang and Sabyasachi Saha and Sung{-}Ju Lee and Antonio Nucci and Marco Mellia}, title = {Leveraging client-side {DNS} failure patterns to identify malicious behaviors}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {406--414}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346852}, doi = {10.1109/CNS.2015.7346852}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LuoTZSLNM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MalchowMKKR15, author = {Jan{-}Ole Malchow and Daniel Marzin and Johannes Klick and Robert Kovacs and Volker Roth}, title = {{PLC} Guard: {A} practical defense against attacks on cyber-physical systems}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {326--334}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346843}, doi = {10.1109/CNS.2015.7346843}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MalchowMKKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MalchowR15, author = {Jan{-}Ole Malchow and Volker Roth}, title = {CryptID - distributed identity management infrastructure}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {735--736}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346910}, doi = {10.1109/CNS.2015.7346910}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MalchowR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MattettiSACDF15, author = {Massimiliano Mattetti and Alexandra Shulman{-}Peleg and Yair Allouche and Antonio Corradi and Shlomi Dolev and Luca Foschini}, title = {Securing the infrastructure and the workloads of linux containers}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {559--567}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346869}, doi = {10.1109/CNS.2015.7346869}, timestamp = {Wed, 12 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/MattettiSACDF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MekkyMZ15, author = {Hesham Mekky and Aziz Mohaisen and Zhi{-}Li Zhang}, title = {Separation of benign and malicious network events for accurate malware family classification}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {125--133}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346820}, doi = {10.1109/CNS.2015.7346820}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MekkyMZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MoriyamaY15, author = {Daisuke Moriyama and Moti Yung}, title = {The bright side arguments for the coming smartphones crypto war: The added value of device encryption}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {65--73}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346812}, doi = {10.1109/CNS.2015.7346812}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MoriyamaY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MunozMGH15, author = {Alfonso Mu{\~{n}}oz and Ignacio Mart{\'{\i}}n and Antonio Guzm{\'{a}}n and Jos{\'{e}} Alberto Hern{\'{a}}ndez}, title = {Android malware detection from Google Play meta-data: Selection of important features}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {701--702}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346893}, doi = {10.1109/CNS.2015.7346893}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MunozMGH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MuttiBP15, author = {Simone Mutti and Enrico Bacis and Stefano Paraboschi}, title = {An SELinux-based intent manager for Android}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {747--748}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346916}, doi = {10.1109/CNS.2015.7346916}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MuttiBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MutuSM15, author = {Laura Mutu and Rania Saleh and Ashraf Matrawy}, title = {Improved {SDN} responsiveness to {UDP} flood attacks}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {715--716}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346900}, doi = {10.1109/CNS.2015.7346900}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MutuSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/NaldiD15, author = {Maurizio Naldi and Giuseppe D'Acquisto}, title = {Option pricing in a privacy-aware market}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {759--760}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346922}, doi = {10.1109/CNS.2015.7346922}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/NaldiD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/NaslundDSL15, author = {Mats N{\"{a}}slund and Elena Dubrova and G{\"{o}}ran Selander and Fredrik Lindqvist}, title = {A random access procedure based on tunable puzzles}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {533--540}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346866}, doi = {10.1109/CNS.2015.7346866}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/NaslundDSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/NgSS15, author = {Derrick Wing Kwan Ng and Yan Sun and Robert Schober}, title = {Power efficient and secure full-duplex wireless communication systems}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346803}, doi = {10.1109/CNS.2015.7346803}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/NgSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/OrtizRMIO15, author = {Antonio M. Ortiz and Erkuden Rios and Wissam Mallouli and Eider Iturbe and Edgardo Montes de Oca}, title = {Self-protecting multi-cloud applications}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {643--647}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346880}, doi = {10.1109/CNS.2015.7346880}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/OrtizRMIO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PalmaMGB15, author = {David Palma and Pier Luca Montessoro and Giulia Giordano and Franco Blanchini}, title = {A dynamic algorithm for palmprint recognition}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {659--662}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346883}, doi = {10.1109/CNS.2015.7346883}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PalmaMGB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PapadimitriouPG15, author = {Kyprianos Papadimitriou and Polydoros Petrakis and Miltos D. Grammatikakis and Marcello Coppola}, title = {Security Enhancements for building saturation-free, low-power NoC-based MPSoCs}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {594--600}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346873}, doi = {10.1109/CNS.2015.7346873}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PapadimitriouPG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RassS15, author = {Stefan Rass and Peter Schartner}, title = {Licensed processing of encrypted information}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {703--704}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346894}, doi = {10.1109/CNS.2015.7346894}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/RassS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RenWCC015, author = {Yanzhi Ren and Chen Wang and Yingying Chen and Mooi Choo Chuah and Jie Yang}, title = {Critical segment based real-time E-signature for securing mobile transactions}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {7--15}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346804}, doi = {10.1109/CNS.2015.7346804}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/RenWCC015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RezaeiHSRS15, author = {Fahimeh Rezaei and Michael Hempel and Pradhumna Lai Shrestha and Sushanta Mohan Rakshit and Hamid Sharif}, title = {A novel Covert Timing Channel detection approach for online network traffic}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {737--738}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346911}, doi = {10.1109/CNS.2015.7346911}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/RezaeiHSRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SaikiC15, author = {Cornelius Saiki and Arsenia Chorti}, title = {A novel physical layer authenticated encryption protocol exploiting shared randomness}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {113--118}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346818}, doi = {10.1109/CNS.2015.7346818}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SaikiC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SalimiJSP15, author = {Somayeh Salimi and Eduard A. Jorswieck and Mikael Skoglund and Panos Papadimitratos}, title = {Key agreement over an interference channel with noiseless feedback: Achievable region {\&} distributed allocation}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {59--64}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346811}, doi = {10.1109/CNS.2015.7346811}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SalimiJSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ScaifeCT15, author = {Nolen Scaife and Henry Carter and Patrick Traynor}, title = {OnionDNS: {A} seizure-resistant top-level Domain}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {379--387}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346849}, doi = {10.1109/CNS.2015.7346849}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ScaifeCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SeeberSR15, author = {Sebastian Seeber and Lars Stiemert and Gabi Dreo Rodosek}, title = {Towards an SDN-enabled {IDS} environment}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {751--752}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346918}, doi = {10.1109/CNS.2015.7346918}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SeeberSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShresthaHRS15, author = {Pradhumna Lal Shrestha and Michael Hempel and Fahimeh Rezaei and Hamid Sharif}, title = {A novel analytical model and its test bed verification for network covert timing channels}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {227--235}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346832}, doi = {10.1109/CNS.2015.7346832}, timestamp = {Fri, 23 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ShresthaHRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SteinmetzerCCKH15, author = {Daniel Steinmetzer and Joe Chen and Jiska Classen and Edward W. Knightly and Matthias Hollick}, title = {Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {335--343}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346844}, doi = {10.1109/CNS.2015.7346844}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SteinmetzerCCKH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TaiebC15, author = {Mohamed Haj Taieb and Jean{-}Yves Chouinard}, title = {Reliable and secure communications over Gaussian wiretap channel using {HARQ} {LDPC} codes and error contamination}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {158--163}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346824}, doi = {10.1109/CNS.2015.7346824}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/TaiebC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Tomasin15, author = {Stefano Tomasin}, title = {A Gale-Shapley algorithm for allocation of relayed parallel wiretap coding channels}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {119--124}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346819}, doi = {10.1109/CNS.2015.7346819}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Tomasin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TuLPL15, author = {Guan{-}Hua Tu and Chi{-}Yu Li and Chunyi Peng and Songwu Lu}, title = {How voice call technology poses security threats in 4G {LTE} networks}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {442--450}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346856}, doi = {10.1109/CNS.2015.7346856}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TuLPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Urien15, author = {Pascal Urien}, title = {New direction for open {NFC} trusted mobile applications: The {MOBISIM} project}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {711--712}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346898}, doi = {10.1109/CNS.2015.7346898}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/Urien15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Vasilomanolakis15, author = {Emmanouil Vasilomanolakis and Michael Stahn and Carlos Garcia Cordero and Max M{\"{u}}hlh{\"{a}}user}, title = {Probe-response attacks on collaborative intrusion detection systems: Effectiveness and countermeasures}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {699--700}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346892}, doi = {10.1109/CNS.2015.7346892}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Vasilomanolakis15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Vasilomanolakis15a, author = {Emmanouil Vasilomanolakis and Shreyas Srinivasa and Max M{\"{u}}hlh{\"{a}}user}, title = {Did you really hack a nuclear power plant? An industrial control mobile honeypot}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {729--730}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346907}, doi = {10.1109/CNS.2015.7346907}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Vasilomanolakis15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/VenkatesanAJ15, author = {Sridhar Venkatesan and Massimiliano Albanese and Sushil Jajodia}, title = {Disrupting stealthy botnets through strategic placement of detectors}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {95--103}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346816}, doi = {10.1109/CNS.2015.7346816}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/VenkatesanAJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/VuCASED15, author = {Quang Hieu Vu and Maurizio Colombo and Rasool Asal and Ali Sajjad and Fadi Ali El{-}Moussa and Theo Dimitrakos}, title = {Secure Cloud Storage: {A} framework for Data Protection as a Service in the multi-cloud environment}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {638--642}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346879}, doi = {10.1109/CNS.2015.7346879}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/VuCASED15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/VukovicGD15, author = {Dijana Vukovic and Danilo Gligoroski and Zoran Djuric}, title = {CryptoCloak protocol and the prototype application}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {721--722}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346903}, doi = {10.1109/CNS.2015.7346903}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/VukovicGD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangLGX15, author = {Zhaoguo Wang and Chenglong Li and Yi Guan and Yibo Xue}, title = {DroidChain: {A} novel malware detection method for Android based on behavior chain}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {727--728}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346906}, doi = {10.1109/CNS.2015.7346906}, timestamp = {Tue, 07 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangLGX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangLH15, author = {Bing Wang and Wenjing Lou and Y. Thomas Hou}, title = {Modeling the side-channel attacks in data deduplication with game theory}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {200--208}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346829}, doi = {10.1109/CNS.2015.7346829}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangLTZ15, author = {Yufeng Wang and Waqas Latif and Chiu C. Tan and Yifan Zhang}, title = {Security and privacy for body cameras used in law enforcement}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {173--181}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346826}, doi = {10.1109/CNS.2015.7346826}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangLTZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangLWL15, author = {Boyang Wang and Ming Li and Haitao Wang and Hui Li}, title = {Circular range search on encrypted spatial data}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {182--190}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346827}, doi = {10.1109/CNS.2015.7346827}, timestamp = {Wed, 10 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangLWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangS15, author = {Pengwei Wang and Reihaneh Safavi{-}Naini}, title = {Adversarial wiretap channel with public discussion}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {281--289}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346838}, doi = {10.1109/CNS.2015.7346838}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangW15, author = {Jing Wang and Hongjun Wu}, title = {{URFDS:} Systematic discovery of Unvalidated Redirects and Forwards in web applications}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {697--698}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346891}, doi = {10.1109/CNS.2015.7346891}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/WangW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangYKH15, author = {Qinglong Wang and Amir Yahyavi and Bettina Kemme and Wenbo He}, title = {I know what you did on your smartphone: Inferring app usage over encrypted data traffic}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {433--441}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346855}, doi = {10.1109/CNS.2015.7346855}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangYKH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangZLF15, author = {Kai Wang and Yuqing Zhang and Qixu Liu and Dan Fan}, title = {A fuzzing test for dynamic vulnerability detection on Android Binder mechanism}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {709--710}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346897}, doi = {10.1109/CNS.2015.7346897}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangZLF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XuP15, author = {Yisi Xu and Derek Chi{-}Wai Pao}, title = {Space-time tradeoff in the Aho-Corasick string matching algorithm}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {713--714}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346899}, doi = {10.1109/CNS.2015.7346899}, timestamp = {Thu, 20 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/XuP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YangL15, author = {Lei Yang and Fengjun Li}, title = {mTor: {A} multipath Tor routing beyond bandwidth throttling}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {479--487}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346860}, doi = {10.1109/CNS.2015.7346860}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YangL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YangL15a, author = {Lei Yang and Fengjun Li}, title = {Enhancing traffic analysis resistance for Tor hidden services with multipath routing}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {745--746}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346915}, doi = {10.1109/CNS.2015.7346915}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YangL15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YangO15, author = {Huihui Yang and Vladimir A. Oleshchuk}, title = {Traceable hierarchical attribute-based authentication for the cloud}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {685--689}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346888}, doi = {10.1109/CNS.2015.7346888}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YangO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YangVN15, author = {Y. Yang and Natalija Vlajic and Uyen Trang Nguyen}, title = {Web bots that mimic human browsing behavior on previously unvisited web-sites: Feasibility study and security implications}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {757--758}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346921}, doi = {10.1109/CNS.2015.7346921}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/YangVN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YuanWCWQ15, author = {Xingliang Yuan and Xinyu Wang and Yilei Chu and Cong Wang and Chen Qian}, title = {Towards a scalable, private, and searchable key-value store}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {773--774}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346929}, doi = {10.1109/CNS.2015.7346929}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YuanWCWQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangM15, author = {Liyang Zhang and Tommaso Melodia}, title = {Hammer and anvil: The threat of a cross-layer jamming-aided data control attack in multihop wireless networks}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {361--369}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346847}, doi = {10.1109/CNS.2015.7346847}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZhangM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangP15, author = {Han Zhang and Christos Papadopoulos}, title = {Early detection of high entropy traffic}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {104--112}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346817}, doi = {10.1109/CNS.2015.7346817}, timestamp = {Mon, 16 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZhangP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangSZZ15, author = {Jinxue Zhang and Jingchao Sun and Rui Zhang and Yanchao Zhang}, title = {Your actions tell where you are: Uncovering Twitter users in a metropolitan area}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {424--432}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346854}, doi = {10.1109/CNS.2015.7346854}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhangSZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZorguiRAJA15, author = {Marwen Zorgui and Zouheir Rezki and Basel Alomair and Eduard A. Jorswieck and Mohamed{-}Slim Alouini}, title = {Secret-key agreement over spatially correlated multiple-antenna channels in the low-SNR regime}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {719--720}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346902}, doi = {10.1109/CNS.2015.7346902}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZorguiRAJA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cns/2015, title = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7336674/proceeding}, isbn = {978-1-4673-7876-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/0001S14, author = {Jun Li and Shad Stafford}, title = {Detecting smart, self-propagating Internet worms}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {193--201}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997486}, doi = {10.1109/CNS.2014.6997486}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/0001S14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AbdouMO14, author = {AbdelRahman Abdou and Ashraf Matrawy and Paul C. van Oorschot}, title = {Location verification on the Internet: Towards enforcing location-aware access policies over Internet clients}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {175--183}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997484}, doi = {10.1109/CNS.2014.6997484}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AbdouMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlbaneseBJC14, author = {Massimiliano Albanese and Ermanno Battista and Sushil Jajodia and Valentina Casola}, title = {Manipulating the attacker's view of a system's attack surface}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {472--480}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997517}, doi = {10.1109/CNS.2014.6997517}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlbaneseBJC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AliYAKZ14, author = {Muhammad Qasim Ali and Reza Yousefian and Ehab Al{-}Shaer and Sukumar Kamalasadan and Quanyan Zhu}, title = {Two-tier data-driven intrusion detection for automatic generation control in smart grid}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {292--300}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997497}, doi = {10.1109/CNS.2014.6997497}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AliYAKZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlisPOS14, author = {Jorge Blasco Al{\'{\i}}s and Roberto Di Pietro and Agust{\'{\i}}n Orfila and Alessandro Sorniotti}, title = {A tunable proof of ownership scheme for deduplication using Bloom filters}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {481--489}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997518}, doi = {10.1109/CNS.2014.6997518}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlisPOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlsalehA14, author = {Mohammed Noraden Alsaleh and Ehab Al{-}Shaer}, title = {Security configuration analytics using video games}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {256--264}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997493}, doi = {10.1109/CNS.2014.6997493}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlsalehA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BauerCJPT14, author = {Lujo Bauer and Shaoying Cai and Limin Jia and Timothy Passaro and Yuan Tian}, title = {Analyzing the dangers posed by Chrome extensions}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {184--192}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997485}, doi = {10.1109/CNS.2014.6997485}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BauerCJPT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BeatoCPV14, author = {Filipe Beato and Mauro Conti and Bart Preneel and Dario Vettore}, title = {VirtualFriendship: Hiding interactions on Online Social Networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {328--336}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997501}, doi = {10.1109/CNS.2014.6997501}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BeatoCPV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BorgesBM14, author = {F{\'{a}}bio Borges and Johannes Buchmann and Max M{\"{u}}hlh{\"{a}}user}, title = {Introducing asymmetric DC-Nets}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {508--509}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997528}, doi = {10.1109/CNS.2014.6997528}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/BorgesBM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BorgesM14, author = {F{\'{a}}bio Borges and Leonardo A. Martucci}, title = {iKUP keeps users' privacy in the Smart Grid}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {310--318}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997499}, doi = {10.1109/CNS.2014.6997499}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BorgesM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Braun14, author = {Johannes Braun}, title = {Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {510--511}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997529}, doi = {10.1109/CNS.2014.6997529}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Braun14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CarlsonNHOC14, author = {C. Carlson and Vieny Nguyen and Seth D. Hitefield and Timothy J. O'Shea and T. Charles Clancy}, title = {Measuring smart jammer strategy efficacy over the air}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {7--13}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997459}, doi = {10.1109/CNS.2014.6997459}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CarlsonNHOC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChandrasekharS14, author = {Santosh Chandrasekhar and Mukesh Singhal}, title = {Multi-trapdoor hash functions and their applications in network security}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {463--471}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997516}, doi = {10.1109/CNS.2014.6997516}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChandrasekharS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenG14, author = {Wenji Chen and Yong Guan}, title = {Identifying global hot items in distributed dynamic data streams}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {418--426}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997511}, doi = {10.1109/CNS.2014.6997511}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChenG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenNS14, author = {Kan Chen and Balasubramaniam Natarajan and Steve Shattil}, title = {Relay-based secret key generation in {LTE-A}}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {139--144}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997479}, doi = {10.1109/CNS.2014.6997479}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChenNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenXFY14, author = {Fei Chen and Tao Xiang and Xinwen Fu and Wei Yu}, title = {Towards verifiable file search on the cloud}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {346--354}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997503}, doi = {10.1109/CNS.2014.6997503}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ChenXFY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChouB14, author = {Remi A. Chou and Matthieu R. Bloch}, title = {Uniform distributed source coding for the multiple access wiretap channel}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {127--132}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997477}, doi = {10.1109/CNS.2014.6997477}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChouB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CorellaL14, author = {Francisco Corella and Karen Pomian Lewison}, title = {Identity-based protocol design patterns for machine-to-machine secure channels}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {91--96}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997471}, doi = {10.1109/CNS.2014.6997471}, timestamp = {Mon, 02 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CorellaL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CuiY14, author = {Biru Cui and Shanchieh Jay Yang}, title = {{NRE:} Suppress Selective Forwarding attacks in Wireless Sensor Networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {229--237}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997490}, doi = {10.1109/CNS.2014.6997490}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CuiY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Draper-GilFHT14, author = {Gerard Draper{-}Gil and Josep Llu{\'{\i}}s Ferrer{-}Gomila and M. Francisca Hinarejos and Arne Tauber}, title = {An optimistic certified e-mail protocol for the current Internet e-mail architecture}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {382--390}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997507}, doi = {10.1109/CNS.2014.6997507}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/Draper-GilFHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FontBBH14, author = {Giselle Font and Javier Bustos{-}Jim{\'{e}}nez and Sebastian Blasco and Alejandro Hevia}, title = {Location privacy for a quality of access to mobile Internet monitoring system}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {518--519}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997533}, doi = {10.1109/CNS.2014.6997533}, timestamp = {Tue, 12 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/FontBBH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GarnaevT14, author = {Andrey Garnaev and Wade Trappe}, title = {Bandwidth scanning involving a Bayesian approach to adapting the belief of an adversary's presence}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {35--43}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997463}, doi = {10.1109/CNS.2014.6997463}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GarnaevT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GermanusRSS14, author = {Daniel Germanus and Stefanie Roos and Thorsten Strufe and Neeraj Suri}, title = {Mitigating Eclipse attacks in Peer-To-Peer networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {400--408}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997509}, doi = {10.1109/CNS.2014.6997509}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GermanusRSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GungorK14, author = {Onur G{\"{u}}ng{\"{o}}r and Can Emre Koksal}, title = {RF-fingerprint based authentication: Exponents and achievable rates}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {97--102}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997472}, doi = {10.1109/CNS.2014.6997472}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GungorK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HarrisonB14, author = {Willie K. Harrison and Parker Boyce}, title = {Parity modifications and stopping sets in high-rate codes for physical-layer security}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {115--120}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997475}, doi = {10.1109/CNS.2014.6997475}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HarrisonB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HeDHWSN14, author = {Xiaofan He and Huaiyu Dai and Yufan Huang and Dong Wang and Wenbo Shen and Peng Ning}, title = {The security of link signature: {A} view from channel models}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {103--108}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997473}, doi = {10.1109/CNS.2014.6997473}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HeDHWSN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HitefieldNCOC14, author = {Seth D. Hitefield and Vieny Nguyen and C. Carlson and Timothy J. O'Shea and T. Charles Clancy}, title = {Demonstrated LLC-layer attack and defense strategies for wireless communication systems}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {60--66}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997466}, doi = {10.1109/CNS.2014.6997466}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HitefieldNCOC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/IglesiasZ14, author = {F{\'{e}}lix Iglesias and Tanja Zseby}, title = {Modelling {IP} darkspace traffic by means of clustering techniques}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {166--174}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997483}, doi = {10.1109/CNS.2014.6997483}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/IglesiasZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JinMAS14, author = {Zituo Jin and J. P. Morgan and Santhanakrishnan Anand and K. P. Subbalakshmi}, title = {{NEAT:} {A} NEighbor AssisTed spectrum decision protocol for resilience against {PUEA}}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {44--52}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997464}, doi = {10.1109/CNS.2014.6997464}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/JinMAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JinSZPM14, author = {Rong Jin and Liu Shi and Kai Zeng and Amit Pande and Prasant Mohapatra}, title = {MagPairing: Exploiting magnetometers for pairing smartphones in close proximity}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {445--453}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997514}, doi = {10.1109/CNS.2014.6997514}, timestamp = {Thu, 16 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/JinSZPM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Kim14, author = {Sang Wu Kim}, title = {Physical integrity check in wireless relay networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {514--515}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997531}, doi = {10.1109/CNS.2014.6997531}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Kim14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KimDT14, author = {Yu Seung Kim and Bruce DeBruhl and Patrick Tague}, title = {{JADE:} Jamming-averse routing on cognitive radio mesh networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {21--28}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997461}, doi = {10.1109/CNS.2014.6997461}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KimDT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KimTNT14, author = {Yu Seung Kim and Yuan Tian and Le T. Nguyen and Patrick Tague}, title = {LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {427--435}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997512}, doi = {10.1109/CNS.2014.6997512}, timestamp = {Wed, 08 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KimTNT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KrimmlingP14, author = {Jana Krimmling and Steffen Peter}, title = {Integration and evaluation of intrusion detection for CoAP in smart city applications}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {73--78}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997468}, doi = {10.1109/CNS.2014.6997468}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KrimmlingP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KwonJLL14, author = {Jonghoon Kwon and Jihwan Jeong and Jehyun Lee and Heejo Lee}, title = {DroidGraph: discovering Android malware by analyzing semantic behavior}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {498--499}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997523}, doi = {10.1109/CNS.2014.6997523}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KwonJLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LeeZCC14, author = {Changmin Lee and Luca Zappaterra and Kwanghee Choi and Hyeong{-}Ah Choi}, title = {Securing smart home: Technologies, security challenges, and security requirements}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {67--72}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997467}, doi = {10.1109/CNS.2014.6997467}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LeeZCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiVHWZ14, author = {Bing Li and Ashwin Prabhu Verleker and Dijiang Huang and Zhijie Wang and Yan Zhu}, title = {Attribute-based access control for {ICN} naming scheme}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {391--399}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997508}, doi = {10.1109/CNS.2014.6997508}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiVHWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiZTJ14, author = {Longquan Li and Sencun Zhu and Don J. Torrieri and Sushil Jajodia}, title = {Self-healing wireless networks under insider jamming attacks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {220--228}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997489}, doi = {10.1109/CNS.2014.6997489}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiZTJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LinJ14, author = {Pin{-}Hsun Lin and Eduard A. Jorswieck}, title = {On the fading Gaussian wiretap channel with statistical channel state information at transmitter}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {121--126}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997476}, doi = {10.1109/CNS.2014.6997476}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LinJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LuZCS14, author = {Xiaoyan Lu and Michael Zuba and Jun{-}Hong Cui and Zhijie Jerry Shi}, title = {Uncooperative localization improves attack performance in Underwater Acoustic Networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {454--462}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997515}, doi = {10.1109/CNS.2014.6997515}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LuZCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MaJWWGC14, author = {Ting Ma and Yixin Jiang and Hong Wen and Bin Wu and Xiaobin Guo and Zhen Chen}, title = {Physical Layer Assist Mutual Authentication scheme for smart meter system}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {494--495}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997521}, doi = {10.1109/CNS.2014.6997521}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MaJWWGC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MarchettaPP14, author = {Pietro Marchetta and Valerio Persico and Antonio Pescap{\`{e}}}, title = {The Greenhouse Effect Attack}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {516--517}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997532}, doi = {10.1109/CNS.2014.6997532}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/MarchettaPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MarttinenWJ14, author = {Aleksi Marttinen and Alexander M. Wyglinski and Riku J{\"{a}}ntti}, title = {Moving-target defense mechanisms against source-selective jamming attacks in tactical cognitive radio MANETs}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {14--20}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997460}, doi = {10.1109/CNS.2014.6997460}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MarttinenWJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MohaisenWMA14, author = {Aziz Mohaisen and Andrew G. West and Allison Mankin and Omar Alrawi}, title = {Chatter: Classifying malware families using system event ordering}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {283--291}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997496}, doi = {10.1109/CNS.2014.6997496}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MohaisenWMA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MunozMM14, author = {Melesio Calderon Munoz and Melody Moh and Teng{-}Sheng Moh}, title = {Improving smart grid security using Merkle Trees}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {522--523}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997535}, doi = {10.1109/CNS.2014.6997535}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MunozMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MustafaX14, author = {Hossen Asiful Mustafa and Wenyuan Xu}, title = {{CETAD:} Detecting evil twin access point attacks in wireless hotspots}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {238--246}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997491}, doi = {10.1109/CNS.2014.6997491}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MustafaX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/NingSMKCM14, author = {Jianxia Ning and Indrajeet Singh and Harsha V. Madhyastha and Srikanth V. Krishnamurthy and Guohong Cao and Prasant Mohapatra}, title = {Secret message sharing using online social media}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {319--327}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997500}, doi = {10.1109/CNS.2014.6997500}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/NingSMKCM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/NotraSGSB14, author = {Sukhvir Notra and Muhammad Siddiqi and Hassan Habibi Gharakheili and Vijay Sivaraman and Roksana Boreli}, title = {An experimental study of security and privacy risks with emerging household appliances}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {79--84}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997469}, doi = {10.1109/CNS.2014.6997469}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/NotraSGSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Onishi14, author = {Hiro Onishi}, title = {Approaches for vehicle cyber security}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {506--507}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997527}, doi = {10.1109/CNS.2014.6997527}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Onishi14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ParkLS14, author = {Young{-}Hoon Park and Eun{-}Dong Lee and Seung{-}Woo Seo}, title = {Lightweight (k, n)-file sharing scheme for distributed storages with diverse communication capacities}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {373--381}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997506}, doi = {10.1109/CNS.2014.6997506}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ParkLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ProbstPK14, author = {Matthew J. Probst and Jun Cheol Park and Sneha Kumar Kasera}, title = {Exploiting altruism in social networks for friend-to-friend malware detection}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {274--282}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997495}, doi = {10.1109/CNS.2014.6997495}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ProbstPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RefaeyNWC14, author = {Ahmed Refaey and Raheleh Niati and Xianbin Wang and Jean{-}Yves Chouinard}, title = {Blind detection approach for LDPC, convolutional, and turbo codes in non-noisy environment}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {502--503}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997525}, doi = {10.1109/CNS.2014.6997525}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/RefaeyNWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RehmanSAA14, author = {Saeed Ur Rehman and Kevin W. Sowerby and Shafiq Alam and Iman Tabatabaei Ardekani}, title = {Portability of an {RF} fingerprint of a wireless transmitter}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {151--156}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997481}, doi = {10.1109/CNS.2014.6997481}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/RehmanSAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RehmanSAA14a, author = {Saeed Ur Rehman and Kevin W. Sowerby and Shafiq Alam and Iman Tabatabaei Ardekani}, title = {Radio frequency fingerprinting and its challenges}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {496--497}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997522}, doi = {10.1109/CNS.2014.6997522}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/RehmanSAA14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RenJGHWWC14, author = {Mengyin Ren and Yixin Jiang and Xiaobin Guo and Qiyi Han and Hong Wen and Bin Wu and Zhen Chen}, title = {{P2P} networks monitoring based on the social network analysis and the topological potential}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {492--493}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997520}, doi = {10.1109/CNS.2014.6997520}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/RenJGHWWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Saint-PierreCB14, author = {Cecilia Saint{-}Pierre and Francisco Cifuentes and Javier Bustos{-}Jim{\'{e}}nez}, title = {Detecting anomalies in {DNS} protocol traces via Passive Testing and Process Mining}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {520--521}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997534}, doi = {10.1109/CNS.2014.6997534}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Saint-PierreCB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SamaniJSG14, author = {Elaheh Biglar Beigi Samani and Hossein Hadian Jazi and Natalia Stakhanova and Ali A. Ghorbani}, title = {Towards effective feature selection in machine learning-based botnet detection approaches}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {247--255}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997492}, doi = {10.1109/CNS.2014.6997492}, timestamp = {Mon, 14 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SamaniJSG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SchaeferP14, author = {Rafael F. Schaefer and H. Vincent Poor}, title = {On secure communication over multiple access wiretap channels under channel uncertainty}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {109--114}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997474}, doi = {10.1109/CNS.2014.6997474}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SchaeferP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShaoZCX14, author = {Yiyang Shao and Luoshi Zhang and Xiaoxian Chen and Yibo Xue}, title = {Towards time-varying classification based on traffic pattern}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {512--513}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997530}, doi = {10.1109/CNS.2014.6997530}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ShaoZCX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShenNHDL14, author = {Wenbo Shen and Peng Ning and Xiaofan He and Huaiyu Dai and Yao Liu}, title = {{MCR} Decoding: {A} {MIMO} approach for defending against wireless jamming attacks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {133--138}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997478}, doi = {10.1109/CNS.2014.6997478}, timestamp = {Sat, 24 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ShenNHDL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SibomanaZT14, author = {Louis Sibomana and Hans{-}J{\"{u}}rgen Zepernick and Hung Tran}, title = {Achievable secrecy capacity in an underlay cognitive radio network}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997458}, doi = {10.1109/CNS.2014.6997458}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SibomanaZT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Sodagari14, author = {Shabnam Sodagari}, title = {Secure distributed spectrum sensing in cognitive radio networks using multi-armed bandits}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {29--34}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997462}, doi = {10.1109/CNS.2014.6997462}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Sodagari14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/StevanovicV14, author = {Dusan Stevanovic and Natalija Vlajic}, title = {Application-layer DDoS in dynamic Web-domains: Building defenses against next-generation attack behavior}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {490--491}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997519}, doi = {10.1109/CNS.2014.6997519}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/StevanovicV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Sun0ZZ14, author = {Jingchao Sun and Rui Zhang and Jinxue Zhang and Yanchao Zhang}, title = {TouchIn: Sightless two-factor authentication on multi-touch mobile devices}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {436--444}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997513}, doi = {10.1109/CNS.2014.6997513}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Sun0ZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TangSPWWJGC14, author = {Jie Tang and Huanhuan Song and Fei Pan and Hong Wen and Bin Wu and Yixin Jiang and Xiaobin Guo and Zhen Chen}, title = {A {MIMO} cross-layer precoding security communication system}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {500--501}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997524}, doi = {10.1109/CNS.2014.6997524}, timestamp = {Tue, 24 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TangSPWWJGC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TianDBD14, author = {Guanyu Tian and Zhenhai Duan and Todd Baumeister and Yingfei Dong}, title = {Reroute on loop in anonymous peer-to-peer content sharing networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {409--417}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997510}, doi = {10.1109/CNS.2014.6997510}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TianDBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/UluagacLB14, author = {A. Selcuk Uluagac and Wenyi Liu and Raheem A. Beyah}, title = {A multi-factor re-authentication framework with user privacy}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {504--505}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997526}, doi = {10.1109/CNS.2014.6997526}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/UluagacLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/UluagacSB14, author = {A. Selcuk Uluagac and Venkatachalam Subramanian and Raheem A. Beyah}, title = {Sensory channel threats to Cyber Physical Systems: {A} wake-up call}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {301--309}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997498}, doi = {10.1109/CNS.2014.6997498}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/UluagacSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/UludagLRN14, author = {Suleyman Uludag and King{-}Shan Lui and Wenyu Ren and Klara Nahrstedt}, title = {Practical and secure Machine-to-Machine data collection protocol in Smart Grid}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {85--90}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997470}, doi = {10.1109/CNS.2014.6997470}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/UludagLRN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/VimercatiFJLPS14, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Stefano Paraboschi and Pierangela Samarati}, title = {Integrity for distributed queries}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {364--372}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997505}, doi = {10.1109/CNS.2014.6997505}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/VimercatiFJLPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangC14, author = {Ji Wang and Ing{-}Ray Chen}, title = {Trust-based data fusion mechanism design in cognitive radio networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {53--59}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997465}, doi = {10.1109/CNS.2014.6997465}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangLC014, author = {Boyang Wang and Ming Li and Sherman S. M. Chow and Hui Li}, title = {A tale of two clouds: Computing on data encrypted under multiple keys}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {337--345}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997502}, doi = {10.1109/CNS.2014.6997502}, timestamp = {Wed, 19 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/WangLC014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangWN14, author = {Chaofeng Wang and Zhaohui Wang and Saeid Nooshabadi}, title = {Signal alignment for secure underwater coordinated multipoint transmissions}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {145--150}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997480}, doi = {10.1109/CNS.2014.6997480}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangWN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XuZXY14, author = {Li Xu and Zhenxin Zhan and Shouhuai Xu and Keying Ye}, title = {An evasion and counter-evasion study in malicious websites detection}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {265--273}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997494}, doi = {10.1109/CNS.2014.6997494}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/XuZXY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YoungY14, author = {Adam L. Young and Moti Yung}, title = {The drunk motorcyclist protocol for anonymous communication}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {157--165}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997482}, doi = {10.1109/CNS.2014.6997482}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YoungY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZengRY14, author = {Kexiong Curtis Zeng and Sreeraksha Kondaji Ramesh and Yaling Yang}, title = {Location spoofing attack and its countermeasures in database-driven cognitive radio networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {202--210}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997487}, doi = {10.1109/CNS.2014.6997487}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZengRY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangLJH14, author = {Ning Zhang and Wenjing Lou and Xuxian Jiang and Y. Thomas Hou}, title = {Enabling Trusted Data-intensive execution in cloud computing}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {355--363}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997504}, doi = {10.1109/CNS.2014.6997504}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhangLJH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhengWC014, author = {Xiuyuan Zheng and Chen Wang and Yingying Chen and Jie Yang}, title = {Accurate rogue access point localization leveraging fine-grained channel information}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {211--219}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997488}, doi = {10.1109/CNS.2014.6997488}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhengWC014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cns/2014, title = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6982337/proceeding}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/0002GR13, author = {Robert Koch and Mario Golling and Gabi Dreo Rodosek}, title = {An architecture for supervising {COTS} products}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {403--404}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682749}, doi = {10.1109/CNS.2013.6682749}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/0002GR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/0002GR13a, author = {Robert Koch and Mario Golling and Gabi Dreo Rodosek}, title = {Attracting sophisticated attacks to secure systems: {A} new honeypot architecture}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {409--410}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682752}, doi = {10.1109/CNS.2013.6682752}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/0002GR13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/0002KB13, author = {Aditi Gupta and Michael S. Kirkpatrick and Elisa Bertino}, title = {A secure architecture design based on application isolation, code minimization and randomization}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {423--429}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682756}, doi = {10.1109/CNS.2013.6682756}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/0002KB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlbaneseBJS13, author = {Massimiliano Albanese and Alessandra De Benedictis and Sushil Jajodia and Kun Sun}, title = {A moving target defense mechanism for MANETs based on identity virtualization}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {278--286}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682717}, doi = {10.1109/CNS.2013.6682717}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlbaneseBJS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlsalehAA13, author = {Mohammed Noraden Alsaleh and Saeed Al{-}Haj and Ehab Al{-}Shaer}, title = {Objective metrics for firewall security: {A} holistic view}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {470--477}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682762}, doi = {10.1109/CNS.2013.6682762}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlsalehAA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AtighetchiSPLSG13, author = {Michael Atighetchi and Nathaniel Soule and Partha P. Pal and Joseph P. Loyall and Asher Sinclair and Robert Grant}, title = {Safe configuration of {TLS} connections}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {415--422}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682755}, doi = {10.1109/CNS.2013.6682755}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AtighetchiSPLSG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BhuiyanMLH13, author = {Mansurul Bhuiyan and Aziz Mohaisen and Yannis Labrou and Mohammad Al Hasan}, title = {Characterization of the dynamics and interactions of domain names and name server}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {387--388}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682741}, doi = {10.1109/CNS.2013.6682741}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BhuiyanMLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BijonKS13, author = {Khalid Zaman Bijon and Ram Krishnan and Ravi S. Sandhu}, title = {A framework for risk-aware role based access control}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {462--469}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682761}, doi = {10.1109/CNS.2013.6682761}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BijonKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CallegariCGPP13, author = {Christian Callegari and Alessandro Casella and Stefano Giordano and Michele Pagano and Teresa Pepe}, title = {Sketch-based multidimensional {IDS:} {A} new approach for network anomaly detection}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {350--358}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682725}, doi = {10.1109/CNS.2013.6682725}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CallegariCGPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenHJS13, author = {Zhigang Chen and Xin Hu and Xiaoen Ju and Kang G. Shin}, title = {{LISA:} Location information ScrAmbler for privacy protection on smartphones}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {296--304}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682719}, doi = {10.1109/CNS.2013.6682719}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChenHJS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChengTLLLCTY13, author = {Ray{-}Guang Cheng and Po{-}Yao Tsai and Ping{-}Chen Lin and Chia{-}Liang Lian and Tse{-}Han Liu and Hsien{-}Cheng Chou and Shiao{-}Li Tsao and Shanchieh Jay Yang}, title = {Design and implementation of a Skype Protocol Analyzer}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {375--376}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682735}, doi = {10.1109/CNS.2013.6682735}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChengTLLLCTY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChoiS13, author = {Sunghyun Choi and Kang G. Shin}, title = {Secure cooperative spectrum sensing in cognitive radio networks using interference signatures}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {19--27}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682688}, doi = {10.1109/CNS.2013.6682688}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ChoiS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CollbergGMSHS13, author = {Christian S. Collberg and Aaron Gibson and Sam Martin and Nitin Shinde and Amir Herzberg and Haya Schulmann}, title = {Provenance of exposure: Identifying sources of leaked documents}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {367--368}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682731}, doi = {10.1109/CNS.2013.6682731}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CollbergGMSHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Doerr13, author = {Christian Doerr}, title = {Challenge tracing and mitigation under partial information and uncertainty}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {446--453}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682759}, doi = {10.1109/CNS.2013.6682759}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Doerr13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DuY13, author = {Haitao Du and Shanchieh Jay Yang}, title = {Sequential modeling for obfuscated network attack action sequences}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {389--390}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682742}, doi = {10.1109/CNS.2013.6682742}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DuY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DuanAJ13, author = {Qi Duan and Ehab Al{-}Shaer and Jafar Haadi Jafarian}, title = {Efficient Random Route Mutation considering flow and network constraints}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {260--268}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682715}, doi = {10.1109/CNS.2013.6682715}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DuanAJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ElicesP13, author = {Juan A. Elices and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Locating Tor hidden services through an interval-based traffic-correlation attack}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {385--386}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682740}, doi = {10.1109/CNS.2013.6682740}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ElicesP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FitzgeraldF13, author = {William M. Fitzgerald and Simon N. Foley}, title = {Avoiding inconsistencies in the Security Content Automation Protocol}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {454--461}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682760}, doi = {10.1109/CNS.2013.6682760}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/FitzgeraldF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FrancoisSE13, author = {J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and Radu State and Thomas Engel}, title = {Aggregated representations and metrics for scalable flow analysis}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {478--482}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682763}, doi = {10.1109/CNS.2013.6682763}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/FrancoisSE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GuanWST13, author = {Kyle Guan and Peter J. Winzer and Emina Soljanin and Antonia M. Tulino}, title = {On the secrecy capacity of the space-division multiplexed fiber optical communication systems}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {207--214}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682709}, doi = {10.1109/CNS.2013.6682709}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GuanWST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GuoZF13, author = {Linke Guo and Chi Zhang and Yuguang Fang}, title = {Privacy-preserving revocable content sharing in geosocial networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {118--126}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682699}, doi = {10.1109/CNS.2013.6682699}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/GuoZF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GustafsonL13, author = {Jason Gustafson and Jun Li}, title = {Leveraging the crowds to disrupt phishing}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {82--90}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682695}, doi = {10.1109/CNS.2013.6682695}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GustafsonL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GwonDFK13, author = {Youngjune Gwon and Siamak Dastangoo and Carl Fossa and H. T. Kung}, title = {Competing Mobile Network Game: Embracing antijamming and jamming strategies with reinforcement learning}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {28--36}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682689}, doi = {10.1109/CNS.2013.6682689}, timestamp = {Tue, 28 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GwonDFK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HalfordCC13, author = {Thomas R. Halford and Thomas A. Courtade and Keith M. Chugg}, title = {Energy-efficient, secure group key agreement for ad hoc networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {181--188}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682706}, doi = {10.1109/CNS.2013.6682706}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HalfordCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HanYZWXZJG13, author = {Qiyi Han and Lin Yu and Rui Zhang and Hong Wen and Yuanpeng Xie and Xiping Zhu and Yixin Jiang and Xiaobin Guo}, title = {A {P2P} recommended trust nodes selection algorithm based on topological potential}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {395--396}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682745}, doi = {10.1109/CNS.2013.6682745}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HanYZWXZJG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HeDN13, author = {Xiaofan He and Huaiyu Dai and Peng Ning}, title = {Dynamic adaptive anti-jamming via controlled mobility}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {1--9}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682686}, doi = {10.1109/CNS.2013.6682686}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HeDN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HerzbergS13, author = {Amir Herzberg and Haya Schulmann}, title = {Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {224--232}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682711}, doi = {10.1109/CNS.2013.6682711}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HerzbergS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HerzbergS13a, author = {Amir Herzberg and Haya Schulmann}, title = {{DNSSEC:} Security and availability challenges}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {365--366}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682730}, doi = {10.1109/CNS.2013.6682730}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HerzbergS13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HsiaoCSC13, author = {Shun{-}Wen Hsiao and Yi{-}Ning Chen and Yeali S. Sun and Meng Chang Chen}, title = {A cooperative botnet profiling and detection in virtualized environment}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {154--162}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682703}, doi = {10.1109/CNS.2013.6682703}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/HsiaoCSC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HuCTW13, author = {Kekai Hu and Harikrishnan Chandrikakutty and Russell Tessier and Tilman Wolf}, title = {Scalable hardware monitors to protect network processors from data plane attacks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {314--322}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682721}, doi = {10.1109/CNS.2013.6682721}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HuCTW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JajodiaLT13, author = {Sushil Jajodia and Wenjing Lou and Wade Trappe}, title = {Welcome message}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {1--2}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682675}, doi = {10.1109/CNS.2013.6682675}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/JajodiaLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JiangGLWLR13, author = {Yixin Jiang and Xiaobin Guo and Chao Li and Hong Wen and Cai Lei and Zhang Rui}, title = {An efficient and secure search database scheme for cloud computing in smart grid}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {413--414}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682754}, doi = {10.1109/CNS.2013.6682754}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/JiangGLWLR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KhiabaniW13, author = {Yahya Sowti Khiabani and Shuangqing Wei}, title = {Exponential secrecy against unbounded adversary using joint encryption and privacy amplification}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {198--206}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682708}, doi = {10.1109/CNS.2013.6682708}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KhiabaniW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KhouryLBBC13, author = {Hicham El Khoury and Romain Laborde and Fran{\c{c}}ois Barr{\`{e}}re and Abdelmalek Benzekri and Maroun Chamoun}, title = {A specification method for analyzing fine grained network security mechanism configurations}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {483--487}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682764}, doi = {10.1109/CNS.2013.6682764}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KhouryLBBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KienzleEE13, author = {Darrell M. Kienzle and Nathan S. Evans and Matthew C. Elder}, title = {{NICE:} Network Introspection by Collaborating Endpoints}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {411--412}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682753}, doi = {10.1109/CNS.2013.6682753}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KienzleEE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KirazL13, author = {Osman Kiraz and Albert Levi}, title = {Maintaining trajectory privacy in mobile wireless sensor networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {401--402}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682748}, doi = {10.1109/CNS.2013.6682748}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KirazL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KosbaMWT13, author = {Ahmed E. Kosba and Aziz Mohaisen and Andrew G. West and Trevor Tonn}, title = {{ADAM:} Automated detection and attribution of malicious webpages}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {399--400}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682747}, doi = {10.1109/CNS.2013.6682747}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KosbaMWT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Kumar0CB13, author = {Vireshwar Kumar and Jung{-}Min Park and T. Charles Clancy and Kaigui Bian}, title = {PHY-layer authentication by introducing controlled inter symbol interference}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {10--18}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682687}, doi = {10.1109/CNS.2013.6682687}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Kumar0CB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiDN13, author = {Hongyang Li and Gy{\"{o}}rgy D{\'{a}}n and Klara Nahrstedt}, title = {{FADEC:} Fast authentication for dynamic electric vehicle charging}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {369--370}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682732}, doi = {10.1109/CNS.2013.6682732}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiDN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiMC13, author = {Liyun Li and Suhas Mathur and Baris Coskun}, title = {Gangs of the internet: Towards automatic discovery of peer-to-peer communities}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {64--72}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682693}, doi = {10.1109/CNS.2013.6682693}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiMC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiSPZL13, author = {Huian Li and Yan Sui and Wei Peng and Xukai Zou and Feng Li}, title = {A viewable e-voting scheme for environments with conflict of interest}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {251--259}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682714}, doi = {10.1109/CNS.2013.6682714}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiSPZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiaoUB13, author = {Xiaojing Liao and A. Selcuk Uluagac and Raheem A. Beyah}, title = {S-Match: An efficient privacy-preserving profile matching scheme}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {377--378}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682736}, doi = {10.1109/CNS.2013.6682736}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiaoUB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Limthong13, author = {Kriangkrai Limthong}, title = {Performance of interval-based features for anomaly detection in network traffic}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {361--362}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682727}, doi = {10.1109/CNS.2013.6682727}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Limthong13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiuCCY13, author = {Hongbo Liu and Yingying Chen and Mooi Choo Chuah and Jie Yang}, title = {Towards self-healing smart grid via intelligent local controller switching under jamming}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {127--135}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682700}, doi = {10.1109/CNS.2013.6682700}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiuCCY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiuCG13, author = {Yang Liu and Wenji Chen and Yong Guan}, title = {Identifying high-cardinality hosts from network-wide traffic measurements}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {287--295}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682718}, doi = {10.1109/CNS.2013.6682718}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiuCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiyanageYG13, author = {Madhusanka Liyanage and Mika Ylianttila and Andrei V. Gurtov}, title = {Secure hierarchical Virtual Private {LAN} Services for provider provisioned networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {233--241}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682712}, doi = {10.1109/CNS.2013.6682712}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiyanageYG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MellH13, author = {Peter Mell and Richard E. Harang}, title = {Limitations to threshold random walk scan detection and mitigating enhancements}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {332--340}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682723}, doi = {10.1109/CNS.2013.6682723}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MellH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MohaisenAWM13, author = {Aziz Mohaisen and Omar Alrawi and Andrew G. West and Allison Mankin}, title = {Babble: Identifying malware by its dialects}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {407--408}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682751}, doi = {10.1109/CNS.2013.6682751}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/MohaisenAWM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MoskalKHWYK13, author = {Stephen Moskal and Derek Kreider and Lydia Hays and Ben Wheeler and Shanchieh Jay Yang and Michael E. Kuhl}, title = {Simulating attack behaviors in enterprise networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {359--360}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682726}, doi = {10.1109/CNS.2013.6682726}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MoskalKHWYK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/NicanfarHATL13, author = {Hasen Nicanfar and Javad Hajipour and Farshid Agharebparast and Peyman TalebiFard and Victor C. M. Leung}, title = {Privacy-preserving handover mechanism in 4G}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {373--374}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682734}, doi = {10.1109/CNS.2013.6682734}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/NicanfarHATL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PengLHZ013, author = {Wei Peng and Feng Li and Keesook J. Han and Xukai Zou and Jie Wu}, title = {T-dominance: Prioritized defense deployment for {BYOD} security}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {37--45}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682690}, doi = {10.1109/CNS.2013.6682690}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/PengLHZ013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PerlmanK13, author = {Radia J. Perlman and Charlie Kaufman}, title = {Byzantine robustness, hierarchy, and scalability}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {242--250}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682713}, doi = {10.1109/CNS.2013.6682713}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PerlmanK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PieczulF13, author = {Olgierd Pieczul and Simon N. Foley}, title = {Discovering emergent norms in security logs}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {438--445}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682758}, doi = {10.1109/CNS.2013.6682758}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/PieczulF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PortnoiS13, author = {Marcos Portnoi and Chien{-}Chung Shen}, title = {Secure Zones: An Attribute-Based Encryption advisory system for safe firearms}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {397--398}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682746}, doi = {10.1109/CNS.2013.6682746}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PortnoiS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PortnoiS13a, author = {Marcos Portnoi and Chien{-}Chung Shen}, title = {Location-aware sign-on and key exchange using attribute-based encryption and Bluetooth beacons}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {405--406}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682750}, doi = {10.1109/CNS.2013.6682750}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PortnoiS13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RahmanMA13, author = {Mohammad Ashiqur Rahman and Mohammad Hossein Manshaei and Ehab Al{-}Shaer}, title = {A game-theoretic approach for deceiving Remote Operating System Fingerprinting}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {73--81}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682694}, doi = {10.1109/CNS.2013.6682694}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/RahmanMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Safavi-NainiW13, author = {Reihaneh Safavi{-}Naini and Pengwei Wang}, title = {Efficient codes for Limited View adversarial channels}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {215--223}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682710}, doi = {10.1109/CNS.2013.6682710}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Safavi-NainiW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SanatiniaNN13, author = {Amirali Sanatinia and Sashank Narain and Guevara Noubir}, title = {Wireless spreading of WiFi APs infections using {WPS} flaws: An epidemiological and experimental study}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {430--437}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682757}, doi = {10.1109/CNS.2013.6682757}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SanatiniaNN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SankaranS13, author = {Sriram Sankaran and Ramalingam Sridhar}, title = {User-adaptive energy-aware security for mobile devices}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {391--392}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682743}, doi = {10.1109/CNS.2013.6682743}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SankaranS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SarikayaEG13, author = {Yunus Sarikaya and {\"{O}}zg{\"{u}}r Er{\c{c}}etin and {\"{O}}zg{\"{u}}r G{\"{u}}rb{\"{u}}z}, title = {Dynamic control for cooperative jamming with a non-altruistic node}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {381--382}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682738}, doi = {10.1109/CNS.2013.6682738}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SarikayaEG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShinKYLBZ13, author = {Dong{-}Hoon Shin and Jinkyu Koo and Lei Yang and Xiaojun Lin and Saurabh Bagchi and Junshan Zhang}, title = {Low-complexity secure protocols to defend cyber-physical systems against network isolation attacks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {91--99}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682696}, doi = {10.1109/CNS.2013.6682696}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ShinKYLBZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Stelte13, author = {Bj{\"{o}}rn Stelte}, title = {{ISP} traceback - Attack path detection}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {363--364}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682728}, doi = {10.1109/CNS.2013.6682728}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Stelte13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TalamoASD13, author = {Maurizio Talamo and Franco Arcieri and Christian H. Schunck and Andrea Callia D'Iddio}, title = {Providing context-based security for inter-organizational electronic business processes}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {393--394}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682744}, doi = {10.1109/CNS.2013.6682744}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TalamoASD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TongSC013, author = {Yue Tong and Jinyuan Sun and Sherman S. M. Chow and Pan Li}, title = {Towards auditable cloud-assisted access of encrypted health data}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {514--519}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682769}, doi = {10.1109/CNS.2013.6682769}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TongSC013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/UluagacRCBB13, author = {A. Selcuk Uluagac and Sakthi V. Radhakrishnan and Cherita L. Corbett and Antony Baca and Raheem A. Beyah}, title = {A passive technique for fingerprinting wireless devices with Wired-side Observations}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {305--313}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682720}, doi = {10.1109/CNS.2013.6682720}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/UluagacRCBB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Urien13, author = {Pascal Urien}, title = {Cloud of Secure Elements perspectives for mobile and cloud applications security}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {371--372}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682733}, doi = {10.1109/CNS.2013.6682733}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/Urien13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/VikramYG13, author = {Shardul Vikram and Chao Yang and Guofei Gu}, title = {{NOMAD:} Towards non-intrusive moving-target defense against web bots}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {55--63}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682692}, doi = {10.1109/CNS.2013.6682692}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/VikramYG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangLCL13, author = {Boyang Wang and Ming Li and Sherman S. M. Chow and Hui Li}, title = {Computing encrypted cloud data efficiently under multiple keys}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {504--513}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682768}, doi = {10.1109/CNS.2013.6682768}, timestamp = {Wed, 19 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/WangLCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangLLL13, author = {Boyang Wang and Baochun Li and Hui Li and Fenghua Li}, title = {Certificateless public auditing for data integrity in the cloud}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {136--144}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682701}, doi = {10.1109/CNS.2013.6682701}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangLLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangT13, author = {Yufeng Wang and Chiu C. Tan}, title = {Looking at the overheads of transmitting encrypted data to the cloud}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {493--497}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682766}, doi = {10.1109/CNS.2013.6682766}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WenZCTZJG13, author = {Hong Wen and Xiaochun Zhang and Lei Cai and Jie Tang and Xiping Zhu and Yixin Jiang and Xiaobin Guo}, title = {A novel detection scheme for malicious nodes in smart meter system}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {379--380}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682737}, doi = {10.1109/CNS.2013.6682737}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WenZCTZJG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XieW13, author = {Xiongwei Xie and Weichao Wang}, title = {Rootkit detection on virtual machines through deep information extraction at hypervisor-level}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {498--503}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682767}, doi = {10.1109/CNS.2013.6682767}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/XieW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XieZFWHZJG13, author = {Yuanpeng Xie and Jinsong Zhang and Ge Fu and Hong Wen and Qiyi Han and Xiping Zhu and Yixin Jiang and Xiaobin Guo}, title = {The security issue of WSNs based on cloud computing}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {383--384}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682739}, doi = {10.1109/CNS.2013.6682739}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/XieZFWHZJG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XiongZZY13, author = {Huijun Xiong and Qingji Zheng and Xinwen Zhang and Danfeng Yao}, title = {CloudSafe: Securing data processing within vulnerable virtualization environments in the cloud}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {172--180}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682705}, doi = {10.1109/CNS.2013.6682705}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/XiongZZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XuAG13, author = {Gang Xu and George T. Amariucai and Yong Guan}, title = {A lightweight argument system with efficient verifier}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {163--171}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682704}, doi = {10.1109/CNS.2013.6682704}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/XuAG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YanWNK13, author = {Zheng Yan and Mingjun Wang and Valtteri Niemi and Raimo Kantola}, title = {Secure pervasive social networking based on multi-dimensional trust levels}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {100--108}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682697}, doi = {10.1109/CNS.2013.6682697}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YanWNK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YaoFZ13, author = {Wei{-}Min Yao and Sonia Fahmy and Jiahong Zhu}, title = {EasyScale: Easy mapping for large-scale network security experiments}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {269--277}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682716}, doi = {10.1109/CNS.2013.6682716}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YaoFZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YuXCM13, author = {Wei Yu and Guobin Xu and Zhijiang Chen and Paul Moulema}, title = {A cloud computing based architecture for cyber security situation awareness}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {488--492}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682765}, doi = {10.1109/CNS.2013.6682765}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/YuXCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YuanXD13, author = {Zhenlong Yuan and Yibo Xue and Yingfei Dong}, title = {Harvesting unique characteristics in packet sequences for effective application classification}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {341--349}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682724}, doi = {10.1109/CNS.2013.6682724}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YuanXD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YuanY13, author = {Jiawei Yuan and Shucheng Yu}, title = {Secure and constant cost public cloud storage auditing with deduplication}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {145--153}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682702}, doi = {10.1109/CNS.2013.6682702}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YuanY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YuanY13a, author = {Jiawei Yuan and Shucheng Yu}, title = {Flexible and publicly verifiable aggregation query for outsourced databases in cloud}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {520--524}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682770}, doi = {10.1109/CNS.2013.6682770}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YuanY13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Zhang0ZY13, author = {Jinxue Zhang and Rui Zhang and Yanchao Zhang and Guanhua Yan}, title = {On the impact of social botnets for spam distribution and digital-influence manipulation}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {46--54}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682691}, doi = {10.1109/CNS.2013.6682691}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Zhang0ZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhaoA13, author = {Ziming Zhao and Gail{-}Joon Ahn}, title = {Using instruction sequence abstraction for shellcode detection and attribution}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {323--331}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682722}, doi = {10.1109/CNS.2013.6682722}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhaoA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZouEF13, author = {Jun Zou and Arash Einolghozati and Faramarz Fekri}, title = {Privacy-preserving item-based Collaborative Filtering using semi-distributed Belief Propagation}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {189--197}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682707}, doi = {10.1109/CNS.2013.6682707}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZouEF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZubaFCS13, author = {Michael Zuba and Michael Fagan and Jun{-}Hong Cui and Zhijie Jerry Shi}, title = {A vulnerability study of geographic routing in Underwater Acoustic Networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {109--117}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682698}, doi = {10.1109/CNS.2013.6682698}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZubaFCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cns/2013, title = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6675898/proceeding}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.