Search dblp for Publications

export results for "stream:conf/cns:"

 download as .bib file

@inproceedings{DBLP:conf/cns/AbdeenAS23,
  author       = {Basel Abdeen and
                  Ehab Al{-}Shaer and
                  Waseem G. Shadid},
  title        = {VeriActor: Dynamic Generation of Challenge-Response Questions for
                  Enhanced Email Sender Verification},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10289040},
  doi          = {10.1109/CNS59707.2023.10289040},
  timestamp    = {Mon, 13 Nov 2023 09:18:17 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AbdeenAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AbubakerG23,
  author       = {Radi Abubaker and
                  Guang Gong},
  title        = {High-speed {OFDM} Physical-Layer Key Exchange},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288672},
  doi          = {10.1109/CNS59707.2023.10288672},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AbubakerG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlamiR23,
  author       = {Hassan El Alami and
                  Danda B. Rawat},
  title        = {Detection of Zero-Day Attacks using {CNN} and {LSTM} in Networked
                  Autonomous Systems 'IEEE {CNS} 23 Poster'},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288680},
  doi          = {10.1109/CNS59707.2023.10288680},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AlamiR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BaiY23,
  author       = {Ken Yihang Bai and
                  Tuba Yavuz},
  title        = {{MMIO} Access-Based Coverage for Firmware Analysis},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10289061},
  doi          = {10.1109/CNS59707.2023.10289061},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/BaiY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BarutDL23,
  author       = {Onur Barut and
                  Lulin Deng and
                  David Lu},
  title        = {Universal Network Traffic Analysis for Malicious Traffic Detection
                  using RappNet: {A} Privacy-Preserving Approach : {IEEE} {CNS} 23 Poster},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10289115},
  doi          = {10.1109/CNS59707.2023.10289115},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/BarutDL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BegouVDK23,
  author       = {Nils Begou and
                  Jeremy Vinoy and
                  Andrzej Duda and
                  Maciej Korczynski},
  title        = {Exploring the Dark Side of {AI:} Advanced Phishing Attack Design and
                  Deployment Using ChatGPT},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288940},
  doi          = {10.1109/CNS59707.2023.10288940},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/BegouVDK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChakrabortyRMHM23,
  author       = {Trishna Chakraborty and
                  Imranur Rahman and
                  Hasan Murad and
                  Md. Shohrab Hossain and
                  Shagufta Mehnaz},
  title        = {SecureImgStego: {A} Keyed Shuffling-based Deep Learning Model for
                  Secure Image Steganography},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288753},
  doi          = {10.1109/CNS59707.2023.10288753},
  timestamp    = {Mon, 27 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ChakrabortyRMHM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChakrabortyYZ23,
  author       = {Nilesh Chakraborty and
                  Youssef Yamout and
                  Mohammad Zulkernine},
  title        = {The Tables Have Turned: {GPT-3} Distinguishing Passwords from Honeywords},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288643},
  doi          = {10.1109/CNS59707.2023.10288643},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ChakrabortyYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CorsiniY23,
  author       = {Andrea Corsini and
                  Shanchieh Jay Yang},
  title        = {Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion
                  Detection?},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288685},
  doi          = {10.1109/CNS59707.2023.10288685},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CorsiniY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CurranGPS23,
  author       = {Noah T. Curran and
                  Arun Ganesan and
                  Mert D. Pes{\'{e}} and
                  Kang G. Shin},
  title        = {Using Phone Sensors to Augment Vehicle Reliability},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10289103},
  doi          = {10.1109/CNS59707.2023.10289103},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/CurranGPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DenhamT23,
  author       = {Byron Denham and
                  Dale R. Thompson},
  title        = {Analysis of Decoy Strategies for Detecting Ransomware},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288691},
  doi          = {10.1109/CNS59707.2023.10288691},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/DenhamT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DoEC23,
  author       = {Son Tung Do and
                  Gabrielle Ebbrecht and
                  Juntao Chen},
  title        = {Adversarial Manipulation of Learning in Linear-Quadratic Zero-Sum
                  Differential Games via Cost Poisoning},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288942},
  doi          = {10.1109/CNS59707.2023.10288942},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/DoEC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DoughertyKHTT23,
  author       = {Sean Dougherty and
                  Abhinav Kumar and
                  Jie Hou and
                  Reza Tourani and
                  Atena M. Tabakhi},
  title        = {A Stealthy Inference Attack on Split Learning with a Split-Fuse Defensive
                  Measure},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288661},
  doi          = {10.1109/CNS59707.2023.10288661},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/DoughertyKHTT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DuttaACD23,
  author       = {Ashutosh Dutta and
                  Ehab Al{-}Shaer and
                  Samrat Chatterjee and
                  Qi Duan},
  title        = {Autonomous Cyber Defense Against Dynamic Multi-strategy Infrastructural
                  DDoS Attacks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288937},
  doi          = {10.1109/CNS59707.2023.10288937},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/DuttaACD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/EarRFX23,
  author       = {Ekzhin Ear and
                  Jose L. C. Remy and
                  Antonia Feffer and
                  Shouhuai Xu},
  title        = {Characterizing Cyber Attacks against Space Systems with Missing Data:
                  Framework and Case Study},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10289045},
  doi          = {10.1109/CNS59707.2023.10289045},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/EarRFX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ElmaghbubH23,
  author       = {Abdurrahman Elmaghbub and
                  Bechir Hamdaoui},
  title        = {A Needle in a Haystack: Distinguishable Deep Neural Network Features
                  for Domain-Agnostic Device Fingerprinting},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288752},
  doi          = {10.1109/CNS59707.2023.10288752},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ElmaghbubH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FengLZJ23,
  author       = {XiaMeng Feng and
                  Xiaodong Li and
                  SuYa Zhou and
                  Xin Jin},
  title        = {Homomorphic Comparison Method Based on Dynamically Polynomial Composite
                  Approximating Sign Function},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288803},
  doi          = {10.1109/CNS59707.2023.10288803},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/FengLZJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HalderGND23,
  author       = {Subir Halder and
                  Amrita Ghosal and
                  Thomas Newe and
                  Sajal K. Das},
  title        = {SmartLens: Robust Detection of Rogue Device via Frequency Domain Features
                  in LoRa-Enabled IIoT},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288657},
  doi          = {10.1109/CNS59707.2023.10288657},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/HalderGND23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HassanSGMSK23,
  author       = {Fahid Hassan and
                  Zhambyl Shaikhanov and
                  Hichem Guerboukha and
                  Daniel M. Mittleman and
                  Kaushik Sengupta and
                  Edward W. Knightly},
  title        = {{RMDM:} Using Random Meta-Atoms to Send Directional Misinformation
                  to Eavesdroppers},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288796},
  doi          = {10.1109/CNS59707.2023.10288796},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HassanSGMSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HouWZ23,
  author       = {Jing Hou and
                  Xuyu Wang and
                  Amy Z. Zeng},
  title        = {Inter-Temporal Reward Decisions with Strategic Ethical Hackers},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288885},
  doi          = {10.1109/CNS59707.2023.10288885},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HouWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HuDCDZ23,
  author       = {Yidan Hu and
                  Yukun Dong and
                  Wenxin Chen and
                  Yingfei Dong and
                  Rui Zhang},
  title        = {Authenticating Outsourced Location-Based Skyline Queries under Shortest
                  Path Distance},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288754},
  doi          = {10.1109/CNS59707.2023.10288754},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/HuDCDZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HusakJ23,
  author       = {Martin Hus{\'{a}}k and
                  Michal Javorn{\'{\i}}k},
  title        = {Lightweight Impact Assessment and Projection of Lateral Movement and
                  Malware Infection},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288665},
  doi          = {10.1109/CNS59707.2023.10288665},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/HusakJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/IntociSFPB23,
  author       = {Francesco Intoci and
                  Julian Sturm and
                  Daniel Fraunholz and
                  Apostolos Pyrgelis and
                  Colin Barschel},
  title        = {{P3LI5:} Practical and confidEntial Lawful Interception on the 5G
                  core},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288872},
  doi          = {10.1109/CNS59707.2023.10288872},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/IntociSFPB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/IqbalJ23,
  author       = {Mehzabien Iqbal and
                  Ahmad Y. Javaid},
  title        = {{IEEE} {CNS} 23 Poster: Cooperative Omnidirectional Beamformation
                  for THz Band Phy-Security},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288805},
  doi          = {10.1109/CNS59707.2023.10288805},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/IqbalJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/IshtiaqAKAJH23,
  author       = {Afifa Ishtiaq and
                  Arash Asadi and
                  Ladan Khaloopour and
                  Waqar Ahmed and
                  Vahid Jamali and
                  Matthias Hollick},
  title        = {BeamSec: {A} Practical mmWave Physical Layer Security Scheme Against
                  Strong Adversaries},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10289003},
  doi          = {10.1109/CNS59707.2023.10289003},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/IshtiaqAKAJH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JohnsonH23,
  author       = {Benjamin Johnson and
                  Bechir Hamdaoui},
  title        = {On the Domain Generalizability of {RF} Fingerprints Through Multifractal
                  Dimension Representation},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10289056},
  doi          = {10.1109/CNS59707.2023.10289056},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/JohnsonH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KaranamARG23,
  author       = {Venkat Sai Suman Lamba Karanam and
                  Fahmida Afrin and
                  Byrav Ramamurthy and
                  Nirnimesh Ghose},
  title        = {Cross-layer Device Identification for Smart Grid Substation Networks
                  : {IEEE} {CNS} 23 Poster},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288865},
  doi          = {10.1109/CNS59707.2023.10288865},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KaranamARG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KhalilR23,
  author       = {Alvi Ataur Khalil and
                  Mohammad Ashiqur Rahman},
  title        = {{SHIP:} Securing Hashed Timelock Contracts in Payment Channel Networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10289033},
  doi          = {10.1109/CNS59707.2023.10289033},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KhalilR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KhalilRK23,
  author       = {Alvi Ataur Khalil and
                  Mohammad Ashiqur Rahman and
                  Hisham A. Kholidy},
  title        = {{FAKEY:} Fake Hashed Key Attack on Payment Channel Networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288911},
  doi          = {10.1109/CNS59707.2023.10288911},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KhalilRK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KholoosiBY23,
  author       = {M. Mehdi Kholoosi and
                  Muhammad Ali Babar and
                  Cemal Yilmaz},
  title        = {Empirical Analysis of Software Vulnerabilities Causing Timing Side
                  Channels},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288690},
  doi          = {10.1109/CNS59707.2023.10288690},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KholoosiBY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KumarHOS23,
  author       = {Shashwat Kumar and
                  Francis Hahn and
                  Xinming Ou and
                  Anoop Singhal},
  title        = {Security Analysis of Trust on the Controller in the Matter Protocol
                  Specification},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288747},
  doi          = {10.1109/CNS59707.2023.10288747},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KumarHOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiSFSZER23,
  author       = {Jun Li and
                  Devkishen Sisodia and
                  Yebo Feng and
                  Lumin Shi and
                  Mingwei Zhang and
                  Christopher Early and
                  Peter L. Reiher},
  title        = {Toward Adaptive DDoS-Filtering Rule Generation},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288699},
  doi          = {10.1109/CNS59707.2023.10288699},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiSFSZER23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MartinB23,
  author       = {Bryan Martin and
                  Chad A. Bollmann},
  title        = {Self-similarity based network anomaly detection for industrial control
                  systems},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288656},
  doi          = {10.1109/CNS59707.2023.10288656},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/MartinB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/McClanahanFLC23,
  author       = {Kylie McClanahan and
                  Jingyao Fan and
                  Qinghua Li and
                  Guohong Cao},
  title        = {Protecting Control Commands Using Low-Cost {EM} Sensors in the Smart
                  Grid},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288961},
  doi          = {10.1109/CNS59707.2023.10288961},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/McClanahanFLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MensiR23,
  author       = {Neji Mensi and
                  Danda B. Rawat},
  title        = {Enhancing Security in NOMA-Based Networks: An Effective Deceptive
                  Approach to Thwart Multiple Eavesdroppers},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288993},
  doi          = {10.1109/CNS59707.2023.10288993},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/MensiR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MughalHI23,
  author       = {Umair Ahmad Mughal and
                  Samuel Chase Hassler and
                  Muhammad Ismail},
  title        = {Machine Learning-Based Intrusion Detection for Swarm of Unmanned Aerial
                  Vehicles},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288962},
  doi          = {10.1109/CNS59707.2023.10288962},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MughalHI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MughalIR23,
  author       = {Umair Ahmad Mughal and
                  Muhammad Ismail and
                  Syed Ali Asad Rizvi},
  title        = {Stealthy False Data Injection Attack on Unmanned Aerial Vehicles with
                  Partial Knowledge},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10289001},
  doi          = {10.1109/CNS59707.2023.10289001},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MughalIR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MynuddinKMA23,
  author       = {Mohammed Mynuddin and
                  Sultan Uddin Khan and
                  Mahmoud Nabil Mahmoud and
                  Ahmad Alsharif},
  title        = {Adversarial Attacks on Deep Learning-Based {UAV} Navigation Systems},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10289004},
  doi          = {10.1109/CNS59707.2023.10289004},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/MynuddinKMA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/NafisCH23,
  author       = {Akib Jawad Nafis and
                  Omar Chowdhury and
                  Md. Endadul Hoque},
  title        = {VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288667},
  doi          = {10.1109/CNS59707.2023.10288667},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/NafisCH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/OwusuRHXX23,
  author       = {Evans Owusu and
                  Mohamed Rahouti and
                  D. Frank Hsu and
                  Kaiqi Xiong and
                  Yufeng Xin},
  title        = {Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion
                  Analysis},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288981},
  doi          = {10.1109/CNS59707.2023.10288981},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/OwusuRHXX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PathakAH23,
  author       = {Aditya Pathak and
                  Irfan S. Al{-}Anbagi and
                  Howard J. Hamilton},
  title        = {Early-stage Conflict Detection in HLF-based Delay-critical IoT Networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288697},
  doi          = {10.1109/CNS59707.2023.10288697},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/PathakAH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RathoreG23,
  author       = {Heena Rathore and
                  Henry Griffith},
  title        = {Leveraging Neuro-Inspired Reinforcement Learning for Secure Reputation-based
                  Communication in Connected Vehicles},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10289058},
  doi          = {10.1109/CNS59707.2023.10289058},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/RathoreG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SainiS23,
  author       = {Shalini Saini and
                  Nitesh Saxena},
  title        = {Speaker Anonymity and Voice Conversion Vulnerability: {A} Speaker
                  Recognition Analysis},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10289030},
  doi          = {10.1109/CNS59707.2023.10289030},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SainiS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShehabyM23,
  author       = {Mohamed el Shehaby and
                  Ashraf Matrawy},
  title        = {The Impact of Dynamic Learning on Adversarial Attacks in Networks
                  {(IEEE} {CNS} 23 Poster)},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288658},
  doi          = {10.1109/CNS59707.2023.10288658},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ShehabyM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShenHLLW23,
  author       = {Dakun Shen and
                  Tao Hou and
                  Zhuo Lu and
                  Yao Liu and
                  Tao Wang},
  title        = {SecDINT: Preventing Data-oriented Attacks via Intel {SGX} Escorted
                  Data Integrity},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10289062},
  doi          = {10.1109/CNS59707.2023.10289062},
  timestamp    = {Mon, 19 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ShenHLLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShiXTPLHWHLCXL23,
  author       = {Jingwen Shi and
                  Tian Xie and
                  Guan{-}Hua Tu and
                  Chunyi Peng and
                  Chi{-}Yu Li and
                  Andrew Z. Hou and
                  Sihan Wang and
                  Yiwen Hu and
                  Xinyu Lei and
                  Min{-}Yue Chen and
                  Li Xiao and
                  Xiaoming Liu},
  title        = {When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288900},
  doi          = {10.1109/CNS59707.2023.10288900},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ShiXTPLHWHLCXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SultanaTLM23,
  author       = {Madeena Sultana and
                  Adrian Taylor and
                  Li Li and
                  Suryadipta Majumdar},
  title        = {Towards Evaluation and Understanding of Large Language Models for
                  Cyber Operation Automation},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288677},
  doi          = {10.1109/CNS59707.2023.10288677},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SultanaTLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TefekECM23,
  author       = {Utku Tefek and
                  Ertem Esiner and
                  Carmen Cheh and
                  Daisuke Mashima},
  title        = {A Smart Grid Ontology: Vulnerabilities, Attacks, and Security Policies},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10289085},
  doi          = {10.1109/CNS59707.2023.10289085},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TefekECM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WuF23,
  author       = {Xingqi Wu and
                  Junaid Farooq},
  title        = {Attack Resilient Wireless Backhaul Connectivity with Optimized Fronthaul
                  Coverage in {UAV} Networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288893},
  doi          = {10.1109/CNS59707.2023.10288893},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/WuF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YeLS23,
  author       = {Xiaokai Ye and
                  Tao Lv and
                  Xiaohan Sun},
  title        = {A Key Generation Scheme from Sensing Data for IoT Security : {IEEE}
                  {CNS} 23 Poster},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288698},
  doi          = {10.1109/CNS59707.2023.10288698},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/YeLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangH23,
  author       = {Zikai Zhang and
                  Rui Hu},
  title        = {Byzantine-Robust Federated Learning with Variance Reduction and Differential
                  Privacy},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288938},
  doi          = {10.1109/CNS59707.2023.10288938},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangMAEM23,
  author       = {Lu Zhang and
                  Nabil Moukafih and
                  Hamad Alamri and
                  Gregory Epiphaniou and
                  Carsten Maple},
  title        = {A BERT-based Empirical Study of Privacy Policies' Compliance with
                  {GDPR}},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288797},
  doi          = {10.1109/CNS59707.2023.10288797},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangMAEM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangS23,
  author       = {Qianqian Zhang and
                  Chi{-}Jiun Su},
  title        = {Application-layer Characterization and Traffic Analysis for Encrypted
                  {QUIC} Transport Protocol},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10289016},
  doi          = {10.1109/CNS59707.2023.10289016},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangXS23,
  author       = {Kexin Zhang and
                  Shengjie Xu and
                  Bongsik Shin},
  title        = {Towards Adaptive Zero Trust Model for Secure {AI}},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288810},
  doi          = {10.1109/CNS59707.2023.10288810},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangXS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhaoSORXX23,
  author       = {Shujun Zhao and
                  Lesther Santana and
                  Evans Owusu and
                  Mohamed Rahouti and
                  Kaiqi Xiong and
                  Yufeng Xin},
  title        = {Enhancing ML-Based DoS Attack Detection with Feature Engineering :
                  {IEEE} {CNS} 23 Poster},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288689},
  doi          = {10.1109/CNS59707.2023.10288689},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZhaoSORXX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2023,
  title        = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023},
  doi          = {10.1109/CNS59707.2023},
  isbn         = {979-8-3503-3945-1},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AkterS22,
  author       = {Mst. Shapna Akter and
                  Hossain Shahriar},
  title        = {Towards Unsupervised Learning based Denoising of Cyber Physical System
                  Data to Mitigate Security Concerns},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.10044378},
  doi          = {10.1109/CNS56114.2022.10044378},
  timestamp    = {Thu, 23 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AkterS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlamHOK22,
  author       = {Md Shah Alam and
                  Sarkar Marshia Hossain and
                  Jared Oluoch and
                  Junghwan Kim},
  title        = {A Novel Secure Physical Layer Key Generation Method in Connected and
                  Autonomous Vehicles (CAVs)},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947262},
  doi          = {10.1109/CNS56114.2022.9947262},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AlamHOK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AliASNLWC22,
  author       = {Haider Ali and
                  Mohannad Al Ameedi and
                  Ananthram Swami and
                  Rui Ning and
                  Jiang Li and
                  Hongyi Wu and
                  Jin{-}Hee Cho},
  title        = {{ACADIA:} Efficient and Robust Adversarial Attacks Against Deep Reinforcement
                  Learning},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947234},
  doi          = {10.1109/CNS56114.2022.9947234},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AliASNLWC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BecherSSS22,
  author       = {Kilian Becher and
                  Mirko Sch{\"{a}}fer and
                  Axel Schr{\"{o}}pfer and
                  Thorsten Strufe},
  title        = {Efficient Public Verification of Confidential Supply-Chain Transactions},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {308--316},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947231},
  doi          = {10.1109/CNS56114.2022.9947231},
  timestamp    = {Mon, 08 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BecherSSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BrantY22,
  author       = {Christopher Brant and
                  Tuba Yavuz},
  title        = {A Study on the Testing of Android Security Patches},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {217--225},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947240},
  doi          = {10.1109/CNS56114.2022.9947240},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/BrantY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BrownCV22,
  author       = {Daniel Brown and
                  Gabriele Cianfarani and
                  Natalija Vlajic},
  title        = {Real World Snapshot of Trends in IoT Device and Protocol Deployment:
                  {IEEE} {CNS} 22 Poster},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947257},
  doi          = {10.1109/CNS56114.2022.9947257},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/BrownCV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenGCG22,
  author       = {Jiyu Chen and
                  Yiwen Guo and
                  Hao Chen and
                  Neil Gong},
  title        = {Membership Inference Attack in Face of Data Transformations},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {299--307},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947254},
  doi          = {10.1109/CNS56114.2022.9947254},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChenGCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChungV22,
  author       = {Jay Chung and
                  Natalija Vlajic},
  title        = {Survey of Remote {TLS} Vulnerability Scanning Tools and Snapshot of
                  {TLS} Use in Banking Sector},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947230},
  doi          = {10.1109/CNS56114.2022.9947230},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ChungV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CohenDYGSFKMM22,
  author       = {Alejandro Cohen and
                  Rafael G. L. D'Oliveira and
                  Chia{-}Yi Yeh and
                  Hichem Guerboukha and
                  Rabi Shrestha and
                  Zhaoji Fang and
                  Edward W. Knightly and
                  Muriel M{\'{e}}dard and
                  Daniel M. Mittleman},
  title        = {Absolute Security in High-Frequency Wireless Links},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {46--54},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947269},
  doi          = {10.1109/CNS56114.2022.9947269},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/CohenDYGSFKMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FejrskovPV22,
  author       = {Martin Fejrskov and
                  Jens Myrup Pedersen and
                  Emmanouil Vasilomanolakis},
  title        = {Detecting {DNS} hijacking by using NetFlow data},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {273--280},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947264},
  doi          = {10.1109/CNS56114.2022.9947264},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/FejrskovPV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GaskinHW22,
  author       = {Jared Gaskin and
                  Bechir Hamdaoui and
                  Weng{-}Keen Wong},
  title        = {Tweak: Towards Portable Deep Learning Models for Domain-Agnostic LoRa
                  Device Authentication},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.10227829},
  doi          = {10.1109/CNS56114.2022.10227829},
  timestamp    = {Sun, 03 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GaskinHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GeZ22,
  author       = {Yunfei Ge and
                  Quanyan Zhu},
  title        = {Trust Threshold Policy for Explainable and Adaptive Zero-Trust Defense
                  in Enterprise Networks},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {359--364},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947263},
  doi          = {10.1109/CNS56114.2022.9947263},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/GeZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GeorgeS22,
  author       = {Dominik Roy George and
                  Savio Sciancalepore},
  title        = {{PRM} - Private Interference Discovery for {IEEE} 802.15 4 Networks},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {136--144},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947236},
  doi          = {10.1109/CNS56114.2022.9947236},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/GeorgeS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GowrisankarMOYE22,
  author       = {Balachandar Gowrisankar and
                  Daisuke Mashima and
                  Wen Shei Ong and
                  Quanqi Ye and
                  Ertem Esiner and
                  Binbin Chen and
                  Zbigniew Kalbarczyk},
  title        = {GateKeeper: Operator-centric Trusted App Management Framework on {ARM}
                  TrustZone},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {100--108},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947233},
  doi          = {10.1109/CNS56114.2022.9947233},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/GowrisankarMOYE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GuanCCZP22,
  author       = {Chongqi Guan and
                  Xianda Chen and
                  Guohong Cao and
                  Sencun Zhu and
                  Thomas La Porta},
  title        = {HoneyCam: Scalable High-Interaction Honeypot for IoT Cameras Based
                  on 360-Degree Video},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {82--90},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947265},
  doi          = {10.1109/CNS56114.2022.9947265},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/GuanCCZP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GuoHG22,
  author       = {Yuanxiong Guo and
                  Rui Hu and
                  Yanmin Gong},
  title        = {Agent-Level Differentially Private Federated Learning via Compressed
                  Model Perturbation},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {127--135},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947266},
  doi          = {10.1109/CNS56114.2022.9947266},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GuoHG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GuptaYK22,
  author       = {Shreya Gupta and
                  Chia{-}Yi Yeh and
                  Edward W. Knightly},
  title        = {Stealthy Off-Target Coupled-Control-Plane Jamming},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {208--216},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947228},
  doi          = {10.1109/CNS56114.2022.9947228},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/GuptaYK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GvozdenovicBMS22,
  author       = {Stefan Gvozdenovic and
                  Johannes K. Becker and
                  John Mikulskis and
                  David Starobinski},
  title        = {Multi-Protocol IoT Network Reconnaissance},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {118--126},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947261},
  doi          = {10.1109/CNS56114.2022.9947261},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/GvozdenovicBMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HoqueRR22,
  author       = {Naureen Hoque and
                  Hanif Rahbari and
                  Cullen Rezendes},
  title        = {Systematically Analyzing Vulnerabilities in the Connection Establishment
                  Phase of Wi-Fi Systems},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {64--72},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947252},
  doi          = {10.1109/CNS56114.2022.9947252},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/HoqueRR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HouBWWLL22,
  author       = {Tao Hou and
                  Shengping Bi and
                  Mingkui Wei and
                  Tao Wang and
                  Zhuo Lu and
                  Yao Liu},
  title        = {When Third-Party JavaScript Meets Cache: Explosively Amplifying Security
                  Risks on the Internet},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {290--298},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947247},
  doi          = {10.1109/CNS56114.2022.9947247},
  timestamp    = {Mon, 19 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HouBWWLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HuWCLH22,
  author       = {Yang Hu and
                  Ning Wang and
                  Yimin Chen and
                  Wenjing Lou and
                  Y. Thomas Hou},
  title        = {Transferability of Adversarial Examples in Machine Learning-based
                  Malware Detection},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {28--36},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947226},
  doi          = {10.1109/CNS56114.2022.9947226},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/HuWCLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/IbrahimOP22,
  author       = {Omar Adel Ibrahim and
                  Gabriele Oligeri and
                  Roberto Di Pietro},
  title        = {Eolo: IoT Proximity-based Authentication via Pressure Correlated Variations},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {109--117},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947258},
  doi          = {10.1109/CNS56114.2022.9947258},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/IbrahimOP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KimD22,
  author       = {Yeongwoo Kim and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {An Active Learning Approach to Dynamic Alert Prioritization for Real-time
                  Situational Awareness},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {154--162},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947246},
  doi          = {10.1109/CNS56114.2022.9947246},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KimD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KleberK22,
  author       = {Stephan Kleber and
                  Frank Kargl},
  title        = {Refining Network Message Segmentation with Principal Component Analysis},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {281--289},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947242},
  doi          = {10.1109/CNS56114.2022.9947242},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KleberK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KumariASC22,
  author       = {Ranju Kumari and
                  Faheed A. F. Alenezi and
                  Sejun Song and
                  Baek{-}Young Choi},
  title        = {{ML-AWARE:} {A} Machine Learning Approach for Detecting Wormhole Attack
                  Resonance},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.10092921},
  doi          = {10.1109/CNS56114.2022.10092921},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KumariASC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LeaoVMSPHBWB22,
  author       = {Bruno P. Leao and
                  Jagannadh Vempati and
                  Ulrich M{\"{u}}nz and
                  Shashank Shekhar and
                  Amit Pandey and
                  David Hingos and
                  Siddharth Bhela and
                  Jing Wang and
                  Chris Bilby},
  title        = {Machine Learning-based False Data Injection Attack Detection and Localization
                  in Power Grids},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947256},
  doi          = {10.1109/CNS56114.2022.9947256},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LeaoVMSPHBWB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LefebvreEN22,
  author       = {Michael Lefebvre and
                  Daniel W. Engels and
                  Suku Nair},
  title        = {On {SDPN:} Integrating the Software-Defined Perimeter {(SDP)} and
                  the Software-Defined Network {(SDN)} Paradigms},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {353--358},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947267},
  doi          = {10.1109/CNS56114.2022.9947267},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LefebvreEN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiGWGW22,
  author       = {Haipeng Li and
                  Kaustubh Gupta and
                  Chenggang Wang and
                  Nirnimesh Ghose and
                  Boyang Wang},
  title        = {RadioNet: Robust Deep-Learning Based Radio Fingerprinting},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {190--198},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947255},
  doi          = {10.1109/CNS56114.2022.9947255},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiGWGW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiYCSC22,
  author       = {Qi Li and
                  Keyang Yu and
                  Dong Chen and
                  Mo Sha and
                  Long Cheng},
  title        = {TrafficSpy: Disaggregating VPN-encrypted IoT Network Traffic for User
                  Privacy Inference},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {145--153},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947251},
  doi          = {10.1109/CNS56114.2022.9947251},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiYCSC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiuELEJ22,
  author       = {Lisa Liu and
                  Gints Engelen and
                  Timothy M. Lynar and
                  Daryl Essam and
                  Wouter Joosen},
  title        = {Error Prevalence in {NIDS} datasets: {A} Case Study on {CIC-IDS-2017}
                  and {CSE-CIC-IDS-2018}},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {254--262},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947235},
  doi          = {10.1109/CNS56114.2022.9947235},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiuELEJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiuSNW22,
  author       = {Hao Liu and
                  Wenhai Sun and
                  Nan Niu and
                  Boyang Wang},
  title        = {MultiEvasion: Evasion Attacks Against Multiple Malware Detectors},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {10--18},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947227},
  doi          = {10.1109/CNS56114.2022.9947227},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiuSNW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiuZ22,
  author       = {Shutian Liu and
                  Quanyan Zhu},
  title        = {On the Role of Risk Perceptions in Cyber Insurance Contracts},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {377--382},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947268},
  doi          = {10.1109/CNS56114.2022.9947268},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiuZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MensiRL22,
  author       = {Neji Mensi and
                  Danda B. Rawat and
                  Chunmei Liu},
  title        = {Security Analysis of Mixed {RF-FSO} Blockage Attack Over Generalized
                  {RF} Fading and Atmospheric Turbulence},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {344--352},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947271},
  doi          = {10.1109/CNS56114.2022.9947271},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/MensiRL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MiMW22,
  author       = {Yu Mi and
                  David Mohaisen and
                  An Wang},
  title        = {AutoDefense: Reinforcement Learning Based Autoreactive Defense Against
                  Network Attacks},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {163--171},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947232},
  doi          = {10.1109/CNS56114.2022.9947232},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/MiMW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Morin022,
  author       = {Andrew Morin and
                  Tyler Moore},
  title        = {Towards Cost-Balanced Intrusion Detection in {OT} Environments},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.10091442},
  doi          = {10.1109/CNS56114.2022.10091442},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Morin022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Morin022a,
  author       = {Andrew Morin and
                  Tyler Moore},
  title        = {Towards Cost-Balanced Intrusion Detection in {OT} Environments},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.10092920},
  doi          = {10.1109/CNS56114.2022.10092920},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Morin022a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/NiknamiW22,
  author       = {Nadia Niknami and
                  Jie Wu},
  title        = {Enhancing Load Balancing by Intrusion Detection System Chain on {SDN}
                  Data Plane},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {264--272},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947270},
  doi          = {10.1109/CNS56114.2022.9947270},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/NiknamiW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/OlszewskiZSBT22,
  author       = {Daniel Olszewski and
                  Weidong Zhu and
                  Sandeep Sathyanarayana and
                  Kevin R. B. Butler and
                  Patrick Traynor},
  title        = {HallMonitor: {A} Framework for Identifying Network Policy Violations
                  in Software},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {245--253},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947243},
  doi          = {10.1109/CNS56114.2022.9947243},
  timestamp    = {Tue, 17 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/OlszewskiZSBT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PapastergiouPA22,
  author       = {Thomas Papastergiou and
                  Roberto Perdisci and
                  Manos Antonakakis},
  title        = {Returning to Port: Efficient Detection of Home Router Devices},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {172--180},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947250},
  doi          = {10.1109/CNS56114.2022.9947250},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PapastergiouPA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PatanPPKG22,
  author       = {Rizwan Patan and
                  Reza M. Parizi and
                  Seyedamin Pouriyeh and
                  Mohammad S. Khan and
                  Amir H. Gandomi},
  title        = {A Secured Certificateless Sign-encrypted Blockchain Communication
                  for Intelligent Transport System},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947225},
  doi          = {10.1109/CNS56114.2022.9947225},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/PatanPPKG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PauleyTZM22,
  author       = {Eric Pauley and
                  Gang Tan and
                  Danfeng Zhang and
                  Patrick D. McDaniel},
  title        = {Performant Binary Fuzzing without Source Code using Static Instrumentation},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {226--235},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947273},
  doi          = {10.1109/CNS56114.2022.9947273},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/PauleyTZM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PritomX22,
  author       = {Mir Mehedi Ahsan Pritom and
                  Shouhuai Xu},
  title        = {Supporting Law-Enforcement to Cope with Blacklisted Websites: Framework
                  and Case Study},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {181--189},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947260},
  doi          = {10.1109/CNS56114.2022.9947260},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/PritomX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RashidiSGNS22,
  author       = {Leila Rashidi and
                  Sogand SadrHaghighi and
                  Majid Ghaderi and
                  Cristina Nita{-}Rotaru and
                  Reihaneh Safavi{-}Naini},
  title        = {Securing Communication Against Leaky Switches},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {335--343},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947245},
  doi          = {10.1109/CNS56114.2022.9947245},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/RashidiSGNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ReazW22,
  author       = {Khan Reaz and
                  Gerhard Wunder},
  title        = {Expectation Entropy as a Password Strength Metric},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947259},
  doi          = {10.1109/CNS56114.2022.9947259},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ReazW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SaeedLZC22,
  author       = {Usama Saeed and
                  Lingjia Liu and
                  Kai Zeng and
                  A. Robert Calderbank},
  title        = {Securing Wireless Channels: Reliable Shared Secret Extraction through
                  {OTFS}},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {199--207},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947239},
  doi          = {10.1109/CNS56114.2022.9947239},
  timestamp    = {Mon, 06 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SaeedLZC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Sagduyu22,
  author       = {Yalin E. Sagduyu},
  title        = {Free-Rider Games for Federated Learning with Selfish Clients in NextG
                  Wireless Networks},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {365--370},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947274},
  doi          = {10.1109/CNS56114.2022.9947274},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/Sagduyu22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SendnerISJDK22,
  author       = {Christoph Sendner and
                  Lukas Iffl{\"{a}}nder and
                  Sebastian Schindler and
                  Michael Jobst and
                  Alexandra Dmitrienko and
                  Samuel Kounev},
  title        = {Ransomware Detection in Databases through Dynamic Analysis of Query
                  Sequences},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {326--334},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947244},
  doi          = {10.1109/CNS56114.2022.9947244},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SendnerISJDK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SeveriJYWON22,
  author       = {Giorgio Severi and
                  Matthew Jagielski and
                  G{\"{o}}kberk Yar and
                  Yuxuan Wang and
                  Alina Oprea and
                  Cristina Nita{-}Rotaru},
  title        = {Network-Level Adversaries in Federated Learning},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {19--27},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947237},
  doi          = {10.1109/CNS56114.2022.9947237},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SeveriJYWON22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShezanLPWSL22,
  author       = {Faysal Hossain Shezan and
                  Yingjie Lao and
                  Minlong Peng and
                  Xin Wang and
                  Mingming Sun and
                  Ping Li},
  title        = {{NL2GDPR:} Automatically Develop {GDPR} Compliant Android Application
                  Features from Natural Language},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.10273858},
  doi          = {10.1109/CNS56114.2022.10273858},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ShezanLPWSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SuLZWW22,
  author       = {Dan Su and
                  Jiqiang Liu and
                  Sencun Zhu and
                  Xiaoyang Wang and
                  Wei Wang},
  title        = {Alexa Skills: Security Vulnerabilities and Countermeasures},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.10066153},
  doi          = {10.1109/CNS56114.2022.10066153},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SuLZWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SunZZS22,
  author       = {Yuanyi Sun and
                  Sencun Zhu and
                  Yan Zhao and
                  Pengfei Sun},
  title        = {A User-Friendly Two-Factor Authentication Method against Real-Time
                  Phishing Attacks},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {91--99},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947253},
  doi          = {10.1109/CNS56114.2022.9947253},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SunZZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TorshiziUH22,
  author       = {Ehsan Olyaei Torshizi and
                  Utkrist Uprety and
                  Werner Henkel},
  title        = {Highly Efficient {FDD} Secret Key Generation using {ESPRIT} and Jump
                  Removal on Phase Differences},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947224},
  doi          = {10.1109/CNS56114.2022.9947224},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TorshiziUH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/VierhauserWR22,
  author       = {Michael Vierhauser and
                  Rebekka Wohlrab and
                  Stefan Rass},
  title        = {Towards Cost-Benefit-Aware Adaptive Monitoring for Cyber-Physical
                  Systems},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.10092919},
  doi          = {10.1109/CNS56114.2022.10092919},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/VierhauserWR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangF22,
  author       = {Yuhui Wang and
                  Junaid Farooq},
  title        = {Proactive and Resilient {UAV} Orchestration for QoS Driven Connectivity
                  and Coverage of Ground Users},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {371--376},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947272},
  doi          = {10.1109/CNS56114.2022.9947272},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/WangF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangYPGFZ22,
  author       = {Shan Wang and
                  Ming Yang and
                  Bryan Pearson and
                  Tingjian Ge and
                  Xinwen Fu and
                  Wei Zhao},
  title        = {On Security of Proof-of-Policy (PoP) in the Execute-Order-Validate
                  Blockchain Paradigm},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {317--325},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947249},
  doi          = {10.1109/CNS56114.2022.9947249},
  timestamp    = {Wed, 17 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangYPGFZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XingCWTSYL22,
  author       = {Yunlong Xing and
                  Jiahao Cao and
                  Xinda Wang and
                  Sadegh Torabi and
                  Kun Sun and
                  Fei Yan and
                  Qi Li},
  title        = {SysCap: Profiling and Crosschecking Syscall and Capability Configurations
                  for Docker Images},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {236--244},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947248},
  doi          = {10.1109/CNS56114.2022.9947248},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XingCWTSYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XuZBS22,
  author       = {Jiaqi Xu and
                  Xingya Zhao and
                  Arjun Bakshi and
                  Kannan Srinivasan},
  title        = {Learning-Based Radio Fingerprinting for {RFID} Secure Authentication
                  Scheme},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {55--63},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947229},
  doi          = {10.1109/CNS56114.2022.9947229},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/XuZBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YangFS22,
  author       = {Edwin Yang and
                  Song Fang and
                  Dakun Shen},
  title        = {{DASK:} Driving-Assisted Secret Key Establishment},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {73--81},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947241},
  doi          = {10.1109/CNS56114.2022.9947241},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/YangFS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangK22,
  author       = {Zhengguang Zhang and
                  Marwan Krunz},
  title        = {{SIGTAM:} {A} Tampering Attack on Wi-Fi Preamble Signaling and Countermeasures},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.10059317},
  doi          = {10.1109/CNS56114.2022.10059317},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhaoLYZL22,
  author       = {Jinghao Zhao and
                  Qianru Li and
                  Zengwen Yuan and
                  Zhehui Zhang and
                  Songwu Lu},
  title        = {5G Messaging: System Insecurity and Defenses},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {37--45},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947238},
  doi          = {10.1109/CNS56114.2022.9947238},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZhaoLYZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZiviD22,
  author       = {Afshin Zivi and
                  Christian Doerr},
  title        = {Adding Zero Trust in {BYOD} Environments through Network Inspection},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.10092922},
  doi          = {10.1109/CNS56114.2022.10092922},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZiviD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2022,
  title        = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022},
  doi          = {10.1109/CNS56114.2022},
  isbn         = {978-1-6654-6255-6},
  timestamp    = {Fri, 25 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AbdelAtySCS21,
  author       = {Maged AbdelAty and
                  Sandra Scott{-}Hayward and
                  Roberto Doriguzzi Corin and
                  Domenico Siracusa},
  title        = {GADoT: GAN-based Adversarial Training for Robust DDoS Attack Detection},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {119--127},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705040},
  doi          = {10.1109/CNS53000.2021.9705040},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AbdelAtySCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AkestoridisT21,
  author       = {Dimitrios{-}Georgios Akestoridis and
                  Patrick Tague},
  title        = {HiveGuard: {A} Network Security Monitoring Architecture for Zigbee
                  Networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {209--217},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705043},
  doi          = {10.1109/CNS53000.2021.9705043},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AkestoridisT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlrumayhLT21,
  author       = {Abrar S. Alrumayh and
                  Sarah M. Lehman and
                  Chiu C. Tan},
  title        = {Understanding and Mitigating Privacy Leaks from Third-Party Smart
                  Speaker Apps},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705042},
  doi          = {10.1109/CNS53000.2021.9705042},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AlrumayhLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AsadujjamanOJMP21,
  author       = {A. S. M. Asadujjaman and
                  Momen Oqaily and
                  Yosr Jarraya and
                  Suryadipta Majumdar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Artificial Packet-Pair Dispersion {(APPD):} {A} Blackbox Approach
                  to Verifying the Integrity of {NFV} Service Chains},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {245--253},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705020},
  doi          = {10.1109/CNS53000.2021.9705020},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AsadujjamanOJMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BendaryKCP21,
  author       = {Ahmed S. Bendary and
                  C. Emre Koksal and
                  Daniel Canaday and
                  Andrew Pomerance},
  title        = {Unconditional Authentication for Constrained Applications via Strong
                  PUFs},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {272--280},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705035},
  doi          = {10.1109/CNS53000.2021.9705035},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BendaryKCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenLNG21,
  author       = {Wenhao Chen and
                  Li Lin and
                  Jennifer Newman and
                  Yong Guan},
  title        = {Automatic Detection of Android Steganography Apps via Symbolic Execution
                  and Tree Matching},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {254--262},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705047},
  doi          = {10.1109/CNS53000.2021.9705047},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChenLNG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DevalTBR21,
  author       = {Shalin Kumar Deval and
                  Meenakshi Tripathi and
                  Bruhadeshwar Bezawada and
                  Indrakshi Ray},
  title        = {"X-Phish: Days of Future Past"{\textdaggerdbl}: Adaptive {\&}
                  Privacy Preserving Phishing Detection},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {227--235},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705052},
  doi          = {10.1109/CNS53000.2021.9705052},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/DevalTBR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DiasA21,
  author       = {Micael A. Dias and
                  Francisco Marcos de Assis},
  title        = {Evaluating the Eavesdropper Entropy via Bloch-Messiah Decomposition},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705021},
  doi          = {10.1109/CNS53000.2021.9705021},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/DiasA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FanCZX21,
  author       = {Wenjun Fan and
                  Sang{-}Yoon Chang and
                  Xiaobo Zhou and
                  Shouhuai Xu},
  title        = {ConMan: {A} Connection Manipulation-based Attack Against Bitcoin Networking},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {101--109},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705018},
  doi          = {10.1109/CNS53000.2021.9705018},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/FanCZX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FejrskovPBV21,
  author       = {Martin Fejrskov and
                  Jens Myrup Pedersen and
                  Leon B{\"{o}}ck and
                  Emmanouil Vasilomanolakis},
  title        = {An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs
                  in {DNS} records},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {164--172},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705029},
  doi          = {10.1109/CNS53000.2021.9705029},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/FejrskovPBV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GuoTCLW21,
  author       = {Yunqi Guo and
                  Zhaowei Tan and
                  Kaiyuan Chen and
                  Songwu Lu and
                  Ying Nian Wu},
  title        = {A Model Obfuscation Approach to IoT Security},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705028},
  doi          = {10.1109/CNS53000.2021.9705028},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/GuoTCLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HardegenPEGRB21,
  author       = {Christoph Hardegen and
                  Mike Petersen and
                  Chukwuebuka Ezelu and
                  Timo Geier and
                  Sebastian Rieger and
                  Ulrich Buehler},
  title        = {A Hierarchical Architecture and Probabilistic Strategy for Collaborative
                  Intrusion Detection},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {128--136},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705027},
  doi          = {10.1109/CNS53000.2021.9705027},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HardegenPEGRB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HoglundR21,
  author       = {Joel H{\"{o}}glund and
                  Shahid Raza},
  title        = {{LICE:} Lightweight certificate enrollment for IoT using application
                  layer security},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {19--28},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705036},
  doi          = {10.1109/CNS53000.2021.9705036},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/HoglundR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HossainBS21,
  author       = {Md Tamjid Hossain and
                  Shahriar Badsha and
                  Haoting Shen},
  title        = {Privacy, Security, and Utility Analysis of Differentially Private
                  {CPES} Data},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {65--73},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705022},
  doi          = {10.1109/CNS53000.2021.9705022},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HossainBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HusaT21,
  author       = {Eric Husa and
                  Reza Tourani},
  title        = {Vibe: An Implicit Two-Factor Authentication using Vibration Signals},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {236--244},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705025},
  doi          = {10.1109/CNS53000.2021.9705025},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/HusaT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/IslamDSAWF21,
  author       = {Md. Mazharul Islam and
                  Ashutosh Dutta and
                  Md Sajidul Islam Sajid and
                  Ehab Al{-}Shaer and
                  Jinpeng Wei and
                  Sadegh Farhang},
  title        = {{CHIMERA:} Autonomous Planning and Orchestration for Malware Deception},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {173--181},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705030},
  doi          = {10.1109/CNS53000.2021.9705030},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/IslamDSAWF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/IvanovY21,
  author       = {Nikolay Ivanov and
                  Qiben Yan},
  title        = {EthClipper: {A} Clipboard Meddling Attack on Hardware Wallets with
                  Address Verification Evasion},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {191--199},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705033},
  doi          = {10.1109/CNS53000.2021.9705033},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/IvanovY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JiangW21,
  author       = {Suhan Jiang and
                  Jie Wu},
  title        = {On Game-theoretic Computation Power Diversification in the Bitcoin
                  Mining Network},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {83--91},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705053},
  doi          = {10.1109/CNS53000.2021.9705053},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/JiangW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiuFS21,
  author       = {Songsong Liu and
                  Pengbin Feng and
                  Kun Sun},
  title        = {HoneyBog: {A} Hybrid Webshell Honeypot Framework against Command Injection},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {218--226},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705039},
  doi          = {10.1109/CNS53000.2021.9705039},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiuFS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MitraKLM21,
  author       = {Rupendra Nath Mitra and
                  Mohamed M. Kassem and
                  Jon Larrea and
                  Mahesh K. Marina},
  title        = {{CUPS} Hijacking in Mobile {RAN} Slicing: Modeling, Prototyping, and
                  Analysis},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {38--46},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705046},
  doi          = {10.1109/CNS53000.2021.9705046},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MitraKLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MoskalY21,
  author       = {Stephen Moskal and
                  Shanchieh Jay Yang},
  title        = {Translating Intrusion Alerts to Cyberattack Stages using Pseudo-Active
                  Transfer Learning {(PATRL)}},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {110--118},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705037},
  doi          = {10.1109/CNS53000.2021.9705037},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/MoskalY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/OngunSMBOEHNDV21,
  author       = {Talha Ongun and
                  Oliver Spohngellert and
                  Benjamin A. Miller and
                  Simona Boboila and
                  Alina Oprea and
                  Tina Eliassi{-}Rad and
                  Jason Hiser and
                  Alastair Nottingham and
                  Jack W. Davidson and
                  Malathi Veeraraghavan},
  title        = {{PORTFILER:} Port-Level Network Profiling for Self-Propagating Malware
                  Detection},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {182--190},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705045},
  doi          = {10.1109/CNS53000.2021.9705045},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/OngunSMBOEHNDV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PaudelDMR21,
  author       = {Upakar Paudel and
                  Andy Dolan and
                  Suryadipta Majumdar and
                  Indrakshi Ray},
  title        = {Context-Aware IoT Device Functionality Extraction from Specifications
                  for Ensuring Consumer Security},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {155--163},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705050},
  doi          = {10.1109/CNS53000.2021.9705050},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/PaudelDMR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RoitburdOHC21,
  author       = {Gerbert Roitburd and
                  Matthias Ortmann and
                  Matthias Hollick and
                  Jiska Classen},
  title        = {Very Pwnable Network: Cisco AnyConnect Security Analysis},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {56--64},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705023},
  doi          = {10.1109/CNS53000.2021.9705023},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/RoitburdOHC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SchwarzATH21,
  author       = {Sara Beatriz Schwarz and
                  Dimitrios{-}Georgios Akestoridis and
                  Patrick Tague and
                  Hanan Hibshi},
  title        = {Hiding the Topology of an {IEEE} 802.15.4 Network with Limited Energy},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {74--82},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705054},
  doi          = {10.1109/CNS53000.2021.9705054},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SchwarzATH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SciancaleporeTR21,
  author       = {Savio Sciancalepore and
                  Pietro Tedeschi and
                  Usman Riasat and
                  Roberto Di Pietro},
  title        = {Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted
                  Channel Access},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {10--18},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705038},
  doi          = {10.1109/CNS53000.2021.9705038},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SciancaleporeTR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShahriarKRMC21,
  author       = {Md Hasan Shahriar and
                  Alvi Ataur Khalil and
                  Mohammad Ashiqur Rahman and
                  Mohammad Hossein Manshaei and
                  Dong Chen},
  title        = {iAttackGen: Generative Synthesis of False Data Injection Attacks in
                  Cyber-physical Systems},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {200--208},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705034},
  doi          = {10.1109/CNS53000.2021.9705034},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ShahriarKRMC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShariehF21,
  author       = {Salah Sharieh and
                  Alexander Ferworn},
  title        = {Securing APIs and Chaos Engineering},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {290--294},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705049},
  doi          = {10.1109/CNS53000.2021.9705049},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ShariehF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SlatteryTMGRB21,
  author       = {Oliver Slattery and
                  Xiao Tang and
                  Lijun Ma and
                  Thomas Gerrits and
                  Anouar Rahmouni and
                  Sumit Bhushan},
  title        = {The Quantum Communications and Networking Project at the Information
                  Technology Laboratory of {NIST}},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705051},
  doi          = {10.1109/CNS53000.2021.9705051},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SlatteryTMGRB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TanDZLGL21,
  author       = {Zhaowei Tan and
                  Boyan Ding and
                  Zhehui Zhang and
                  Qianru Li and
                  Yunqi Guo and
                  Songwu Lu},
  title        = {Device-Centric Detection and Mitigation of Diameter Signaling Attacks
                  against Mobile Core},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {29--37},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705031},
  doi          = {10.1109/CNS53000.2021.9705031},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/TanDZLGL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TrestioreanuNMS21,
  author       = {Lucian Trestioreanu and
                  Cristina Nita{-}Rotaru and
                  Aanchal Malhotra and
                  Radu State},
  title        = {{SPON:} Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant
                  Overlay},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {92--100},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705048},
  doi          = {10.1109/CNS53000.2021.9705048},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/TrestioreanuNMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WrightFGPDC21,
  author       = {Jordan Wright and
                  Zane Fink and
                  Michael Gowanlock and
                  Christopher Robert Philabaum and
                  Brian Donnelly and
                  Bertrand Cambou},
  title        = {A Symmetric Cipher Response-Based Cryptography Engine Accelerated
                  Using {GPGPU}},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {146--154},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705019},
  doi          = {10.1109/CNS53000.2021.9705019},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/WrightFGPDC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XuBS21,
  author       = {Zhifan Xu and
                  Melike Baykal{-}G{\"{u}}rsoy and
                  Predrag Spasojevic},
  title        = {A Game-Theoretic Approach for Probabilistic Cooperative Jamming Strategies
                  over Parallel Wireless Channels},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {47--55},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705044},
  doi          = {10.1109/CNS53000.2021.9705044},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/XuBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YangIWR21,
  author       = {Fangfang Yang and
                  Mohammad A. Islam and
                  Fan Wu and
                  Shaolei Ren},
  title        = {CompKey: Exploiting Computer's Electromagnetic Radiation for Secret
                  Key Generation},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {281--289},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705032},
  doi          = {10.1109/CNS53000.2021.9705032},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/YangIWR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangCMF21,
  author       = {Qisheng Zhang and
                  Jin{-}Hee Cho and
                  Terrence J. Moore and
                  Frederica Free{-}Nelson},
  title        = {{DREVAN:} Deep Reinforcement Learning-based Vulnerability-Aware Network
                  Adaptations for Resilient Networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {137--145},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705041},
  doi          = {10.1109/CNS53000.2021.9705041},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangCMF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2021,
  title        = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021},
  doi          = {10.1109/CNS53000.2021},
  isbn         = {978-1-6654-4496-5},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/0001BMLMERFMB20,
  author       = {Federico Mancini and
                  Solveig Bruvoll and
                  John Melrose and
                  Frederick A. Leve and
                  Logan O. Mailloux and
                  Raphael Ernst and
                  Kellyn Rein and
                  Stefano Fioravanti and
                  Diego Merani and
                  Robert Been},
  title        = {A Security Reference Model for Autonomous Vehicles in Military Operations},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162227},
  doi          = {10.1109/CNS48642.2020.9162227},
  timestamp    = {Thu, 13 Aug 2020 14:43:08 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/0001BMLMERFMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/0001CZL20,
  author       = {Ben Niu and
                  Yahong Chen and
                  Likun Zhang and
                  Fenghua Li},
  title        = {Membership Inference Attacks against MemGuard : {IEEE} {CNS} 20 Poster},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162283},
  doi          = {10.1109/CNS48642.2020.9162283},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/0001CZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/0004SZB20,
  author       = {Yuntao Wang and
                  Zhou Su and
                  Ning Zhang and
                  Abderrahim Benslimane},
  title        = {Sweet: Secure Wireless Energy Transfer with Electric Vehicles in Vehicular
                  Energy Networks},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162306},
  doi          = {10.1109/CNS48642.2020.9162306},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/0004SZB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/0007BPSS20,
  author       = {Jens M{\"{u}}ller and
                  Marcus Brinkmann and
                  Damian Poddebniak and
                  Sebastian Schinzel and
                  J{\"{o}}rg Schwenk},
  title        = {Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End
                  Encryption},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162218},
  doi          = {10.1109/CNS48642.2020.9162218},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/0007BPSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Al-ShaerSC20,
  author       = {Rawan Al{-}Shaer and
                  Jonathan M. Spring and
                  Eliana Christou},
  title        = {Learning the Associations of {MITRE} {ATT} {\&} {CK} Adversarial
                  Techniques},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162207},
  doi          = {10.1109/CNS48642.2020.9162207},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Al-ShaerSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Aliyu0YL20,
  author       = {Aliyu Aliyu and
                  Ying He and
                  Iryna Yevseyeva and
                  Cunjin Luo},
  title        = {Cyber Security Decision Making Informed by Cyber Threat Intelligence
                  {(CYDETI)} : {IEEE} {CNS} 20 Poster},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162162},
  doi          = {10.1109/CNS48642.2020.9162162},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Aliyu0YL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AyoadeASGAJKS20,
  author       = {Gbadebo Ayoade and
                  Khandakar Ashrafi Akbar and
                  Pracheta Sahoo and
                  Yang Gao and
                  Anmol Agarwal and
                  Kangkook Jee and
                  Latifur Khan and
                  Anoop Singhal},
  title        = {Evolving Advanced Persistent Threat Detection using Provenance Graph
                  and Metric Learning},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162264},
  doi          = {10.1109/CNS48642.2020.9162264},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AyoadeASGAJKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AzizTSP20,
  author       = {Ahmed Aziz and
                  Pietro Tedeschi and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {SecureAIS - Securing Pairwise Vessels Communications},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162320},
  doi          = {10.1109/CNS48642.2020.9162320},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AzizTSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BachlMFZ20,
  author       = {Maximilian Bachl and
                  Fares Meghdouri and
                  Joachim Fabini and
                  Tanja Zseby},
  title        = {SparseIDS: Learning Packet Sampling with Reinforcement Learning},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162253},
  doi          = {10.1109/CNS48642.2020.9162253},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BachlMFZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Beemer0KKY20,
  author       = {Allison Beemer and
                  Eric Graves and
                  J{\"{o}}rg Kliewer and
                  Oliver Kosut and
                  Paul L. Yu},
  title        = {Authentication and Partial Message Correction over Adversarial Multiple-Access
                  Channels},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162198},
  doi          = {10.1109/CNS48642.2020.9162198},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Beemer0KKY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BendaryK20,
  author       = {Ahmed S. Bendary and
                  C. Emre Koksal},
  title        = {Order-Optimal Scaling of Covert Communication over {MIMO} {AWGN} Channels},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162192},
  doi          = {10.1109/CNS48642.2020.9162192},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BendaryK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BergesSGGC20,
  author       = {Paul M. Berges and
                  Basavesh Ammanaghatta Shivakumar and
                  Timothy Graziano and
                  Ryan M. Gerdes and
                  Z. Berkay Celik},
  title        = {On the Feasibility of Exploiting Traffic Collision Avoidance System
                  Vulnerabilities},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162216},
  doi          = {10.1109/CNS48642.2020.9162216},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BergesSGGC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BurgessCOS20,
  author       = {Jonah Burgess and
                  Domhnall Carlin and
                  Philip O'Kane and
                  Sakir Sezer},
  title        = {REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162304},
  doi          = {10.1109/CNS48642.2020.9162304},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BurgessCOS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CarlucciCCR20,
  author       = {Mattia Carlucci and
                  Stefano Cecconello and
                  Mauro Conti and
                  Piero Romare},
  title        = {Eathentication: {A} Chewing-based Authentication Method},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162343},
  doi          = {10.1109/CNS48642.2020.9162343},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CarlucciCCR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CerviaBS20,
  author       = {Giulia Cervia and
                  Germ{\'{a}}n Bassi and
                  Mikael Skoglund},
  title        = {Secure Strong Coordination},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162268},
  doi          = {10.1109/CNS48642.2020.9162268},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CerviaBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChangPK020,
  author       = {Sang{-}Yoon Chang and
                  Younghee Park and
                  Nikhil Vijayakumar Kengalahalli and
                  Xiaobo Zhou},
  title        = {Query-Crafting DoS Threats Against Internet {DNS}},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162166},
  doi          = {10.1109/CNS48642.2020.9162166},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChangPK020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChaudharyOX20,
  author       = {Sujita Chaudhary and
                  Austin O'Brien and
                  Shengjie Xu},
  title        = {Automated Post-Breach Penetration Testing through Reinforcement Learning},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162301},
  doi          = {10.1109/CNS48642.2020.9162301},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChaudharyOX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChaulagainPPRCL20,
  author       = {Dewan Chaulagain and
                  Prabesh Poudel and
                  Prabesh Pathak and
                  Sankardas Roy and
                  Doina Caragea and
                  Guojun Liu and
                  Xinming Ou},
  title        = {Hybrid Analysis of Android Apps for Security Vetting using Deep Learning},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162341},
  doi          = {10.1109/CNS48642.2020.9162341},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChaulagainPPRCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenJMS20,
  author       = {Olga Chen and
                  Aaron D. Jaggard and
                  Catherine Meadows and
                  Michael C. Shlanta},
  title        = {NExtSteP: An Extensible Testbed for Network Covert Channels},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162247},
  doi          = {10.1109/CNS48642.2020.9162247},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChenJMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChoSKC20,
  author       = {Kyong{-}Tak Cho and
                  Kang G. Shin and
                  Yu Seung Kim and
                  Byung{-}Ho Cha},
  title        = {Off is Not Off: On the Security of Parked Vehicles},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162167},
  doi          = {10.1109/CNS48642.2020.9162167},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChoSKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CrescenzoBM20,
  author       = {Giovanni Di Crescenzo and
                  Lisa Bahler and
                  Allen McIntosh},
  title        = {Encrypted-Input Program Obfuscation: Simultaneous Security Against
                  White-Box and Black-Box Attacks},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162267},
  doi          = {10.1109/CNS48642.2020.9162267},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CrescenzoBM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DOliveiraRHK20,
  author       = {Rafael G. L. D'Oliveira and
                  Salim El Rouayheb and
                  Daniel Heinlein and
                  David A. Karpuk},
  title        = {Notes on Communication and Computation in Secure Distributed Matrix
                  Multiplication},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162296},
  doi          = {10.1109/CNS48642.2020.9162296},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DOliveiraRHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DjosicNS20,
  author       = {Nebojsa Djosic and
                  Bojan Nokovic and
                  Salah Sharieh},
  title        = {Machine Learning in Action: Securing {IAM} {API} by Risk Authentication
                  Decision Engine},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162317},
  doi          = {10.1109/CNS48642.2020.9162317},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DjosicNS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FuQQA20,
  author       = {Shen Fu and
                  Dong Qin and
                  Daji Qiao and
                  George T. Amariucai},
  title        = {RUMBA-Mouse: Rapid User Mouse-Behavior Authentication Using a {CNN-RNN}
                  Approach},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162287},
  doi          = {10.1109/CNS48642.2020.9162287},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/FuQQA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Fukushi0AU20,
  author       = {Naoki Fukushi and
                  Daiki Chiba and
                  Mitsuaki Akiyama and
                  Masato Uchida},
  title        = {A Large-scale Analysis of Cloud Service Abuse},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162303},
  doi          = {10.1109/CNS48642.2020.9162303},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Fukushi0AU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GeganPGB20,
  author       = {Ross K. Gegan and
                  Brian Perry and
                  Dipak Ghosal and
                  Matt Bishop},
  title        = {Insider Attack Detection for Science DMZs Using System Performance
                  Data},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162260},
  doi          = {10.1109/CNS48642.2020.9162260},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GeganPGB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Grana20,
  author       = {Justin Grana},
  title        = {Perturbing Inputs to Prevent Model Stealing},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162336},
  doi          = {10.1109/CNS48642.2020.9162336},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Grana20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GrashoferTH20,
  author       = {Jan Grash{\"{o}}fer and
                  Christian Titze and
                  Hannes Hartenstein},
  title        = {Attacks on Dynamic Protocol Detection of Open Source Network Security
                  Monitoring Tools},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162332},
  doi          = {10.1109/CNS48642.2020.9162332},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GrashoferTH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GrittiFGPCKV20,
  author       = {Fabio Gritti and
                  Lorenzo Fontana and
                  Eric Gustafson and
                  Fabio Pagani and
                  Andrea Continella and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{SYMBION:} Interleaving Symbolic with Concrete Execution},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162164},
  doi          = {10.1109/CNS48642.2020.9162164},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GrittiFGPCKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HajarAK20,
  author       = {Muhammad Shadi Hajar and
                  M. Omar Al{-}Kadri and
                  Harsha K. Kalutarage},
  title        = {{ETAREE:} An Effective Trend-Aware Reputation Evaluation Engine for
                  Wireless Medical Sensor Networks},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162325},
  doi          = {10.1109/CNS48642.2020.9162325},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HajarAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HaradaTOM20,
  author       = {Takashi Harada and
                  Ken Tanaka and
                  Ryohei Ogasawara and
                  Kenji Mikawa},
  title        = {A Rule Reordering Method via Pairing Dependent Rules},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162170},
  doi          = {10.1109/CNS48642.2020.9162170},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HaradaTOM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Henze20,
  author       = {Martin Henze},
  title        = {The Quest for Secure and Privacy-preserving Cloud-based Industrial
                  Cooperation},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162199},
  doi          = {10.1109/CNS48642.2020.9162199},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Henze20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JandaJWB20,
  author       = {Carsten Rudolf Janda and
                  Eduard A. Jorswieck and
                  Moritz Wiese and
                  Holger Boche},
  title        = {Arbitrarily Varying Wiretap Channels with and without Non-Causal Side
                  Information at the Jammer},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162323},
  doi          = {10.1109/CNS48642.2020.9162323},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/JandaJWB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JiaoWWCAL020,
  author       = {Long Jiao and
                  Pu Wang and
                  Ning Wang and
                  Songlin Chen and
                  Amir Alipour{-}Fanid and
                  Junqing Le and
                  Kai Zeng},
  title        = {Efficient Physical Layer Group Key Generation in 5G Wireless Networks},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162261},
  doi          = {10.1109/CNS48642.2020.9162261},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/JiaoWWCAL020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JinLX20,
  author       = {Kun Jin and
                  Chaoyue Liu and
                  Cathy Xia},
  title        = {{OTDA:} a Unsupervised Optimal Transport framework with Discriminant
                  Analysis for Keystroke Inference},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162258},
  doi          = {10.1109/CNS48642.2020.9162258},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/JinLX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JoshiD20,
  author       = {Harshvardhan P. Joshi and
                  Rudra Dutta},
  title        = {Identifying {P2P} Communities in Network Traffic Using Measures of
                  Community Connections : {IEEE} {CNS} 20 Poster},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162244},
  doi          = {10.1109/CNS48642.2020.9162244},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/JoshiD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KabatianskyE20,
  author       = {Grigory Kabatiansky and
                  Elena Egorova},
  title        = {Adversarial multiple access channels and a new model of multimedia
                  fingerprinting coding},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162248},
  doi          = {10.1109/CNS48642.2020.9162248},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KabatianskyE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KilariYMX20,
  author       = {Vishnu Teja Kilari and
                  Ruozhou Yu and
                  Satyajayant Misra and
                  Guoliang Xue},
  title        = {{EARS:} Enabling Private Feedback Updates in Anonymous Reputation
                  Systems},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162328},
  doi          = {10.1109/CNS48642.2020.9162328},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KilariYMX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KustersRW20,
  author       = {Lieneke Kusters and
                  Alexandros Rikos and
                  Frans M. J. Willems},
  title        = {Modeling Temperature Behavior in the Helper Data for Secret-Key Binding
                  with {SRAM} PUFs},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162300},
  doi          = {10.1109/CNS48642.2020.9162300},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KustersRW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LeZ20,
  author       = {Duc C. Le and
                  Nur Zincir{-}Heywood},
  title        = {Exploring Adversarial Properties of Insider Threat Detection},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162254},
  doi          = {10.1109/CNS48642.2020.9162254},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LeZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LehmanALT20,
  author       = {Sarah M. Lehman and
                  Abrar S. Alrumayh and
                  Haibin Ling and
                  Chiu C. Tan},
  title        = {Stealthy Privacy Attacks Against Mobile {AR} Apps},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162330},
  doi          = {10.1109/CNS48642.2020.9162330},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LehmanALT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LeiTLX20,
  author       = {Xinyu Lei and
                  Guan{-}Hua Tu and
                  Alex X. Liu and
                  Tian Xie},
  title        = {Fast and Secure kNN Query Processing in Cloud Computing},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162307},
  doi          = {10.1109/CNS48642.2020.9162307},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LeiTLX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiKPY20,
  author       = {He Li and
                  Vireshwar Kumar and
                  Jung{-}Min Jerry Park and
                  Yaling Yang},
  title        = {Cumulative Message Authentication Codes for Resource-Constrained Networks},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162217},
  doi          = {10.1109/CNS48642.2020.9162217},
  timestamp    = {Sat, 26 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiKPY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiL20,
  author       = {Guanjie Li and
                  Chengzhe Lai},
  title        = {Platoon Handover Authentication in 5G-V2X : {IEEE} {CNS} 20 Poster},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162271},
  doi          = {10.1109/CNS48642.2020.9162271},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiaoSKC20,
  author       = {Jiachun Liao and
                  Lalitha Sankar and
                  Oliver Kosut and
                  Fl{\'{a}}vio P. Calmon},
  title        = {Maximal {\(\alpha\)}-Leakage and its Properties},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162168},
  doi          = {10.1109/CNS48642.2020.9162168},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiaoSKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiuZ20,
  author       = {Pinglan Liu and
                  Wensheng Zhang},
  title        = {Game Theoretic Approach for Secure and Efficient Heavy-Duty Smart
                  Contracts},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162290},
  doi          = {10.1109/CNS48642.2020.9162290},
  timestamp    = {Wed, 13 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiuZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MaillouxM20,
  author       = {Logan O. Mailloux and
                  Robert F. Mills},
  title        = {Autonomous Space Resupply Vehicle Systems Security Design Principle
                  Case Study},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162169},
  doi          = {10.1109/CNS48642.2020.9162169},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MaillouxM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MamunGMKK20,
  author       = {Sayed Ashraf Mamun and
                  Amlan Ganguly and
                  Panos P. Markopoulos and
                  Andres Kwasinski and
                  Minseok Kwon},
  title        = {Security Vulnerabilities of Server-Centric Wireless Datacenters},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162233},
  doi          = {10.1109/CNS48642.2020.9162233},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/MamunGMKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MergendahlL20,
  author       = {Samuel Mergendahl and
                  Jun Li},
  title        = {Rapid: Robust and Adaptive Detection of Distributed Denial-of-Service
                  Traffic from the Internet of Things},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162278},
  doi          = {10.1109/CNS48642.2020.9162278},
  timestamp    = {Wed, 20 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MergendahlL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Naraparaju20,
  author       = {Shriti Naraparaju},
  title        = {Fingerprinting Voice Applications on Smart Speakers over Encrypted
                  Traffic},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162257},
  doi          = {10.1109/CNS48642.2020.9162257},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Naraparaju20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/NessaHF20,
  author       = {Ahasanun Nessa and
                  Fatima Hussain and
                  Xavier N. Fernando},
  title        = {Adaptive Latency Reduction in LoRa for Mission Critical Communications
                  in Mines},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162318},
  doi          = {10.1109/CNS48642.2020.9162318},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/NessaHF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/NewazSBU20,
  author       = {A. K. M. Iqtidar Newaz and
                  Amit Kumar Sikder and
                  Leonardo Babun and
                  A. Selcuk Uluagac},
  title        = {{HEKA:} {A} Novel Intrusion Detection System for Attacks to Personal
                  Medical Devices},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162311},
  doi          = {10.1109/CNS48642.2020.9162311},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/NewazSBU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Nukala20,
  author       = {Venkata Sai Krishna Avinash Nukala},
  title        = {Website Cryptojacking Detection Using Machine Learning : {IEEE} {CNS}
                  20 Poster},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162342},
  doi          = {10.1109/CNS48642.2020.9162342},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Nukala20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/NwekeW20,
  author       = {Livinus Obiora Nweke and
                  Stephen D. Wolthusen},
  title        = {Modelling Adversarial Flow in Software-Defined Industrial Control
                  Networks Using a Queueing Network Model},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162191},
  doi          = {10.1109/CNS48642.2020.9162191},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/NwekeW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/OxfordPR20,
  author       = {Michael Oxford and
                  David Parker and
                  Mark Ryan},
  title        = {Quantitative Verification of Certificate Transparency Gossip Protocols},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162197},
  doi          = {10.1109/CNS48642.2020.9162197},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/OxfordPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PennekampAMMPW20,
  author       = {Jan Pennekamp and
                  Fritz Alder and
                  Roman Matzutt and
                  Jan Tobias M{\"{u}}hlberg and
                  Frank Piessens and
                  Klaus Wehrle},
  title        = {Secure End-to-End Sensing in Supply Chains},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162337},
  doi          = {10.1109/CNS48642.2020.9162337},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PennekampAMMPW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PhamACCVKL20,
  author       = {Luan Huy Pham and
                  Massimiliano Albanese and
                  Ritu Chadha and
                  Cho{-}Yu Jason Chiang and
                  Sridhar Venkatesan and
                  Charles A. Kamhoua and
                  Nandi Leslie},
  title        = {A Quantitative Framework to Model Reconnaissance by Stealthy Attackers
                  and Support Deception-Based Defenses},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162298},
  doi          = {10.1109/CNS48642.2020.9162298},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PhamACCVKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PurwantoPBJ20,
  author       = {Rizka Purwanto and
                  Arindam Pal and
                  Alan Blair and
                  Sanjay Jha},
  title        = {PhishZip: {A} New Compression-based Algorithm for Detecting Phishing
                  Websites},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162211},
  doi          = {10.1109/CNS48642.2020.9162211},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PurwantoPBJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Saedi0PSUSBH20,
  author       = {Mohammad Saedi and
                  Adrian Moore and
                  Philip Perry and
                  Mohammad Shojafar and
                  Hanif Ullah and
                  Jonathan Synnott and
                  Ruth Brown and
                  Ian Herwono},
  title        = {Generation of realistic signal strength measurements for a 5G Rogue
                  Base Station attack scenario},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162275},
  doi          = {10.1109/CNS48642.2020.9162275},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Saedi0PSUSBH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SajidWAAA20,
  author       = {Md Sajidul Islam Sajid and
                  Jinpeng Wei and
                  Md Rabbi Alam and
                  Ehsan Aghaei and
                  Ehab Al{-}Shaer},
  title        = {DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid
                  Analysis of Malware},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162202},
  doi          = {10.1109/CNS48642.2020.9162202},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SajidWAAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SallsMDSKV20,
  author       = {Christopher Salls and
                  Aravind Machiry and
                  Adam Doup{\'{e}} and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Exploring Abstraction Functions in Fuzzing},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162273},
  doi          = {10.1109/CNS48642.2020.9162273},
  timestamp    = {Fri, 14 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SallsMDSKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SenigagliesiBG20,
  author       = {Linda Senigagliesi and
                  Marco Baldi and
                  Ennio Gambi},
  title        = {Physical Layer Authentication Techniques based on Machine Learning
                  with Data Compression},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162280},
  doi          = {10.1109/CNS48642.2020.9162280},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SenigagliesiBG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SeyitogluYO20,
  author       = {Efe U. A. Seyitoglu and
                  Attila A. Yavuz and
                  Muslum Ozgur Ozmen},
  title        = {Compact and Resilient Cryptographic Tools for Digital Forensics},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162236},
  doi          = {10.1109/CNS48642.2020.9162236},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SeyitogluYO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SeymenAL20,
  author       = {Beste Seymen and
                  Duygu Karaoglan Altop and
                  Albert Levi},
  title        = {Augmented Randomness for Secure Key Agreement using Physiological
                  Signals},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162286},
  doi          = {10.1109/CNS48642.2020.9162286},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SeymenAL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SoroushAMIMGFRB20,
  author       = {Hamed Soroush and
                  Massimiliano Albanese and
                  Milad Asgari Mehrabadi and
                  Ibifubara Iganibo and
                  Marc Mosko and
                  Jason H. Gao and
                  David J. Fritz and
                  Shantanu Rane and
                  Eric Bier},
  title        = {{SCIBORG:} Secure Configurations for the IoT Based on optimization
                  and Reasoning on Graphs},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162256},
  doi          = {10.1109/CNS48642.2020.9162256},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SoroushAMIMGFRB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SpenskyMBLHKV20,
  author       = {Chad Spensky and
                  Aravind Machiry and
                  Marcel Busch and
                  Kevin Leach and
                  Rick Housley and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {{TRUST.IO:} Protecting Physical Interfaces on Cyber-physical Systems},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162246},
  doi          = {10.1109/CNS48642.2020.9162246},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SpenskyMBLHKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Sun0020,
  author       = {Jianhua Sun and
                  Kun Sun and
                  Qi Li},
  title        = {Towards a Believable Decoy System: Replaying Network Activities from
                  Real System},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162163},
  doi          = {10.1109/CNS48642.2020.9162163},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Sun0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TabajaC20,
  author       = {Ali Tabaja and
                  Reuven Cohen},
  title        = {When the Network of a Smart City Is Not So Smart},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162226},
  doi          = {10.1109/CNS48642.2020.9162226},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TabajaC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TabibanJZP0D20,
  author       = {Azadeh Tabiban and
                  Yosr Jarraya and
                  Mengyuan Zhang and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Catching Falling Dominoes: Cloud Management-Level Provenance Analysis
                  with Application to OpenStack},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162251},
  doi          = {10.1109/CNS48642.2020.9162251},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TabibanJZP0D20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TahsiniDGA20,
  author       = {Alireza Tahsini and
                  Noah Dunstatter and
                  Mina Guirguis and
                  Chuadhry Mujeeb Ahmed},
  title        = {DeepBLOC: {A} Framework for Securing {CPS} through Deep Reinforcement
                  Learning on Stochastic Games},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162219},
  doi          = {10.1109/CNS48642.2020.9162219},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TahsiniDGA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TkaucTHA20,
  author       = {Nathalie Tkauc and
                  Thao Tran and
                  Kevin Hernandez{-}Diaz and
                  Fernando Alonso{-}Fernandez},
  title        = {Cloud-Based Face and Speech Recognition for Access Control Applications},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162165},
  doi          = {10.1109/CNS48642.2020.9162165},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TkaucTHA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WalkupEXUL20,
  author       = {Gregory Walkup and
                  Sriharsha Etigowni and
                  Dongyan Xu and
                  Vincent Urias and
                  Han W. Lin},
  title        = {Forensic Investigation of Industrial Control Systems Using Deterministic
                  Replay},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162232},
  doi          = {10.1109/CNS48642.2020.9162232},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WalkupEXUL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangLLJLZ20,
  author       = {Ning Wang and
                  Junqing Le and
                  Weiwei Li and
                  Long Jiao and
                  Zhihao Li and
                  Kai Zeng},
  title        = {Privacy Protection and Efficient Incumbent Detection in Spectrum Sharing
                  Based on Federated Learning},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162291},
  doi          = {10.1109/CNS48642.2020.9162291},
  timestamp    = {Mon, 17 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangLLJLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangW0BJ20,
  author       = {Xinda Wang and
                  Shu Wang and
                  Kun Sun and
                  Archer L. Batcheller and
                  Sushil Jajodia},
  title        = {A Machine Learning Approach to Classify Security Patches into Vulnerability
                  Types},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162237},
  doi          = {10.1109/CNS48642.2020.9162237},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/WangW0BJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Wilkens020,
  author       = {Florian Wilkens and
                  Mathias Fischer},
  title        = {Towards Data-Driven Characterization of Brute-Force Attackers},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162326},
  doi          = {10.1109/CNS48642.2020.9162326},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Wilkens020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WuWS20,
  author       = {Benjamin Wu and
                  Aaron B. Wagner and
                  G. Edward Suh},
  title        = {Optimal Mechanisms Under Maximal Leakage},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162276},
  doi          = {10.1109/CNS48642.2020.9162276},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WuWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangHML20,
  author       = {Fengli Zhang and
                  Philip Dale Huff and
                  Kylie McClanahan and
                  Qinghua Li},
  title        = {A Machine Learning-based Approach for Automated Vulnerability Remediation
                  Analysis},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162309},
  doi          = {10.1109/CNS48642.2020.9162309},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangHML20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangL20,
  author       = {Fengli Zhang and
                  Qinghua Li},
  title        = {Dynamic Risk-Aware Patch Scheduling},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162225},
  doi          = {10.1109/CNS48642.2020.9162225},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2020,
  title        = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9153729/proceeding},
  isbn         = {978-1-7281-4760-4},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AkkayaBSUM19,
  author       = {Kemal Akkaya and
                  Vashish Baboolal and
                  Nico Saputro and
                  A. Selcuk Uluagac and
                  Hamid Menouar},
  title        = {Privacy-Preserving Control of Video Transmissions for Drone-based
                  Intelligent Transportation Systems},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802665},
  doi          = {10.1109/CNS.2019.8802665},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AkkayaBSUM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlbakriHM19,
  author       = {Ashwag Albakri and
                  Lein Harn and
                  Mahesh Maddumala},
  title        = {Polynomial-based Lightweight Key Management in a Permissioned Blockchain},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802723},
  doi          = {10.1109/CNS.2019.8802723},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlbakriHM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Alipour-FanidDW19,
  author       = {Amir Alipour{-}Fanid and
                  Monireh Dabaghchian and
                  Ning Wang and
                  Pu Wang and
                  Liang Zhao and
                  Kai Zeng},
  title        = {Machine Learning-Based Delay-Aware {UAV} Detection Over Encrypted
                  Wi-Fi Traffic},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802721},
  doi          = {10.1109/CNS.2019.8802721},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Alipour-FanidDW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlmashaqbehKBC19,
  author       = {Ghada Almashaqbeh and
                  Kevin Kelley and
                  Allison Bishop and
                  Justin Cappos},
  title        = {CAPnet: {A} Defense Against Cache Accounting Attacks on Content Distribution
                  Networks},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {250--258},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802825},
  doi          = {10.1109/CNS.2019.8802825},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlmashaqbehKBC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AltaweelSGM19,
  author       = {Ala Altaweel and
                  Radu Stoleru and
                  Guofei Gu and
                  Arnab Kumar Maity},
  title        = {CollusiveHijack: {A} New Route Hijacking Attack and Countermeasures
                  in Opportunistic Networks},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {73--81},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802699},
  doi          = {10.1109/CNS.2019.8802699},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AltaweelSGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Andriamanalimanana19,
  author       = {Bruno Andriamanalimanana and
                  Ali Tekeoglu and
                  Korkut Bekiroglu and
                  Saumendra Sengupta and
                  Chen{-}Fu Chiang and
                  Michael Reale and
                  Jorge E. Novillo},
  title        = {Symmetric kullback-leibler divergence of softmaxed distributions for
                  anomaly scores},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS44998.2019.8952588},
  doi          = {10.1109/CNS44998.2019.8952588},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Andriamanalimanana19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BeemerKKGY19,
  author       = {Allison Beemer and
                  Oliver Kosut and
                  J{\"{o}}rg Kliewer and
                  Eric Graves and
                  Paul L. Yu},
  title        = {Authentication Against a Myopic Adversary},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802705},
  doi          = {10.1109/CNS.2019.8802705},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/BeemerKKGY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BiryukovF19,
  author       = {Alex Biryukov and
                  Daniel Feher},
  title        = {Privacy and Linkability of Mining in Zcash},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {118--123},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802711},
  doi          = {10.1109/CNS.2019.8802711},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BiryukovF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ButunOG19,
  author       = {Ismail Butun and
                  Patrik {\"{O}}sterberg and
                  Mikael Gidlund},
  title        = {Preserving Location Privacy in Cyber-Physical Systems},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802666},
  doi          = {10.1109/CNS.2019.8802666},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ButunOG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CetinGL19,
  author       = {Cagri Cetin and
                  Dmitry B. Goldgof and
                  Jay Ligatti},
  title        = {SQL-Identifier Injection Attacks},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {151--159},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802743},
  doi          = {10.1109/CNS.2019.8802743},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CetinGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChaliseS19,
  author       = {Batu K. Chalise and
                  Brian M. Sadler},
  title        = {Joint Data and Tag Precoder Optimization for {MIMO} Physical Layer
                  Authentication with Embedded Fingerprinting},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802729},
  doi          = {10.1109/CNS.2019.8802729},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChaliseS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenDD19,
  author       = {Wenxin Chen and
                  Yingfei Dong and
                  Zhenhai Duan},
  title        = {Manipulating Drone Position Control},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {10--18},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802817},
  doi          = {10.1109/CNS.2019.8802817},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChenDD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChoiS0C19,
  author       = {SeokHwan Choi and
                  Jin{-}Myeong Shin and
                  Peng Liu and
                  Yoon{-}Ho Choi},
  title        = {Robustness Analysis of CNN-based Malware Family Classification Methods
                  Against Various Adversarial Attacks},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802809},
  doi          = {10.1109/CNS.2019.8802809},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChoiS0C19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CrescenzoKKS19,
  author       = {Giovanni Di Crescenzo and
                  Matluba Khodjaeva and
                  Delaram Kahrobaei and
                  Vladimir Shpilrain},
  title        = {Secure Delegation to a Single Malicious Server: Exponentiation in
                  RSA-type Groups},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802691},
  doi          = {10.1109/CNS.2019.8802691},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/CrescenzoKKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DevirGMN19,
  author       = {Nurit Devir and
                  Orna Grumberg and
                  Shaul Markovitch and
                  Gabi Nakibly},
  title        = {Topology-Agnostic Runtime Detection of {OSPF} Routing Attacks},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {277--285},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802826},
  doi          = {10.1109/CNS.2019.8802826},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DevirGMN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DuttaA19,
  author       = {Ashutosh Dutta and
                  Ehab Al{-}Shaer},
  title        = {"What", "Where", and "Why" Cybersecurity Controls to Enforce for Optimal
                  Risk Mitigation},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {160--168},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802745},
  doi          = {10.1109/CNS.2019.8802745},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DuttaA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Feng0JW19,
  author       = {Yebo Feng and
                  Jun Li and
                  Lei Jiao and
                  Xintao Wu},
  title        = {BotFlowMon: Learning-based, Content-Agnostic Identification of Social
                  Bot Traffic Flows},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {169--177},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802706},
  doi          = {10.1109/CNS.2019.8802706},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Feng0JW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GaihrePL19,
  author       = {Anil Gaihre and
                  Santosh Pandey and
                  Hang Liu},
  title        = {Deanonymizing Cryptocurrency With Graph Learning: The Promises and
                  Challenges},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802640},
  doi          = {10.1109/CNS.2019.8802640},
  timestamp    = {Wed, 12 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GaihrePL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GhalebTG19,
  author       = {Asem Ghaleb and
                  Issa Traor{\'{e}} and
                  Karim Ganame},
  title        = {A Framework Architecture for Agentless Cloud Endpoint Security Monitoring},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802828},
  doi          = {10.1109/CNS.2019.8802828},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GhalebTG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GuLC019,
  author       = {Xiaolan Gu and
                  Ming Li and
                  Yang Cao and
                  Li Xiong},
  title        = {Supporting Both Range Queries and Frequency Estimation with Local
                  Differential Privacy},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {124--132},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802778},
  doi          = {10.1109/CNS.2019.8802778},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/GuLC019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HalabiB19,
  author       = {Talal Halabi and
                  Martine Bella{\"{\i}}che},
  title        = {Security Risk-Aware Resource Provisioning Scheme for Cloud Computing
                  Infrastructures},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802752},
  doi          = {10.1109/CNS.2019.8802752},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/HalabiB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HanLDPSF19,
  author       = {Peiyi Han and
                  Chuanyi Liu and
                  Yingfei Dong and
                  Hezhong Pan and
                  QiYang Song and
                  Binxing Fang},
  title        = {FileCrypt: Transparent and Scalable Protection of Sensitive Data in
                  Browser-based Cloud Storage},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {46--54},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802814},
  doi          = {10.1109/CNS.2019.8802814},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HanLDPSF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HoangDL19,
  author       = {Tiep Minh Hoang and
                  Trung Q. Duong and
                  Sangarapillai Lambotharan},
  title        = {Secure Wireless Communication Using Support Vector Machines},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802716},
  doi          = {10.1109/CNS.2019.8802716},
  timestamp    = {Wed, 08 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/HoangDL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HuLZYTW19,
  author       = {Boyang Hu and
                  Qicheng Lin and
                  Yao Zheng and
                  Qiben Yan and
                  Matthew Troglia and
                  Qingyang Wang},
  title        = {Characterizing Location-based Mobile Tracking in Mobile Ad Networks},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {223--231},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802632},
  doi          = {10.1109/CNS.2019.8802632},
  timestamp    = {Wed, 29 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HuLZYTW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HuangLZY19,
  author       = {Qinlong Huang and
                  Nan Li and
                  Zhicheng Zhang and
                  Yixian Yang},
  title        = {Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted
                  Internet of Vehicles},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802649},
  doi          = {10.1109/CNS.2019.8802649},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HuangLZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JakariaRH19,
  author       = {A. H. M. Jakaria and
                  Mohammad Ashiqur Rahman and
                  Md. Golam Moula Mehedi Hasan},
  title        = {Safety Analysis of {AMI} Networks Through Smart Fraud Detection},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802845},
  doi          = {10.1109/CNS.2019.8802845},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/JakariaRH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KaiialiSK19,
  author       = {Mustafa Kaiiali and
                  Sakir Sezer and
                  Ayesha Khalid},
  title        = {Cloud computing in the quantum era},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS44998.2019.8952589},
  doi          = {10.1109/CNS44998.2019.8952589},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KaiialiSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KambouB19,
  author       = {Samy Kambou and
                  Ahmed Bouabdallah},
  title        = {Using Structural Diversity to Enforce Strong Authentication of Mobiles
                  to the Cloud},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802823},
  doi          = {10.1109/CNS.2019.8802823},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KambouB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KennedyLWLWS19,
  author       = {Sean Kennedy and
                  Haipeng Li and
                  Chenggang Wang and
                  Hao Liu and
                  Boyang Wang and
                  Wenhai Sun},
  title        = {I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home
                  Speakers},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {232--240},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802686},
  doi          = {10.1109/CNS.2019.8802686},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KennedyLWLWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KrauseUK19,
  author       = {Tim Krause and
                  Rafael Uetz and
                  Tim Kretschmann},
  title        = {Recognizing Email Spam from Meta Data Only},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {178--186},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802827},
  doi          = {10.1109/CNS.2019.8802827},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KrauseUK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiZLYZ19,
  author       = {Jie Li and
                  Lu Zhou and
                  Huaxin Li and
                  Lu Yan and
                  Haojin Zhu},
  title        = {Dynamic Traffic Feature Camouflaging via Generative Adversarial Networks},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {268--276},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802772},
  doi          = {10.1109/CNS.2019.8802772},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiZLYZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LinX0L19,
  author       = {Xuheng Lin and
                  Ronghua Xu and
                  Yu Chen and
                  J. Koji Lum},
  title        = {A Blockchain-Enabled Decentralized Time Banking for a New Social Value
                  System},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802734},
  doi          = {10.1109/CNS.2019.8802734},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LinX0L19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LingLCL0F19,
  author       = {Zhen Ling and
                  Zupei Li and
                  Chen Chen and
                  Junzhou Luo and
                  Wei Yu and
                  Xinwen Fu},
  title        = {I Know What You Enter on Gear {VR}},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {241--249},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802674},
  doi          = {10.1109/CNS.2019.8802674},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LingLCL0F19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiuSS19,
  author       = {Yaoqing Liu and
                  Guchuan Sun and
                  Stephanie Schuckers},
  title        = {Enabling Secure and Privacy Preserving Identity Management via Smart
                  Contract},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802771},
  doi          = {10.1109/CNS.2019.8802771},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiuSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiuWNWW19,
  author       = {Hao Liu and
                  Boyang Wang and
                  Nan Niu and
                  Shomir Wilson and
                  Xuetao Wei},
  title        = {Vaccine: : Obfuscating Access Pattern Against File-Injection Attacks},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {109--117},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802803},
  doi          = {10.1109/CNS.2019.8802803},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiuWNWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Ma019,
  author       = {Qiumao Ma and
                  Wensheng Zhang},
  title        = {Efficient and Accountable Oblivious Cloud Storage with Three Servers},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {37--45},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802848},
  doi          = {10.1109/CNS.2019.8802848},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Ma019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MayoucheSTCO19,
  author       = {Abderrahmane Mayouche and
                  Danilo Spano and
                  Christos G. Tsinos and
                  Symeon Chatzinotas and
                  Bj{\"{o}}rn E. Ottersten},
  title        = {{SER} -Constrained Symbol-Level Precoding for Physical-Layer Security},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802835},
  doi          = {10.1109/CNS.2019.8802835},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/MayoucheSTCO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MushtaqABALG19,
  author       = {Maria Mushtaq and
                  Ayaz Akram and
                  Muhammad Khurram Bhatti and
                  Usman Ali and
                  Vianney Lapotre and
                  Guy Gogniat},
  title        = {Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {64--72},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802805},
  doi          = {10.1109/CNS.2019.8802805},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MushtaqABALG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MuttavarapuDT19,
  author       = {Anudeep Sai Muttavarapu and
                  Ram Dantu and
                  Mark A. Thompson},
  title        = {Distributed Ledger for Spammers' Resume},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802789},
  doi          = {10.1109/CNS.2019.8802789},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MuttavarapuDT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/NguyenLDLC19,
  author       = {Quoc Phong Nguyen and
                  Kar Wai Lim and
                  Dinil Mon Divakaran and
                  Kian Hsiang Low and
                  Mun Choon Chan},
  title        = {{GEE:} {A} Gradient-based Explainable Variational Autoencoder for
                  Network Anomaly Detection},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {91--99},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802833},
  doi          = {10.1109/CNS.2019.8802833},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/NguyenLDLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/OkutanYMW19,
  author       = {Ahmet Okutan and
                  Shanchieh Jay Yang and
                  Katie McConky and
                  Gordon Werner},
  title        = {{CAPTURE:} Cyberattack Forecasting Using Non-Stationary Features with
                  Time Lags},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {205--213},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802639},
  doi          = {10.1109/CNS.2019.8802639},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/OkutanYMW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/OzmenYB19,
  author       = {Muslum Ozgur Ozmen and
                  Attila A. Yavuz and
                  Rouzbeh Behnia},
  title        = {Energy-Aware Digital Signatures for Embedded Medical Devices},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {55--63},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802675},
  doi          = {10.1109/CNS.2019.8802675},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/OzmenYB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PerazzoneYSB19,
  author       = {Jake Bailey Perazzone and
                  Paul L. Yu and
                  Brian M. Sadler and
                  Rick S. Blum},
  title        = {Fingerprint Embedding Authentication with Artificial Noise: {MISO}
                  Regime},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802636},
  doi          = {10.1109/CNS.2019.8802636},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PerazzoneYSB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PietroJLS19,
  author       = {Roberto Di Pietro and
                  Leonardo Jero and
                  Flavio Lombardi and
                  Agusti Solanas},
  title        = {{GPU} Algorithms for K-Anonymity in Microdata},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802735},
  doi          = {10.1109/CNS.2019.8802735},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/PietroJLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PietroOT19,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri and
                  Pietro Tedeschi},
  title        = {{JAM-ME:} Exploiting Jamming to Accomplish Drone Mission},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802717},
  doi          = {10.1109/CNS.2019.8802717},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/PietroOT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/QuanLWLZ19,
  author       = {Hanyu Quan and
                  Hao Liu and
                  Boyang Wang and
                  Ming Li and
                  Yuqing Zhang},
  title        = {Randex: Mitigating Range Injection Attacks on Searchable Encryption},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {133--141},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802641},
  doi          = {10.1109/CNS.2019.8802641},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/QuanLWLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/QuinkertLRKH19,
  author       = {Florian Quinkert and
                  Tobias Lauinger and
                  William K. Robertson and
                  Engin Kirda and
                  Thorsten Holz},
  title        = {It's Not what It Looks Like: Measuring Attacks and Defensive Registrations
                  of Homograph Domains},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {259--267},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802671},
  doi          = {10.1109/CNS.2019.8802671},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/QuinkertLRKH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SaadAM19,
  author       = {Muhammad Saad and
                  Ashar Ahmad and
                  Aziz Mohaisen},
  title        = {Fighting Fake News Propagation with Blockchains},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802670},
  doi          = {10.1109/CNS.2019.8802670},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SaadAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SattarM19,
  author       = {Danish Sattar and
                  Ashraf Matrawy},
  title        = {Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks
                  on 5G Core Network Slices},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {82--90},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802852},
  doi          = {10.1109/CNS.2019.8802852},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SattarM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SciancaleporeP19,
  author       = {Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {{DRAKE:} Distributed Relay-Assisted Key Establishment},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {100--108},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802764},
  doi          = {10.1109/CNS.2019.8802764},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SciancaleporeP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Shang019,
  author       = {Jiacheng Shang and
                  Jie Wu},
  title        = {A Usable Authentication System Using Wrist-Worn Photoplethysmography
                  Sensors on Smartwatches},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802738},
  doi          = {10.1109/CNS.2019.8802738},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Shang019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SiyariK19,
  author       = {Peyman Siyari and
                  Marwan Krunz},
  title        = {Linear Precoding with Friendly Jamming in Overloaded {MU-MIMO} Wiretap
                  Networks},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802693},
  doi          = {10.1109/CNS.2019.8802693},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SiyariK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TianYS19,
  author       = {Yifan Tian and
                  Jiawei Yuan and
                  Houbing Song},
  title        = {Secure and Reliable Decentralized Truth Discovery Using Blockchain},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802712},
  doi          = {10.1109/CNS.2019.8802712},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TianYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TiwariKATY19,
  author       = {Trishita Tiwari and
                  Avraham Klausner and
                  Mikhail Andreev and
                  Ari Trachtenberg and
                  Arkady Yerukhimovich},
  title        = {Location Leakage from Network Access Patterns},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {214--222},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802847},
  doi          = {10.1109/CNS.2019.8802847},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TiwariKATY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TuL19,
  author       = {Wenwen Tu and
                  Lifeng Lai},
  title        = {Secret Key and Private Key Capacities Over an Unauthenticated Public
                  Channel},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802730},
  doi          = {10.1109/CNS.2019.8802730},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TuL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangTZ19,
  author       = {Ning Wang and
                  Jie Tang and
                  Kai Zeng},
  title        = {Spoofing Attack Detection in Mm-Wave and Massive {MIMO} 5G Communication},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802768},
  doi          = {10.1109/CNS.2019.8802768},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangTZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Xiao0GPHL19,
  author       = {Mingyan Xiao and
                  Ming Li and
                  Linke Guo and
                  Miao Pan and
                  Zhu Han and
                  Pan Li},
  title        = {Securing Task Allocation in Mobile Crowd Sensing: An Incentive Design
                  Approach},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {19--27},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802697},
  doi          = {10.1109/CNS.2019.8802697},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Xiao0GPHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YangCC19,
  author       = {Huan Yang and
                  Liang Cheng and
                  Mooi Choo Chuah},
  title        = {Deep-Learning-Based Network Intrusion Detection for {SCADA} Systems},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802785},
  doi          = {10.1109/CNS.2019.8802785},
  timestamp    = {Wed, 12 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YangCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YingMBCBP19,
  author       = {Xuhang Ying and
                  Joanna Mazer and
                  Giuseppe Bernieri and
                  Mauro Conti and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {Detecting {ADS-B} Spoofing Attacks Using Deep Neural Networks},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {187--195},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802732},
  doi          = {10.1109/CNS.2019.8802732},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YingMBCBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Zha0GMC19,
  author       = {Zili Zha and
                  An Wang and
                  Yang Guo and
                  Doug Montgomery and
                  Songqing Chen},
  title        = {BotSifter: An SDN-based Online Bot Detection Framework in Data Centers},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {142--150},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802854},
  doi          = {10.1109/CNS.2019.8802854},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/Zha0GMC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangHLLZZ19,
  author       = {Lili Zhang and
                  Dianqi Han and
                  Ang Li and
                  Tao Li and
                  Yan Zhang and
                  Yanchao Zhang},
  title        = {WristUnlock: Secure and Usable Smartphone Unlocking with Wrist Wearables},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {28--36},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802715},
  doi          = {10.1109/CNS.2019.8802715},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangHLLZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhouHLPXY19,
  author       = {Xinyu Zhou and
                  Aiqun Hu and
                  Guyue Li and
                  Linning Peng and
                  Yuexiu Xing and
                  Jiabao Yu},
  title        = {Design of a Robust {RF} Fingerprint Generation and Classification
                  Scheme for Practical Device Identification},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {196--204},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802783},
  doi          = {10.1109/CNS.2019.8802783},
  timestamp    = {Tue, 13 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhouHLPXY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2019,
  title        = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8790401/proceeding},
  isbn         = {978-1-5386-7117-7},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/0001HS18,
  author       = {Ignacio Mart{\'{\i}}n and
                  Jos{\'{e}} Alberto Hern{\'{a}}ndez and
                  Sergio de los Santos},
  title        = {SignatureMiner: {A} Fast Anti-Virus Signature Intelligence Tool},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433141},
  doi          = {10.1109/CNS.2018.8433141},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/0001HS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/0017SLHT18,
  author       = {Ning Zhang and
                  Wenhai Sun and
                  Wenjing Lou and
                  Y. Thomas Hou and
                  Wade Trappe},
  title        = {{ROSTER:} Radio Context Attestation in Cognitive Radio Network},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433187},
  doi          = {10.1109/CNS.2018.8433187},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/0017SLHT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AdebayoRGN18,
  author       = {Abdulhamid Adebayo and
                  Danda B. Rawat and
                  Moses Garuba and
                  Laurent Njilla},
  title        = {Aggregated-Query-as-a-Secure-Service for {RF} Spectrum Database-Driven
                  Opportunistic Wireless Communications},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433129},
  doi          = {10.1109/CNS.2018.8433129},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AdebayoRGN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AdomnicaiFM18,
  author       = {Alexandre Adomnicai and
                  Jacques J. A. Fournier and
                  Laurent Masson},
  title        = {Hardware Security Threats Against Bluetooth Mesh Networks},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433184},
  doi          = {10.1109/CNS.2018.8433184},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AdomnicaiFM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlhanahnahLYZC18,
  author       = {Mohannad Alhanahnah and
                  Qicheng Lin and
                  Qiben Yan and
                  Ning Zhang and
                  Zhenxiang Chen},
  title        = {Efficient Signature Generation for Classifying Cross-Architecture
                  IoT Malware},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433203},
  doi          = {10.1109/CNS.2018.8433203},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlhanahnahLYZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AllamiMJ18,
  author       = {Ali Ataeemh Allami and
                  Mukesh K. Mohania and
                  Wei Jiang},
  title        = {Privacy-Preserving Watermarking Transformation Technique in a Distributed
                  Environment},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433162},
  doi          = {10.1109/CNS.2018.8433162},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AllamiMJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlshehriAAAFLZ18,
  author       = {Ali Alshehri and
                  Hani Alshahrani and
                  Abdulrahman Alzahrani and
                  Raed Alharthi and
                  Huirong Fu and
                  Anyi Liu and
                  Ye Zhu},
  title        = {{DOPA:} Detecting Open Ports in Android {OS}},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433207},
  doi          = {10.1109/CNS.2018.8433207},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlshehriAAAFLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AragonTMHR18,
  author       = {Santiago Aragon and
                  Marco Tiloca and
                  Max Maass and
                  Matthias Hollick and
                  Shahid Raza},
  title        = {{ACE} of Spades in the IoT Security Game: {A} Flexible IPsec Security
                  Profile for Access Control},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433209},
  doi          = {10.1109/CNS.2018.8433209},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AragonTMHR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BanihaniAAFC18,
  author       = {Abdelnasser Banihani and
                  Abdulrahman Alzahrani and
                  Raed Alharthi and
                  Huirong Fu and
                  George P. Corser},
  title        = {{T-PAAD:} Trajectory Privacy Attack on Autonomous Driving},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433168},
  doi          = {10.1109/CNS.2018.8433168},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BanihaniAAFC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BegnaRGN18,
  author       = {Geremew Begna and
                  Danda B. Rawat and
                  Moses Garuba and
                  Laurent Njilla},
  title        = {SecureCASH: Securing Context-Aware Distributed Storage and Query Processing
                  in Hybrid Cloud Framework},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433144},
  doi          = {10.1109/CNS.2018.8433144},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BegnaRGN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BelguithGCR18,
  author       = {Sana Belguith and
                  Sarada Prasad Gochhayat and
                  Mauro Conti and
                  Giovanni Russello},
  title        = {Emergency Access Control Management Via Attribute Based Encrypted
                  {QR} Codes},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433186},
  doi          = {10.1109/CNS.2018.8433186},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/BelguithGCR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChaY18,
  author       = {Shi{-}Cho Cha and
                  Kuo{-}Hui Yeh},
  title        = {An {ISO/IEC} 15408-2 Compliant Security Auditing System with Blockchain
                  Technology},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433185},
  doi          = {10.1109/CNS.2018.8433185},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ChaY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenDD18,
  author       = {Wenxin Chen and
                  Yingfei Dong and
                  Zhenhai Duan},
  title        = {Manipulating Drone Dynamic State Estimation to Compromise Navigation},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433205},
  doi          = {10.1109/CNS.2018.8433205},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChenDD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenLWLHC18,
  author       = {LiuFei Chen and
                  Yushan Li and
                  Hong Wen and
                  WenXin Lei and
                  Wenjing Hou and
                  Jie Chen},
  title        = {Block Chain Based Secure Scheme For Mobile Communication},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433155},
  doi          = {10.1109/CNS.2018.8433155},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChenLWLHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChiWD0R18,
  author       = {Haotian Chi and
                  Longfei Wu and
                  Xiaojiang Du and
                  Qiang Zeng and
                  E. Paul Ratazzi},
  title        = {e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable
                  Medical Devices},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433213},
  doi          = {10.1109/CNS.2018.8433213},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChiWD0R18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChuRLJ18,
  author       = {Xu Chu and
                  Na Ruan and
                  Ming Li and
                  Weijia Jia},
  title        = {Pseudonym Inference in Cooperative Vehicular Traffic Scenarios},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433132},
  doi          = {10.1109/CNS.2018.8433132},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ChuRLJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ContiGGT18,
  author       = {Mauro Conti and
                  Ankit Gangwal and
                  Sarada Prasad Gochhayat and
                  Gabriele Tolomei},
  title        = {Spot the Difference: Your Bucket is Leaking : {A} Novel Methodology
                  to Expose {A/B} Testing Effortlessly},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433122},
  doi          = {10.1109/CNS.2018.8433122},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ContiGGT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DongHLK18,
  author       = {Qiuxiang Dong and
                  Dijiang Huang and
                  Jim Luo and
                  Myong H. Kang},
  title        = {Achieving Fine-Grained Access Control with Discretionary User Revocation
                  over Cloud Data},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433128},
  doi          = {10.1109/CNS.2018.8433128},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DongHLK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DongZCLPW18,
  author       = {Jiankuo Dong and
                  Fangyu Zheng and
                  Juanjuan Cheng and
                  Jingqiang Lin and
                  Wuqiong Pan and
                  Ziyang Wang},
  title        = {Towards High-performance {X25519/448} Key Agreement in General Purpose
                  GPUs},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433161},
  doi          = {10.1109/CNS.2018.8433161},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DongZCLPW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DuanAIJ18,
  author       = {Qi Duan and
                  Ehab Al{-}Shaer and
                  Mazharul Islam and
                  Jafar Haadi Jafarian},
  title        = {{CONCEAL:} {A} Strategy Composition for Resilient Cyber Deception-Framework,
                  Metrics and Deployment},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433196},
  doi          = {10.1109/CNS.2018.8433196},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DuanAIJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FanKT0C18,
  author       = {Jingyao Fan and
                  Youssef Khazbak and
                  Jue Tian and
                  Ting Liu and
                  Guohong Cao},
  title        = {Mitigating Stealthy False Data Injection Attacks Against State Estimation
                  in Smart Grid},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433215},
  doi          = {10.1109/CNS.2018.8433215},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/FanKT0C18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GaoWGKTM18,
  author       = {Peng Gao and
                  Binghui Wang and
                  Neil Zhenqiang Gong and
                  Sanjeev R. Kulkarni and
                  Kurt Thomas and
                  Prateek Mittal},
  title        = {{SYBILFUSE:} Combining Local Attributes with Global Structure to Perform
                  Robust Sybil Detection},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433147},
  doi          = {10.1109/CNS.2018.8433147},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GaoWGKTM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GaoZAW18,
  author       = {Huan Gao and
                  Chunlei Zhang and
                  Muaz Ahmad and
                  Yongqiang Wang},
  title        = {Privacy-Preserving Average Consensus on Directed Graphs Using Push-Sum},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433217},
  doi          = {10.1109/CNS.2018.8433217},
  timestamp    = {Fri, 28 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GaoZAW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GopeS18,
  author       = {Prosanta Gope and
                  Biplab Sikdar},
  title        = {An Efficient Privacy-Preserving Dynamic Pricing-based Billing Scheme
                  for Smart Grids},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433191},
  doi          = {10.1109/CNS.2018.8433191},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GopeS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GuirguisTSNMJD18,
  author       = {Mina Guirguis and
                  Alireza Tahsini and
                  Khan Siddique and
                  Clara Novoa and
                  Justin Moore and
                  Christine Julien and
                  Noah Dunstatter},
  title        = {{BLOC:} {A} Game-Theoretic Approach to Orchestrate {CPS} against Cyber
                  Attacks},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433145},
  doi          = {10.1109/CNS.2018.8433145},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GuirguisTSNMJD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GuoCS18,
  author       = {Yingjie Guo and
                  Liwei Chen and
                  Gang Shi},
  title        = {Function-Oriented Programming: {A} New Class of Code Reuse Attack
                  in {C} Applications},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433189},
  doi          = {10.1109/CNS.2018.8433189},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GuoCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GuoG18,
  author       = {Yuanxiong Guo and
                  Yanmin Gong},
  title        = {Practical Collaborative Learning for Crowdsensing in the Internet
                  of Things with Differential Privacy},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433181},
  doi          = {10.1109/CNS.2018.8433181},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/GuoG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HaradaTM18,
  author       = {Takashi Harada and
                  Ken Tanaka and
                  Kenji Mikawa},
  title        = {Acceleration of Packet Classification via Inclusive Rules},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433137},
  doi          = {10.1109/CNS.2018.8433137},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HaradaTM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HasanSHSC18,
  author       = {Kamrul Hasan and
                  Sachin Shetty and
                  Amin Hassanzadeh and
                  Malek Ben Salem and
                  Jay Chen},
  title        = {Modeling Cost of Countermeasures in Software Defined Networking-enabled
                  Energy Delivery Systems},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433172},
  doi          = {10.1109/CNS.2018.8433172},
  timestamp    = {Mon, 30 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HasanSHSC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HeZLZ18,
  author       = {Fannv He and
                  Yuqing Zhang and
                  Huizheng Liu and
                  Wei Zhou},
  title        = {SCPN-based Game Model for Security Situational Awareness in the Intenet
                  of Things},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433188},
  doi          = {10.1109/CNS.2018.8433188},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HeZLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HuG18,
  author       = {Rui Hu and
                  Yanmin Gong},
  title        = {Secret Dispersion: Secure Data Delivery in Cyber Physical System},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433166},
  doi          = {10.1109/CNS.2018.8433166},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HuG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HuZYA0Z18,
  author       = {Boyang Hu and
                  Baojian Zhou and
                  Qiben Yan and
                  Adil Alim and
                  Feng Chen and
                  Huacheng Zeng},
  title        = {PSCluster: Differentially Private Spatial Cluster Detection for Mobile
                  Crowdsourcing Applications},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433174},
  doi          = {10.1109/CNS.2018.8433174},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HuZYA0Z18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JiangLT18,
  author       = {Bo Jiang and
                  Ming Li and
                  Ravi Tandon},
  title        = {Context-aware Data Aggregation with Localized Information Privacy},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433200},
  doi          = {10.1109/CNS.2018.8433200},
  timestamp    = {Fri, 14 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/JiangLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JiaoL18,
  author       = {Wang Jiao and
                  Victor O. K. Li},
  title        = {Support Vector Machine Detection of Data Framing Attack in Smart Grid},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433210},
  doi          = {10.1109/CNS.2018.8433210},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/JiaoL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JiaoTZ18,
  author       = {Long Jiao and
                  Jie Tang and
                  Kai Zeng},
  title        = {Physical Layer Key Generation Using Virtual AoA and AoD of mmWave
                  Massive {MIMO} Channel},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433175},
  doi          = {10.1109/CNS.2018.8433175},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/JiaoTZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JinLGY18,
  author       = {Wenqiang Jin and
                  Ming Li and
                  Linke Guo and
                  Lei Yang},
  title        = {{DPDA:} {A} Differentially Private Double Auction Scheme for Mobile
                  Crowd Sensing},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433135},
  doi          = {10.1109/CNS.2018.8433135},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/JinLGY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KhazbakFZC18,
  author       = {Youssef Khazbak and
                  Jingyao Fan and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {Preserving Location Privacy in Ride-Hailing Service},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433221},
  doi          = {10.1109/CNS.2018.8433221},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KhazbakFZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KongWLW18,
  author       = {Junli Kong and
                  Baocang Wang and
                  Caiyun Liu and
                  Gaofei Wu},
  title        = {An Approach for Predicting the Popularity of Online Security News
                  Articles},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433152},
  doi          = {10.1109/CNS.2018.8433152},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KongWLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LeiTLLX18,
  author       = {Xinyu Lei and
                  Guan{-}Hua Tu and
                  Alex X. Liu and
                  Chi{-}Yu Li and
                  Tian Xie},
  title        = {The Insecurity of Home Digital Voice Assistants - Vulnerabilities,
                  Attacks and Countermeasures},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433167},
  doi          = {10.1109/CNS.2018.8433167},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LeiTLLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiCCXCW18,
  author       = {Yushan Li and
                  LiuFei Chen and
                  Jie Chen and
                  FeiYi Xie and
                  Songlin Chen and
                  Hong Wen},
  title        = {A Low Complexity Feature Extraction for the {RF} Fingerprinting Process},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433156},
  doi          = {10.1109/CNS.2018.8433156},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiCCXCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiWX18,
  author       = {Dongfang Li and
                  Zhaoguo Wang and
                  Yibo Xue},
  title        = {Fine-grained Android Malware Detection based on Deep Learning},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433204},
  doi          = {10.1109/CNS.2018.8433204},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiWX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiYF18,
  author       = {Guoquan Li and
                  Zheng Yan and
                  Yulong Fu},
  title        = {A Study and Simulation Research of Blackhole Attack on Mobile AdHoc
                  Network},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433148},
  doi          = {10.1109/CNS.2018.8433148},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiYF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Liu18,
  author       = {Xingya Liu},
  title        = {Blind Rendezvous: {A} Promising Candidate of Secure Spectrum Access
                  for {D2D} communications in IoT},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433153},
  doi          = {10.1109/CNS.2018.8433153},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Liu18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiuL18,
  author       = {Pengfei Liu and
                  Ting Liu},
  title        = {Physical Intrusion Detection for Industrial Control System},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433194},
  doi          = {10.1109/CNS.2018.8433194},
  timestamp    = {Mon, 20 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiuL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiuWPWPW18,
  author       = {Qin Liu and
                  SiXia Wu and
                  Shuyu Pei and
                  Jie Wu and
                  Tao Peng and
                  Guojun Wang},
  title        = {Secure and Efficient Multi-Attribute Range Queries based on Comparable
                  Inner Product Encoding},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433179},
  doi          = {10.1109/CNS.2018.8433179},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiuWPWPW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LoreSR18,
  author       = {Kin Gwn Lore and
                  Devu Manikantan Shila and
                  Lingyu Ren},
  title        = {Detecting Data Integrity Attacks on Correlated Solar Farms Using Multi-layer
                  Data Driven Algorithm},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433159},
  doi          = {10.1109/CNS.2018.8433159},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LoreSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LundGHJW18,
  author       = {Mass Soldal Lund and
                  Jorgen Emil Gulland and
                  Odd Sveinung Hareide and
                  {\O}yvind J{\o}sok and
                  Karl Olav Carlsson Weum},
  title        = {Integrity of Integrated Navigation Systems},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433151},
  doi          = {10.1109/CNS.2018.8433151},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LundGHJW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MelchorDGLR18,
  author       = {Carlos Aguilar Melchor and
                  Jean{-}Christophe Deneuville and
                  Philippe Gaborit and
                  Tancr{\`{e}}de Lepoint and
                  Thomas Ricosset},
  title        = {Delegating Elliptic-Curve Operations with Homomorphic Encryption},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433140},
  doi          = {10.1109/CNS.2018.8433140},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MelchorDGLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/OzmenBY18,
  author       = {Muslum Ozgur Ozmen and
                  Rouzbeh Behnia and
                  Attila A. Yavuz},
  title        = {Compact Energy and Delay-Aware Authentication},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433134},
  doi          = {10.1109/CNS.2018.8433134},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/OzmenBY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PanZZW18,
  author       = {Shiran Pan and
                  Fangyu Zheng and
                  Wen Tao Zhu and
                  Qiongxiao Wang},
  title        = {Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative
                  Matrix Factorization},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433195},
  doi          = {10.1109/CNS.2018.8433195},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PanZZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Peng0C18,
  author       = {Mengfei Peng and
                  Wei Shi and
                  Jean{-}Pierre Corriveau},
  title        = {Repairing Faulty Nodes and Locating a Dynamically Spawned Black Hole
                  Search Using Tokens},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433160},
  doi          = {10.1109/CNS.2018.8433160},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Peng0C18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PietroOSS18,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri and
                  Xavier Salleras and
                  Matteo Signorini},
  title        = {N-Guard: a Solution to Secure Access to {NFC} tags},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433182},
  doi          = {10.1109/CNS.2018.8433182},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PietroOSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PletinckxTD18,
  author       = {Stijn Pletinckx and
                  Cyril Trap and
                  Christian Doerr},
  title        = {Malware Coordination using the Blockchain: An Analysis of the Cerber
                  Ransomware},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433199},
  doi          = {10.1109/CNS.2018.8433199},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PletinckxTD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/QinCWH18,
  author       = {Tao Qin and
                  Ruoya Chen and
                  Lei Wang and
                  Chao He},
  title        = {{LMHADC:} Lightweight Method for Host based Anomaly Detection in Cloud
                  using Mobile Agents},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433208},
  doi          = {10.1109/CNS.2018.8433208},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/QinCWH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/QinHJC18,
  author       = {Tao Qin and
                  Chao He and
                  Hezhi Jiang and
                  Ruoya Chen},
  title        = {Behavior Rhythm: An Effective Model for Massive Logs Characterizing
                  and Security Monitoring in Cloud},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433138},
  doi          = {10.1109/CNS.2018.8433138},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/QinHJC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RahbariLP18,
  author       = {Hanif Rahbari and
                  Jinshan Liu and
                  Jung{-}Min "Jerry" Park},
  title        = {SecureMatch: Scalable Authentication and Key Relegation for IoT Using
                  Physical-Layer Techniques},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433177},
  doi          = {10.1109/CNS.2018.8433177},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RahbariLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RekikGB18,
  author       = {Mouna Rekik and
                  Christophe Gransart and
                  Marion Berbineau},
  title        = {Cyber-Physical Security Risk Assessment for Train Control and Monitoring
                  Systems},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433201},
  doi          = {10.1109/CNS.2018.8433201},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RekikGB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SciancaleporeOP18,
  author       = {Savio Sciancalepore and
                  Gabriele Oligeri and
                  Roberto Di Pietro},
  title        = {Shooting to the Stars: Secure Location Verification via Meteor Burst
                  Communications},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433171},
  doi          = {10.1109/CNS.2018.8433171},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SciancaleporeOP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShresthaSS18,
  author       = {Prakash Shrestha and
                  Babins Shrestha and
                  Nitesh Saxena},
  title        = {Home Alone: The Insider Threat of Unattended Wearables and {A} Defense
                  using Audio Proximity},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433216},
  doi          = {10.1109/CNS.2018.8433216},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ShresthaSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SinghTMA18,
  author       = {Rajkarn Singh and
                  George Theodorakopoulos and
                  Mahesh K. Marina and
                  Myrto Arapinis},
  title        = {On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory
                  Data Sharing},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433178},
  doi          = {10.1109/CNS.2018.8433178},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SinghTMA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SuiZ18,
  author       = {Guangye Sui and
                  Yunlei Zhao},
  title        = {Revisiting {OAKE} in the eCK Security Model},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433130},
  doi          = {10.1109/CNS.2018.8433130},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SuiZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SunLG18,
  author       = {Mingshun Sun and
                  Ming Li and
                  Ryan M. Gerdes},
  title        = {Truth-aware Optimal Decision-making Framework with Driver Preferences
                  for {V2V} Communications},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433197},
  doi          = {10.1109/CNS.2018.8433197},
  timestamp    = {Tue, 18 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SunLG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SunZLH18,
  author       = {Wenhai Sun and
                  Ning Zhang and
                  Wenjing Lou and
                  Y. Thomas Hou},
  title        = {Tapping the Potential: Secure Chunk-based Deduplication of Encrypted
                  Data for Cloud Backup},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433173},
  doi          = {10.1109/CNS.2018.8433173},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SunZLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TabibanM0D18,
  author       = {Azadeh Tabiban and
                  Suryadipta Majumdar and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {{PERMON:} An OpenStack Middleware for Runtime Security Policy Enforcement
                  in Clouds},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433180},
  doi          = {10.1109/CNS.2018.8433180},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TabibanM0D18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangHCKS18,
  author       = {Xiao{-}Si Wang and
                  Ian Herwono and
                  Francesco Di Cerbo and
                  Paul Kearney and
                  Mark Shackleton},
  title        = {Enabling Cyber Security Data Sharing for Large-scale Enterprises Using
                  Managed Security Services},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433212},
  doi          = {10.1109/CNS.2018.8433212},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangHCKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangJZ18,
  author       = {Ning Wang and
                  Long Jiao and
                  Kai Zeng},
  title        = {Pilot Contamination Attack Detection for {NOMA} in Mm-Wave and Massive
                  {MIMO} 5G Communication},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433154},
  doi          = {10.1109/CNS.2018.8433154},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangJZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangLCLW18,
  author       = {Chen Wang and
                  Jian Liu and
                  Yingying Chen and
                  Hongbo Liu and
                  Yan Wang},
  title        = {Towards In-baggage Suspicious Object Detection Using Commodity WiFi},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433142},
  doi          = {10.1109/CNS.2018.8433142},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/WangLCLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangZYW18,
  author       = {Mingyue Wang and
                  Wen{-}Tao Zhu and
                  Shen Yan and
                  Qiongxiao Wang},
  title        = {SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio
                  Signals},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433202},
  doi          = {10.1109/CNS.2018.8433202},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangZYW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WeiQ18,
  author       = {Dongdi Wei and
                  Xiaofeng Qiu},
  title        = {Status-based Detection of malicious code in Internet of Things (IoT)
                  devices},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433183},
  doi          = {10.1109/CNS.2018.8433183},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WeiQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WenCSL18,
  author       = {Elliott Wen and
                  Jiannong Cao and
                  Jiaxing Shen and
                  Xuefeng Liu},
  title        = {Fraus: Launching Cost-efficient and Scalable Mobile Click Fraud Has
                  Never Been So Easy},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433126},
  doi          = {10.1109/CNS.2018.8433126},
  timestamp    = {Sat, 31 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WenCSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XieTLPLZ18,
  author       = {Tian Xie and
                  Guan{-}Hua Tu and
                  Chi{-}Yu Li and
                  Chunyi Peng and
                  Jiawei Li and
                  Mi Zhang},
  title        = {The Dark Side of Operational Wi-Fi Calling Services},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433136},
  doi          = {10.1109/CNS.2018.8433136},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XieTLPLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XinS18,
  author       = {Liangxiao Xin and
                  David Starobinski},
  title        = {Mitigation of Cascading Denial of Service Attacks on Wi-Fi Networks},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433124},
  doi          = {10.1109/CNS.2018.8433124},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XinS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XuLLLG18,
  author       = {Hao Xu and
                  Yu Long and
                  Zhiqiang Liu and
                  Zhen Liu and
                  Dawu Gu},
  title        = {Dynamic Practical Byzantine Fault Tolerance},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433150},
  doi          = {10.1109/CNS.2018.8433150},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XuLLLG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XuLLS18,
  author       = {Yifei Xu and
                  Ting Liu and
                  Pengfei Liu and
                  Hong Sun},
  title        = {A Search-based Firmware Code Analysis Method for IoT Devices},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433163},
  doi          = {10.1109/CNS.2018.8433163},
  timestamp    = {Mon, 20 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XuLLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YanSH18,
  author       = {Shiwei Yan and
                  Yong Shang and
                  Yanbo Huang},
  title        = {Social-aware Jamming Allocation for Physical-layer Security in {D2D}
                  Multicast Network},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433158},
  doi          = {10.1109/CNS.2018.8433158},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YanSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YangCC18,
  author       = {Huan Yang and
                  Liang Cheng and
                  Mooi Choo Chuah},
  title        = {Detecting Payload Attacks on Programmable Logic Controllers (PLCs)},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433146},
  doi          = {10.1109/CNS.2018.8433146},
  timestamp    = {Wed, 12 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YangCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YangL18,
  author       = {Lei Yang and
                  Fengjun Li},
  title        = {Cloud-Assisted Privacy-Preserving Classification for IoT Applications},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433157},
  doi          = {10.1109/CNS.2018.8433157},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YangL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YangWMYY18,
  author       = {Li Yang and
                  Teng Wei and
                  Jianfeng Ma and
                  Shui Yu and
                  Chao Yang},
  title        = {Inference Attack in Android Activity based on Program Fingerprint},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433169},
  doi          = {10.1109/CNS.2018.8433169},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/YangWMYY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YangZD18,
  author       = {Zhi Yang and
                  Yusi Zhang and
                  Yafei Dai},
  title        = {Defending against Social Network Sybils with Interaction Graph Embedding},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433127},
  doi          = {10.1109/CNS.2018.8433127},
  timestamp    = {Wed, 23 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YangZD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YaoZW18,
  author       = {Yao Yao and
                  Lipeng Zhu and
                  He Wang},
  title        = {Real-time Detection of Passive Backdoor Behaviors on Android System},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433190},
  doi          = {10.1109/CNS.2018.8433190},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/YaoZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YehK18,
  author       = {Chia{-}Yi Yeh and
                  Edward W. Knightly},
  title        = {Feasibility of Passive Eavesdropping in Massive {MIMO:} An Experimental
                  Approach},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433139},
  doi          = {10.1109/CNS.2018.8433139},
  timestamp    = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YehK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YuXK018,
  author       = {Ruozhou Yu and
                  Guoliang Xue and
                  Vishnu Teja Kilari and
                  Xiang Zhang},
  title        = {Deploying Robust Security in Internet of Things},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433219},
  doi          = {10.1109/CNS.2018.8433219},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YuXK018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YuYWWGLCTW18,
  author       = {Wenqian Yu and
                  Ping Yu and
                  Junyuan Wang and
                  Changzheng Wei and
                  Lu Gong and
                  Weigang Li and
                  Bo Cui and
                  Hari K. Tadepalli and
                  Brian Will},
  title        = {Protecting Your Own Private Key in Cloud: Security, Scalability and
                  Performance},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433170},
  doi          = {10.1109/CNS.2018.8433170},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/YuYWWGLCTW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YuanHLZZH18,
  author       = {Lizhou Yuan and
                  Yidan Hu and
                  Yunzhi Li and
                  Rui Zhang and
                  Yanchao Zhang and
                  Terri Hedgpeth},
  title        = {Secure RSS-Fingerprint-Based Indoor Positioning: Attacks and Countermeasures},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433131},
  doi          = {10.1109/CNS.2018.8433131},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YuanHLZZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhouZWHJ18,
  author       = {Anni Zhou and
                  Pan Zhou and
                  Dapeng Oliver Wu and
                  Yuchong Hu and
                  Shouling Ji},
  title        = {T-PriDO: {A} Tree-based Privacy-Preserving and Contextual Collaborative
                  Online Big Data Processing System},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433149},
  doi          = {10.1109/CNS.2018.8433149},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhouZWHJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2018,
  title        = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8410986/proceeding},
  isbn         = {978-1-5386-4586-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/0004K17,
  author       = {Xu Zhang and
                  Edward W. Knightly},
  title        = {Massive {MIMO} pilot distortion attack and zero-startup-cost detection:
                  Analysis and experiments},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228634},
  doi          = {10.1109/CNS.2017.8228634},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/0004K17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AbdelazizK17,
  author       = {Amr Abdelaziz and
                  C. Emre Koksal},
  title        = {Fundamental limits of covert communication over {MIMO} {AWGN} channel},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228657},
  doi          = {10.1109/CNS.2017.8228657},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AbdelazizK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AbubakerDA17,
  author       = {Nabil Abubaker and
                  Leonard Dervishi and
                  Erman Ayday},
  title        = {Privacy-preserving fog computing paradigm},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {502--509},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228709},
  doi          = {10.1109/CNS.2017.8228709},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AbubakerDA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AkgunKK17,
  author       = {Berk Akgun and
                  Marwan Krunz and
                  Onur Ozan Koyluoglu},
  title        = {Pilot contamination attacks in massive {MIMO} systems},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228655},
  doi          = {10.1109/CNS.2017.8228655},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AkgunKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AndersonM17,
  author       = {Blake Anderson and
                  David A. McGrew},
  title        = {{OS} fingerprinting: New techniques and a study of information gain
                  and obfuscation},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228647},
  doi          = {10.1109/CNS.2017.8228647},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AndersonM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AndrewsGL17,
  author       = {Seth Andrews and
                  Ryan M. Gerdes and
                  Ming Li},
  title        = {Towards physical layer identification of cognitive radio devices},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228658},
  doi          = {10.1109/CNS.2017.8228658},
  timestamp    = {Tue, 18 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AndrewsGL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AslCHS17,
  author       = {Farshad Rahimi Asl and
                  Fei Chiang and
                  Wenbo He and
                  Reza Samavi},
  title        = {Privacy aware web services in the cloud},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {458--466},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228682},
  doi          = {10.1109/CNS.2017.8228682},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AslCHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AslanM17,
  author       = {Mohamed Aslan and
                  Ashraf Matrawy},
  title        = {Could network view inconsistency affect virtualized network security
                  functions?},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {510--512},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228698},
  doi          = {10.1109/CNS.2017.8228698},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AslanM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BacisBBVFPRS17,
  author       = {Enrico Bacis and
                  Alan Barnett and
                  Andrew Byrne and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Stefano Paraboschi and
                  Marco Rosa and
                  Pierangela Samarati},
  title        = {Distributed shuffle index: Analysis and implementation in an industrial
                  testbed},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {396--397},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228695},
  doi          = {10.1109/CNS.2017.8228695},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BacisBBVFPRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BacisRS17,
  author       = {Enrico Bacis and
                  Marco Rosa and
                  Ali Sajjad},
  title        = {EncSwift and key management: An integrated approach in an industrial
                  setting},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {483--486},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228711},
  doi          = {10.1109/CNS.2017.8228711},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BacisRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BarrereL17,
  author       = {Mart{\'{\i}}n Barr{\`{e}}re and
                  Emil C. Lupu},
  title        = {Naggen: {A} network attack graph generation tool - {IEEE} {CNS} 17
                  poster},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {378--379},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228667},
  doi          = {10.1109/CNS.2017.8228667},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/BarrereL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BaurB17,
  author       = {Sebastian Baur and
                  Holger Boche},
  title        = {Storage of general data sources on a public database with security
                  and privacy constraints},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {555--559},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228678},
  doi          = {10.1109/CNS.2017.8228678},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/BaurB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BeckerGZ17,
  author       = {Daniela Becker and
                  Jorge Guajardo and
                  Karl{-}Heinz Zimmermann},
  title        = {Towards a new privacy-preserving social media advertising architecture
                  (invited position paper)},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {45--457},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228712},
  doi          = {10.1109/CNS.2017.8228712},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/BeckerGZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BhattacharjeeGS17,
  author       = {Shameek Bhattacharjee and
                  Nirnay Ghosh and
                  Vijay K. Shah and
                  Sajal K. Das},
  title        = {QnQ: {A} reputation model to secure mobile crowdsourcing applications
                  from incentive losses},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228635},
  doi          = {10.1109/CNS.2017.8228635},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BhattacharjeeGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BlassN17,
  author       = {Erik{-}Oliver Blass and
                  Guevara Noubir},
  title        = {Secure logging with crash tolerance},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228649},
  doi          = {10.1109/CNS.2017.8228649},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/BlassN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BoyarinovH17,
  author       = {Konstantin Boyarinov and
                  Aaron Hunter},
  title        = {Security and trust for surveillance cameras},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {384--385},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228676},
  doi          = {10.1109/CNS.2017.8228676},
  timestamp    = {Fri, 15 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BoyarinovH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BusireddygariK17,
  author       = {Prashanth Busireddygari and
                  Subhash C. Kak},
  title        = {Binary primes sequence for cryptography and secure communication},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {570--574},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228686},
  doi          = {10.1109/CNS.2017.8228686},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/BusireddygariK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenCHC17,
  author       = {Chang{-}Wu Chen and
                  Sang{-}Yoon Chang and
                  Yih{-}Chun Hu and
                  Yen{-}Wen Chen},
  title        = {Protecting vehicular networks privacy in the presence of a single
                  adversarial authority},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228648},
  doi          = {10.1109/CNS.2017.8228648},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ChenCHC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChengXJWSOZ17,
  author       = {Wei Cheng and
                  Aidong Xu and
                  Yixin Jiang and
                  Hong Wen and
                  Huanhuan Song and
                  Kai Ouyang and
                  Xiping Zhu},
  title        = {A method of reconciling the key discrepancy by exploiting unconditional
                  secure transmission},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {372--373},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228664},
  doi          = {10.1109/CNS.2017.8228664},
  timestamp    = {Tue, 24 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChengXJWSOZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChengXJWSOZ17a,
  author       = {Wei Cheng and
                  Aidong Xu and
                  Yixin Jiang and
                  Hong Wen and
                  Huanhuan Song and
                  Kai Ouyang and
                  Xiping Zhu},
  title        = {The realization of key extraction based on {USRP} and {OFDM} channel
                  response},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {374--375},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228665},
  doi          = {10.1109/CNS.2017.8228665},
  timestamp    = {Tue, 24 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChengXJWSOZ17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ClarkLO17,
  author       = {Gradeigh D. Clark and
                  Janne Lindqvist and
                  Antti Oulasvirta},
  title        = {Composition policies for gesture passwords: User choice, security,
                  usability and memorability},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228644},
  doi          = {10.1109/CNS.2017.8228644},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ClarkLO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Cornevaux-Juignet17,
  author       = {Franck Cornevaux{-}Juignet and
                  Matthieu Arzel and
                  Pierre{-}Henri Horrein and
                  Tristan Groleat and
                  Christian Person},
  title        = {Combining FPGAs and processors for high-throughput forensics {IEEE}
                  {CNS} 17 poster},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {388--389},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228684},
  doi          = {10.1109/CNS.2017.8228684},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Cornevaux-Juignet17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Cornevaux-Juignet17a,
  author       = {Franck Cornevaux{-}Juignet and
                  Matthieu Arzel and
                  Pierre{-}Henri Horrein and
                  Tristan Groleat and
                  Christian Person},
  title        = {Open-source flexible packet parser for high data rate agile network
                  probe},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {610--618},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228685},
  doi          = {10.1109/CNS.2017.8228685},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Cornevaux-Juignet17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CrescenzoKKS17,
  author       = {Giovanni Di Crescenzo and
                  Matluba Khodjaeva and
                  Delaram Kahrobaei and
                  Vladimir Shpilrain},
  title        = {Computing multiple exponentiations in discrete log and {RSA} groups:
                  From batch verification to batch delegation},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {531--539},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228702},
  doi          = {10.1109/CNS.2017.8228702},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/CrescenzoKKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DuL17,
  author       = {Wei Du and
                  Qinghua Li},
  title        = {Secure and efficient outsourcing of large-scale nonlinear programming},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228633},
  doi          = {10.1109/CNS.2017.8228633},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/DuL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FangML17,
  author       = {Song Fang and
                  Ian D. Markwood and
                  Yao Liu},
  title        = {Manipulatable wireless key establishment},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228625},
  doi          = {10.1109/CNS.2017.8228625},
  timestamp    = {Sat, 14 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/FangML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FreyBS17,
  author       = {Matthias Frey and
                  Igor Bjelakovic and
                  Slawomir Stanczak},
  title        = {{MAC} resolvability: First and second order results},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {560--564},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228683},
  doi          = {10.1109/CNS.2017.8228683},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/FreyBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FritschekW17,
  author       = {Rick Fritschek and
                  Gerhard Wunder},
  title        = {On full-duplex secure key generation with deterministic models},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {550--554},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228687},
  doi          = {10.1109/CNS.2017.8228687},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/FritschekW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GarnaevT17,
  author       = {Andrey Garnaev and
                  Wade Trappe},
  title        = {An OFDM-based dual radar/communication system facing uncertain jamming
                  power},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228632},
  doi          = {10.1109/CNS.2017.8228632},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/GarnaevT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GrissaYH17,
  author       = {Mohamed Grissa and
                  Attila A. Yavuz and
                  Bechir Hamdaoui},
  title        = {When the hammer meets the nail: Multi-server {PIR} for database-driven
                  {CRN} with location privacy assurance},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228646},
  doi          = {10.1109/CNS.2017.8228646},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GrissaYH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HabibCBP17,
  author       = {Bilal Habib and
                  Bertrand Cambou and
                  Duane Booher and
                  Christopher Robert Philabaum},
  title        = {Public key exchange scheme that is addressable {(PKA)}},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {392--393},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228693},
  doi          = {10.1109/CNS.2017.8228693},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/HabibCBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HaneyGT17,
  author       = {Julie M. Haney and
                  Simson L. Garfinkel and
                  Mary Frances Theofanos},
  title        = {Organizational practices in cryptographic development and testing},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228643},
  doi          = {10.1109/CNS.2017.8228643},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HaneyGT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HarshanCKH17,
  author       = {Jagadeesh Harshan and
                  Sang{-}Yoon Chang and
                  Seungmin Kang and
                  Yih{-}Chun Hu},
  title        = {Securing balise-based train control systems using cryptographic random
                  fountains},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {405--410},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228689},
  doi          = {10.1109/CNS.2017.8228689},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/HarshanCKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HouleARM17,
  author       = {J. P. Houle and
                  S. Ahmadi and
                  B. C. A. Robart and
                  Ashraf Matrawy},
  title        = {Leveraging inter-controller communication to MitigateDDoS attacks
                  in {SDN} networks},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {376--377},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228666},
  doi          = {10.1109/CNS.2017.8228666},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HouleARM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HuangG17,
  author       = {Zonghao Huang and
                  Yanmin Gong},
  title        = {Differential location privacy for crowdsourced spectrum sensing},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228652},
  doi          = {10.1109/CNS.2017.8228652},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/HuangG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/IyerAVM17,
  author       = {R. Padmavathi Iyer and
                  Pradeep K. Atrey and
                  Gaurav Varshney and
                  Manoj Misra},
  title        = {Email spoofing detection using volatile memory forensics},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {619--625},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228692},
  doi          = {10.1109/CNS.2017.8228692},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/IyerAVM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JiZW17,
  author       = {Yujie Ji and
                  Xinyang Zhang and
                  Ting Wang},
  title        = {Backdoor attacks against learning systems},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228656},
  doi          = {10.1109/CNS.2017.8228656},
  timestamp    = {Wed, 04 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/JiZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JinFPTMZL17,
  author       = {Kun Jin and
                  Si Fang and
                  Chunyi Peng and
                  Zhiyang Teng and
                  XuFei Mao and
                  Lan Zhang and
                  Xiangyang Li},
  title        = {ViViSnoop: Someone is snooping your typing without seeing it!},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228624},
  doi          = {10.1109/CNS.2017.8228624},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/JinFPTMZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KerglRR17,
  author       = {Dennis Kergl and
                  Robert Roedler and
                  Gabi Dreo Rodosek},
  title        = {VulMap: Global information security vulnerabilities {IEEE} {CNS} 17
                  poster},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {362--363},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228659},
  doi          = {10.1109/CNS.2017.8228659},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KerglRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KhavariBB17,
  author       = {Mani Khavari and
                  Sebastian Baur and
                  Holger Boche},
  title        = {Optimal capacity region for PUF-based authentication with a constraint
                  on the number of challenge-response pairs},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {575--579},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228679},
  doi          = {10.1109/CNS.2017.8228679},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KhavariBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KhazbakC17,
  author       = {Youssef Khazbak and
                  Guohong Cao},
  title        = {Deanonymizing mobility traces with co-location information},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228621},
  doi          = {10.1109/CNS.2017.8228621},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KhazbakC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KumarS17,
  author       = {R. James Ranjith Kumar and
                  Biplab Sikdar},
  title        = {Efficient detection of false data injection attacks on {AC} state
                  estimation in smart grids},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {411--415},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228707},
  doi          = {10.1109/CNS.2017.8228707},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KumarS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KyungHTDSZDA17,
  author       = {Sukwha Kyung and
                  Wonkyu Han and
                  Naveen Tiwari and
                  Vaibhav Hemant Dixit and
                  Lakshmi Srinivas and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  title        = {HoneyProxy: Design and implementation of next-generation honeynet
                  via {SDN}},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228653},
  doi          = {10.1109/CNS.2017.8228653},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KyungHTDSZDA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LawrenceHTZ17,
  author       = {Heather Lawrence and
                  Andrew Hughes and
                  Robert Tonic and
                  Cliff C. Zou},
  title        = {D-miner: {A} framework for mining, searching, visualizing, and alerting
                  on darknet events},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228628},
  doi          = {10.1109/CNS.2017.8228628},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LawrenceHTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LeeKKK17,
  author       = {Jong{-}Hoon Lee and
                  Young Soo Kim and
                  Jong{-}Hyun Kim and
                  Ik{-}Kyun Kim},
  title        = {Toward the {SIEM} architecture for cloud-based security services},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {398--399},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228696},
  doi          = {10.1109/CNS.2017.8228696},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LeeKKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LehmanT17,
  author       = {Sarah M. Lehman and
                  Chiu C. Tan},
  title        = {PrivacyManager: An access control framework for mobile augmented reality
                  applications},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228630},
  doi          = {10.1109/CNS.2017.8228630},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LehmanT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiaoWPSJXX17,
  author       = {Runfa Liao and
                  Hong Wen and
                  Fei Pan and
                  Huanhuan Song and
                  Yixin Jiang and
                  FeiYi Xie and
                  Aidong Xu},
  title        = {A physical layer secure transmission method based on channel prediction
                  and QoS},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {366--367},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228661},
  doi          = {10.1109/CNS.2017.8228661},
  timestamp    = {Tue, 24 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiaoWPSJXX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiuLSC17,
  author       = {Hongbo Liu and
                  Bo Liu and
                  Cong Shi and
                  Yingying Chen},
  title        = {Secret key distribution leveraging color shift over visible light
                  channel},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228626},
  doi          = {10.1109/CNS.2017.8228626},
  timestamp    = {Wed, 22 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiuLSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiuSW17,
  author       = {Changwei Liu and
                  Anoop Singhal and
                  Duminda Wijesekera},
  title        = {A layered graphical model for mission attack impact analysis},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {602--609},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228706},
  doi          = {10.1109/CNS.2017.8228706},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiuSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MandalMM017,
  author       = {Avradip Mandal and
                  John C. Mitchell and
                  Hart William Montgomery and
                  Arnab Roy},
  title        = {Privacy for targeted advertising},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {438--443},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228673},
  doi          = {10.1109/CNS.2017.8228673},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MandalMM017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MasriV17,
  author       = {Marmara El Masri and
                  Natalija Vlajic},
  title        = {Current state of client-side extensions aimed at protecting against
                  CSRF-like attacks},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {390--391},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228690},
  doi          = {10.1109/CNS.2017.8228690},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/MasriV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Mitchell17,
  author       = {Robert C. Mitchell},
  title        = {Epidemic-resistant configurations for intrusion detection systems},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {487--494},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228672},
  doi          = {10.1109/CNS.2017.8228672},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/Mitchell17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MitchellMJ17,
  author       = {Robert Mitchell and
                  Marci McBride and
                  John Jarocki},
  title        = {Linkography abstraction refinement and cyber security},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {595--601},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228675},
  doi          = {10.1109/CNS.2017.8228675},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/MitchellMJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/OzgurNSAS17,
  author       = {Utku Ozgur and
                  Harikrishnan T. Nair and
                  Aditya Sundararajan and
                  Kemal Akkaya and
                  Arif I. Sarwat},
  title        = {An efficient {MQTT} framework for control and protection of networked
                  cyber-physical systems},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {421--426},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228674},
  doi          = {10.1109/CNS.2017.8228674},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/OzgurNSAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PanWLJXOZ17,
  author       = {Fei Pan and
                  Hong Wen and
                  Runfa Liao and
                  Yixin Jiang and
                  Aidong Xu and
                  Kai Ouyang and
                  Xiping Zhu},
  title        = {Physical layer authentication based on channel information and machine
                  learning},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {364--365},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228660},
  doi          = {10.1109/CNS.2017.8228660},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PanWLJXOZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PassmannLS17,
  author       = {Steffen Passmann and
                  Anne Lauber{-}Roensberg and
                  Thorsten Strufe},
  title        = {Privacy-preserving audience measurement in practice - Opportunities
                  and challenges},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {444--449},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228680},
  doi          = {10.1109/CNS.2017.8228680},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PassmannLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PatilPSA17,
  author       = {Vikram Patil and
                  Shivam Parikh and
                  Priyanka Singh and
                  Pradeep K. Atrey},
  title        = {GeoSecure: Towards secure outsourcing of {GPS} data over cloud},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {495--501},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228699},
  doi          = {10.1109/CNS.2017.8228699},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PatilPSA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PawlickZ17,
  author       = {Jeffrey Pawlick and
                  Quanyan Zhu},
  title        = {Quantitative models of imperfect deception in network security using
                  signaling games with evidence {[IEEE} {CNS} 17 Poster]},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {394--395},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228694},
  doi          = {10.1109/CNS.2017.8228694},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/PawlickZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RefaeyLD17,
  author       = {Ahmed Refaey and
                  Khaled Loukhaoukha and
                  Adel Omar Dahmane},
  title        = {Cryptanalysis of stream cipher using density evolution},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {382--383},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228669},
  doi          = {10.1109/CNS.2017.8228669},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RefaeyLD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RingmannL17,
  author       = {Sandra Domenique Ringmann and
                  Hanno Langweg},
  title        = {Determining security requirements for cloud-supported routing of physical
                  goods},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {514--521},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228691},
  doi          = {10.1109/CNS.2017.8228691},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/RingmannL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RiosIMR17,
  author       = {Erkuden Rios and
                  Eider Iturbe and
                  Wissam Mallouli and
                  Massimiliano Rak},
  title        = {Dynamic security assurance in multi-cloud DevOps},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {467--475},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228701},
  doi          = {10.1109/CNS.2017.8228701},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/RiosIMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RothMM17,
  author       = {John D. Roth and
                  Jeremy Martin and
                  Travis Mayberry},
  title        = {A graph-theoretic approach to virtual access point correlation},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228645},
  doi          = {10.1109/CNS.2017.8228645},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/RothMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SeeligerSA17,
  author       = {Robert Seeliger and
                  Daniel Silhavy and
                  Stefan Arbanowski},
  title        = {Dynamic ad-insertion and content orchestration workflows through manifest
                  manipulation in {HLS} and {MPEG-DASH}},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {450--455},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228708},
  doi          = {10.1109/CNS.2017.8228708},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SeeligerSA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SongZWXJLCC17,
  author       = {Huanhuan Song and
                  Luping Zhang and
                  Hong Wen and
                  Aidong Xu and
                  Yixin Jiang and
                  Runfa Liao and
                  Songlin Chen and
                  Yi Chen},
  title        = {Performance analysis of cooperative secure transmission system},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {368--369},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228662},
  doi          = {10.1109/CNS.2017.8228662},
  timestamp    = {Tue, 24 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SongZWXJLCC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SunLG17,
  author       = {Mingshun Sun and
                  Ming Li and
                  Ryan M. Gerdes},
  title        = {A data trust framework for VANETs enabling false data detection and
                  secure vehicle tracking},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228654},
  doi          = {10.1109/CNS.2017.8228654},
  timestamp    = {Tue, 18 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SunLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SunSL17,
  author       = {Jianhua Sun and
                  Kun Sun and
                  Qi Li},
  title        = {CyberMoat: Camouflaging critical server infrastructures with large
                  scale decoy farms},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228642},
  doi          = {10.1109/CNS.2017.8228642},
  timestamp    = {Tue, 27 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SunSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SuzicRM17,
  author       = {Bojan Suzic and
                  Andreas Reiter and
                  Alexander Marsalek},
  title        = {Structuring the Scope: Enabling adaptive and multilateral authorization
                  management},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {522--530},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228700},
  doi          = {10.1109/CNS.2017.8228700},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SuzicRM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TahmasbiB17,
  author       = {Mehrdad Tahmasbi and
                  Matthieu R. Bloch},
  title        = {Covert secret key generation},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {540--544},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228681},
  doi          = {10.1109/CNS.2017.8228681},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/TahmasbiB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TaiebC17,
  author       = {Mohamed Haj Taieb and
                  Jean{-}Yves Chouinard},
  title        = {Physical layer security using {BCH} and {LDPC} codes with adaptive
                  granular {HARQ}},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {564--569},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228670},
  doi          = {10.1109/CNS.2017.8228670},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/TaiebC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TanTJ17,
  author       = {Hailun Tan and
                  Gene Tsudik and
                  Sanjay Jha},
  title        = {{MTRA:} Multiple-tier remote attestation in IoT networks},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228638},
  doi          = {10.1109/CNS.2017.8228638},
  timestamp    = {Tue, 29 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/TanTJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TianHY17,
  author       = {Yifan Tian and
                  Yantian Hou and
                  Jiawei Yuan},
  title        = {{CAPIA:} Cloud assisted privacy-preserving image annotation},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228627},
  doi          = {10.1109/CNS.2017.8228627},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/TianHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TuenoKBF17,
  author       = {Anselme Tueno and
                  Florian Kerschbaum and
                  Daniel Bernau and
                  Sara Foresti},
  title        = {Selective access for supply chain management in the cloud},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {476--482},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228710},
  doi          = {10.1109/CNS.2017.8228710},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/TuenoKBF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/UchitelevaSR17,
  author       = {Elena Uchiteleva and
                  Abdallah Shami and
                  Ahmed Refaey},
  title        = {Time-varying keys for encryption in WSNs: {IEEE} {CNS} 17 poster},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {380--381},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228668},
  doi          = {10.1109/CNS.2017.8228668},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/UchitelevaSR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangX0C17,
  author       = {Huangxin Wang and
                  Zhonghua Xi and
                  Fei Li and
                  Songqing Chen},
  title        = {WebTrap: {A} dynamic defense scheme against economic denial of sustainability
                  attacks},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228640},
  doi          = {10.1109/CNS.2017.8228640},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/WangX0C17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WongH17,
  author       = {Ken Wong and
                  Aaron Hunter},
  title        = {Bluetooth for decoy systems: {A} practical study},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {86--387},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228677},
  doi          = {10.1109/CNS.2017.8228677},
  timestamp    = {Fri, 15 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WongH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WongH17a,
  author       = {Kenneth C. K. Wong and
                  Aaron Hunter},
  title        = {Managing cybersecurity break-ins using bluetooth low energy devices
                  to verify attackers: {A} practical study},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {432--437},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228697},
  doi          = {10.1109/CNS.2017.8228697},
  timestamp    = {Fri, 15 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WongH17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WuMC17,
  author       = {Yuanyi Wu and
                  Dongyu Meng and
                  Hao Chen},
  title        = {Evaluating private modes in desktop and mobile browsers and their
                  resistance to fingerprinting},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228636},
  doi          = {10.1109/CNS.2017.8228636},
  timestamp    = {Wed, 20 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WuMC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XiangLL17,
  author       = {Liyao Xiang and
                  Baochun Li and
                  Bo Li},
  title        = {Privacy-preserving inference in crowdsourcing systems},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228623},
  doi          = {10.1109/CNS.2017.8228623},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XiangLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XinLGL17,
  author       = {Jiajun Xin and
                  Ming Li and
                  Linke Guo and
                  Pan Li},
  title        = {Practical privacy-preserving spectrum query schemes for database-driven
                  CRNs with multiple service providers},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228651},
  doi          = {10.1109/CNS.2017.8228651},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XinLGL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XuZ17,
  author       = {Zhiheng Xu and
                  Quanyan Zhu},
  title        = {Secure and practical output feedback control for cloud-enabled cyber-physical
                  systems},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {416--420},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228703},
  doi          = {10.1109/CNS.2017.8228703},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/XuZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YanYVI17,
  author       = {Qiben Yan and
                  Hao Yang and
                  Mehmet C. Vuran and
                  Suat Irmak},
  title        = {{SPRIDE:} Scalable and private continual geo-distance evaluation for
                  precision agriculture},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228620},
  doi          = {10.1109/CNS.2017.8228620},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YanYVI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YangJXWWCOZ17,
  author       = {Qing Yang and
                  Yixin Jiang and
                  Aidong Xu and
                  Hong Wen and
                  Feng Wang and
                  LiuFei Chen and
                  Kai Ouyang and
                  Xiping Zhu},
  title        = {A model divides the mobile security level based on {SVM}},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {370--371},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228663},
  doi          = {10.1109/CNS.2017.8228663},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YangJXWWCOZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YauCYC17,
  author       = {Ken Yau and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu and
                  Chun{-}Fai Chan},
  title        = {Detecting anomalous behavior of {PLC} using semi-supervised machine
                  learning},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {580--585},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228713},
  doi          = {10.1109/CNS.2017.8228713},
  timestamp    = {Thu, 30 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YauCYC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YuanYLW17,
  author       = {Xu Yuan and
                  Xingliang Yuan and
                  Baochun Li and
                  Cong Wang},
  title        = {Secure multi-client data access with boolean queries in distributed
                  key-value stores},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228619},
  doi          = {10.1109/CNS.2017.8228619},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YuanYLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZengCLY17,
  author       = {Huacheng Zeng and
                  Chen Cao and
                  Hongxiang Li and
                  Qiben Yan},
  title        = {Enabling jamming-resistant communications in wireless {MIMO} networks},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228622},
  doi          = {10.1109/CNS.2017.8228622},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZengCLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangD17,
  author       = {Jiapeng Zhang and
                  Yingfei Dong},
  title        = {Cyber attacks on remote relays in smart grid},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228637},
  doi          = {10.1109/CNS.2017.8228637},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangJG17,
  author       = {Xiaonan Zhang and
                  Qi Jia and
                  Linke Guo},
  title        = {Secure and optimized unauthorized secondary user detection in dynamic
                  spectrum access},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228639},
  doi          = {10.1109/CNS.2017.8228639},
  timestamp    = {Thu, 01 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangJG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangL17,
  author       = {Fengli Zhang and
                  Qinghua Li},
  title        = {Deep learning-based data forgery detection in automatic generation
                  control},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {400--404},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228705},
  doi          = {10.1109/CNS.2017.8228705},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangRMP17,
  author       = {Liyang Zhang and
                  Francesco Restuccia and
                  Tommaso Melodia and
                  Scott M. Pudlewski},
  title        = {Learning to detect and mitigate cross-layer attacks in wireless networks:
                  Framework and applications},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228631},
  doi          = {10.1109/CNS.2017.8228631},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangRMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangV17,
  author       = {Ruochi Zhang and
                  Parv Venkitasubramaniam},
  title        = {A game theoretic approach to analyze false data injection and detection
                  in {LQG} system},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {427--431},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228704},
  doi          = {10.1109/CNS.2017.8228704},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangZYLHY17,
  author       = {Ning Zhang and
                  Ruide Zhang and
                  Qiben Yan and
                  Wenjing Lou and
                  Y. Thomas Hou and
                  Danfeng Yao},
  title        = {Black penguin: On the feasibility of detecting intrusion with homogeneous
                  memory},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {586--594},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228671},
  doi          = {10.1109/CNS.2017.8228671},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangZYLHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhengHSLYX17,
  author       = {Yuwei Zheng and
                  Lin Huang and
                  Haoqi Shan and
                  Jun Li and
                  Qing Yang and
                  Wenyuan Xu},
  title        = {Ghost telephonist impersonates you: Vulnerability in 4G {LTE} {CS}
                  fallback},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228629},
  doi          = {10.1109/CNS.2017.8228629},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhengHSLYX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhengJBR17,
  author       = {Zhiyuan Zheng and
                  Shan Jin and
                  Riccardo Bettati and
                  A. L. Narasimha Reddy},
  title        = {Securing cyber-physical systems with adaptive commensurate response},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228641},
  doi          = {10.1109/CNS.2017.8228641},
  timestamp    = {Sat, 23 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZhengJBR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhengLAW17,
  author       = {Qingji Zheng and
                  Qi Li and
                  Aytac Azgin and
                  Jian Weng},
  title        = {Data verification in information-centric networking with efficient
                  revocable certificateless signature},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228650},
  doi          = {10.1109/CNS.2017.8228650},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZhengLAW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZouLS17,
  author       = {Shaofeng Zou and
                  Yingbin Liang and
                  Shlomo Shamai},
  title        = {Gaussian fading channel with secrecy outside a bounded range},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {545--549},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228688},
  doi          = {10.1109/CNS.2017.8228688},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZouLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2017,
  title        = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8170165/proceeding},
  isbn         = {978-1-5386-0683-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AbdelazizKG16,
  author       = {Amr Abdelaziz and
                  Can Emre Koksal and
                  Hesham El Gamal},
  title        = {On the security of Angle of Arrival estimation},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {109--117},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860476},
  doi          = {10.1109/CNS.2016.7860476},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AbdelazizKG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AmbrosinHMCP16,
  author       = {Moreno Ambrosin and
                  Hossein Hosseini and
                  Kalikinkar Mandal and
                  Mauro Conti and
                  Radha Poovendran},
  title        = {Despicable me(ter): Anonymous and fine-grained metering data reporting
                  with dishonest meters},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {163--171},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860482},
  doi          = {10.1109/CNS.2016.7860482},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AmbrosinHMCP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AqilAKYSRLPSC16,
  author       = {Azeem Aqil and
                  Ahmed Osama Fathy Atya and
                  Srikanth V. Krishnamurthy and
                  Paul L. Yu and
                  Ananthram Swami and
                  Jeff Rowe and
                  Karl N. Levitt and
                  Alexander Poylisher and
                  Constantin Serban and
                  Ritu Chadha},
  title        = {Automated cross layer feature selection for effective intrusion detection
                  in networked systems},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {270--278},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860494},
  doi          = {10.1109/CNS.2016.7860494},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AqilAKYSRLPSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AroraVAM16,
  author       = {Shashank Arora and
                  Gaurav Varshney and
                  Pradeep K. Atrey and
                  Manoj Mishra},
  title        = {SecureCEdit: An approach for secure cloud-based document editing},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {561--564},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860548},
  doi          = {10.1109/CNS.2016.7860548},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AroraVAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AsselinAJ16,
  author       = {Eric Asselin and
                  Carlos Aguilar Melchor and
                  Gentian Jakllari},
  title        = {Anomaly detection for web server log reduction: {A} simple yet efficient
                  crawling based approach},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {586--590},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860553},
  doi          = {10.1109/CNS.2016.7860553},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AsselinAJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BabunAU16,
  author       = {Leonardo Babun and
                  Hidayet Aksu and
                  A. Selcuk Uluagac},
  title        = {A framework for counterfeit smart grid device detection},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {382--383},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860522},
  doi          = {10.1109/CNS.2016.7860522},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BabunAU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BadraYPC16,
  author       = {Nadim Badra and
                  Jiaxin Yang and
                  Ioannis N. Psaromiligkos and
                  Beno{\^{\i}}t Champagne},
  title        = {Robust and secure beamformer design for {MIMO} relaying with imperfect
                  eavesdropper {CSI}},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {442--449},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860534},
  doi          = {10.1109/CNS.2016.7860534},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BadraYPC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BendaryMD16,
  author       = {Ahmed S. Bendary and
                  Yahya Z. Mohasseb and
                  Hisham Dahshan},
  title        = {On the secure Degrees of Freedom for the K-user symmetric {MIMO} Wiretap
                  {MAC} channel},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {591--595},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860554},
  doi          = {10.1109/CNS.2016.7860554},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BendaryMD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BicakciYG16,
  author       = {Kemal Bicakci and
                  Davut Deniz Yavuz and
                  Sezin Gurkan},
  title        = {TwinCloud: Secure cloud sharing without explicit key management},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {581--585},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860552},
  doi          = {10.1109/CNS.2016.7860552},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BicakciYG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ButtnerH16,
  author       = {Carsten B{\"{u}}ttner and
                  Sorin A. Huss},
  title        = {Attribute-based authorization tickets for Car-to-X communication},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {234--242},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860490},
  doi          = {10.1109/CNS.2016.7860490},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ButtnerH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CaronLR16,
  author       = {Eddy Caron and
                  Arnaud Lefray and
                  Jonathan Rouzaud{-}Cornabas},
  title        = {Secured systems in Clouds with Model-Driven Orchestration},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {498--506},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860541},
  doi          = {10.1109/CNS.2016.7860541},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CaronLR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CervantesSLX16,
  author       = {Diana K. Anguiano Cervantes and
                  Ghouri Mohammad Saaduddin and
                  Yanyan Li and
                  Mengjun Xie},
  title        = {Comparison between fingerprint and behavioral biometric authentication
                  using 2D and 3D gestures},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {372--373},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860517},
  doi          = {10.1109/CNS.2016.7860517},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CervantesSLX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChangC16,
  author       = {Wentao Chang and
                  Songqing Chen},
  title        = {ExtensionGuard: Towards runtime browser extension information leakage
                  detection},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {154--162},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860481},
  doi          = {10.1109/CNS.2016.7860481},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChangC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenJSXC16,
  author       = {Kuan{-}yin Chen and
                  Anudeep Reddy Junuthula and
                  Ishant Kumar Siddhrau and
                  Yang Xu and
                  H. Jonathan Chao},
  title        = {SDNShield: Towards more comprehensive defense against DDoS attacks
                  on {SDN} control plane},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {28--36},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860467},
  doi          = {10.1109/CNS.2016.7860467},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ChenJSXC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChoPK16,
  author       = {Eunsang Cho and
                  Minkyung Park and
                  Ted Taekyoung Kwon},
  title        = {TwinPeaks: {A} new approach for certificateless public key distribution},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {10--18},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860465},
  doi          = {10.1109/CNS.2016.7860465},
  timestamp    = {Wed, 18 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChoPK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChukwuOM16,
  author       = {Julian Chukwu and
                  Ose Osamudiamen and
                  Ashraf Matrawy},
  title        = {IDSaaS in {SDN:} Intrusion Detection System as a service in software
                  defined networks},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {356--357},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860509},
  doi          = {10.1109/CNS.2016.7860509},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChukwuOM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChungFKIWS16,
  author       = {Key{-}whan Chung and
                  Valerio Formicola and
                  Zbigniew T. Kalbarczyk and
                  Ravishankar K. Iyer and
                  Alexander Withers and
                  Adam J. Slagell},
  title        = {Attacking supercomputers through targeted alteration of environmental
                  control: {A} data driven case study},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {406--410},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860528},
  doi          = {10.1109/CNS.2016.7860528},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChungFKIWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Crescenzo16,
  author       = {Giovanni Di Crescenzo},
  title        = {Server-assisted fully homomorphic computation protocols},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {534--542},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860545},
  doi          = {10.1109/CNS.2016.7860545},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Crescenzo16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DabaghchianAZW16,
  author       = {Monireh Dabaghchian and
                  Amir Alipour{-}Fanid and
                  Kai Zeng and
                  Qingsi Wang},
  title        = {Online learning-based optimal primary user emulation attacks in cognitive
                  radio networks},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {100--108},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860475},
  doi          = {10.1109/CNS.2016.7860475},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DabaghchianAZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DaltonA16,
  author       = {Brandon Dalton and
                  Nitin Agarwal},
  title        = {Analyzing deviant behaviors on social media using cyber forensics-based
                  methodologies},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {378--379},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860520},
  doi          = {10.1109/CNS.2016.7860520},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DaltonA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DeshmukhCHTB16,
  author       = {Siddhant Deshmukh and
                  Henry Carter and
                  Grant Hernandez and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  title        = {Efficient and secure template blinding for biometric authentication},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {480--488},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860539},
  doi          = {10.1109/CNS.2016.7860539},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DeshmukhCHTB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DoerrMKM16,
  author       = {Christian Doerr and
                  Mourad el Maouchi and
                  Sille Kamoen and
                  Jarno Moree},
  title        = {Scan prediction and reconnaissance mitigation through commodity graphics
                  cards},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {287--295},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860496},
  doi          = {10.1109/CNS.2016.7860496},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DoerrMKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FaisalCW16,
  author       = {Mustafa Faisal and
                  Alvaro A. C{\'{a}}rdenas and
                  Avishai Wool},
  title        = {Modeling Modbus {TCP} for intrusion detection},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {386--390},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860524},
  doi          = {10.1109/CNS.2016.7860524},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/FaisalCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FayedKL16,
  author       = {Abdallah Fayed and
                  Tamer Khattab and
                  Lifeng Lai},
  title        = {On secure communication over the Z-Channel},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {606--610},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860557},
  doi          = {10.1109/CNS.2016.7860557},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/FayedKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GeganAOG16,
  author       = {Ross K. Gegan and
                  Vishal Ahuja and
                  John D. Owens and
                  Dipak Ghosal},
  title        = {Real-time GPU-based timing channel detection using entropy},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {296--305},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860497},
  doi          = {10.1109/CNS.2016.7860497},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GeganAOG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GiontaEL16,
  author       = {Jason Gionta and
                  William Enck and
                  Per Larsen},
  title        = {Preventing kernel code-reuse attacks through disclosure resistant
                  code diversification},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {189--197},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860485},
  doi          = {10.1109/CNS.2016.7860485},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/GiontaEL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HaasKMMF16,
  author       = {Steffen Haas and
                  Shankar Karuppayah and
                  Selvakumar Manickam and
                  Max M{\"{u}}hlh{\"{a}}user and
                  Mathias Fischer},
  title        = {On the resilience of P2P-based botnet graphs},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {225--233},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860489},
  doi          = {10.1109/CNS.2016.7860489},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/HaasKMMF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HallgrenOS16,
  author       = {Per A. Hallgren and
                  Mart{\'{\i}}n Ochoa and
                  Andrei Sabelfeld},
  title        = {MaxPace: Speed-constrained location queries},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {136--144},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860479},
  doi          = {10.1109/CNS.2016.7860479},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/HallgrenOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HanHKKMK16,
  author       = {Mee Lan Han and
                  Hee Chan Han and
                  Ah Reum Kang and
                  Byung Il Kwak and
                  Aziz Mohaisen and
                  Huy Kang Kim},
  title        = {{WHAP:} Web-hacking profiling using Case-Based Reasoning},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {344--345},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860503},
  doi          = {10.1109/CNS.2016.7860503},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HanHKKMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HuangJXWCGGW16,
  author       = {Jianli Huang and
                  Yixin Jiang and
                  Aidong Xu and
                  Hong Wen and
                  Huajun Chen and
                  Xiaobin Guo and
                  Zewu Guan and
                  Zhiming Wang},
  title        = {Joint beamforming and antenna subarray formation for secrecy capacity
                  maximization in {MIMO} wiretap channels},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {368--369},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860515},
  doi          = {10.1109/CNS.2016.7860515},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HuangJXWCGGW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HusztiO16,
  author       = {Andrea Huszti and
                  Norbert Olah},
  title        = {A simple authentication scheme for clouds},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {565--569},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860549},
  doi          = {10.1109/CNS.2016.7860549},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HusztiO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/IsmailGS16,
  author       = {Hatem Ismail and
                  Daniel Germanus and
                  Neeraj Suri},
  title        = {Malicious peers eviction for {P2P} overlays},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {216--224},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860488},
  doi          = {10.1109/CNS.2016.7860488},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/IsmailGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KangM16,
  author       = {Ah Reum Kang and
                  Aziz Mohaisen},
  title        = {Transparency of the new gTLD's centralized zone data service: {A}
                  measurement study},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {354--355},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860508},
  doi          = {10.1109/CNS.2016.7860508},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KangM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KangM16a,
  author       = {Ah Reum Kang and
                  Aziz Mohaisen},
  title        = {Assessing {DNS} privacy under partial deployment of special-use Domain
                  Names},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {358--359},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860510},
  doi          = {10.1109/CNS.2016.7860510},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KangM16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KangM16b,
  author       = {Ah Reum Kang and
                  Aziz Mohaisen},
  title        = {Automatic alerts annotation for improving DDoS mitigation systems},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {362--363},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860512},
  doi          = {10.1109/CNS.2016.7860512},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KangM16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KoSK16,
  author       = {Woo{-}Hyun Ko and
                  Bharadwaj Satchidanandan and
                  P. R. Kumar},
  title        = {Theory and implementation of dynamic watermarking for cybersecurity
                  of advanced transportation systems},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {416--420},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860529},
  doi          = {10.1109/CNS.2016.7860529},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KoSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LeibengerFS16,
  author       = {Dominik Leibenger and
                  Jonas Fortmann and
                  Christoph Sorge},
  title        = {EncFS goes multi-user: Adding access control to an encrypted file
                  system},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {525--533},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860544},
  doi          = {10.1109/CNS.2016.7860544},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LeibengerFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LewisLX16,
  author       = {Antwane Lewis and
                  Yanyan Li and
                  Mengjun Xie},
  title        = {Real time motion-based authentication for smartwatch},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {380--381},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860521},
  doi          = {10.1109/CNS.2016.7860521},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LewisLX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiXB16,
  author       = {Yanyan Li and
                  Mengjun Xie and
                  Jiang Bian},
  title        = {{SEGAUTH:} {A} segment-based approach to behavioral biometric authentication},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860464},
  doi          = {10.1109/CNS.2016.7860464},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiXB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiZ16,
  author       = {Depeng Li and
                  Rui Zhang},
  title        = {A framework to mitigate airliner risk in air traffic management},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {324--332},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860500},
  doi          = {10.1109/CNS.2016.7860500},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiZZ16,
  author       = {Tao Li and
                  Rui Zhang and
                  Yanchao Zhang},
  title        = {PriExpress: Privacy-preserving express delivery with fine-grained
                  attribute-based access control},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {333--341},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860501},
  doi          = {10.1109/CNS.2016.7860501},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LinYLXX16,
  author       = {Jian Lin and
                  Dejun Yang and
                  Ming Li and
                  Jia Xu and
                  Guoliang Xue},
  title        = {BidGuard: {A} framework for privacy-preserving crowdsensing incentive
                  mechanisms},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {145--153},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860480},
  doi          = {10.1109/CNS.2016.7860480},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LinYLXX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LuP16,
  author       = {Rui Lu and
                  Derek Chi{-}Wai Pao},
  title        = {Optimized Aho-Corasick string matching algorithm for smart phones},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {342--343},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860502},
  doi          = {10.1109/CNS.2016.7860502},
  timestamp    = {Thu, 20 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LuP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MadaniV16,
  author       = {Pooria Madani and
                  Natalija Vlajic},
  title        = {Towards sequencing malicious system calls},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {376--377},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860519},
  doi          = {10.1109/CNS.2016.7860519},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MadaniV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MansourBS16,
  author       = {Ahmed S. Mansour and
                  Holger Boche and
                  Rafael F. Schaefer},
  title        = {List decoding for arbitrarily varying wiretap channels},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {611--615},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860558},
  doi          = {10.1109/CNS.2016.7860558},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MansourBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MartensAEM16,
  author       = {Marcus M{\"{a}}rtens and
                  Hadi Asghari and
                  Michel van Eeten and
                  Piet Van Mieghem},
  title        = {A time-dependent SIS-model for long-term computer worm evolution},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {207--215},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860487},
  doi          = {10.1109/CNS.2016.7860487},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MartensAEM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MartinezCT16,
  author       = {Daniel T. Martinez and
                  Claire M. Cochrane and
                  Chiu C. Tan},
  title        = {Encryption-based privacy protection for police body-worn cameras},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {364--365},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860513},
  doi          = {10.1109/CNS.2016.7860513},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MartinezCT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MichaelsAU16,
  author       = {Spencer Michaels and
                  Kemal Akkaya and
                  A. Selcuk Uluagac},
  title        = {Inducing data loss in Zigbee networks via join/association handshake
                  spoofing},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {401--405},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860527},
  doi          = {10.1109/CNS.2016.7860527},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MichaelsAU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MingX16,
  author       = {Jonathan Ming and
                  Mengjun Xie},
  title        = {Remote live forensics for Android devices},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {374--375},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860518},
  doi          = {10.1109/CNS.2016.7860518},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MingX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MohsinAHAR16,
  author       = {Mujahid Mohsin and
                  Zahid Anwar and
                  Ghaith Husari and
                  Ehab Al{-}Shaer and
                  Mohammad Ashiqur Rahman},
  title        = {IoTSAT: {A} formal framework for security analysis of the internet
                  of things (IoT)},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {180--188},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860484},
  doi          = {10.1109/CNS.2016.7860484},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MohsinAHAR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MukherjeeU16,
  author       = {Pritam Mukherjee and
                  Sennur Ulukus},
  title        = {Covert bits through queues},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {626--630},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860561},
  doi          = {10.1109/CNS.2016.7860561},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MukherjeeU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/OlmoF16,
  author       = {Jaume del Olmo and
                  Javier Rodr{\'{\i}}guez Fonollosa},
  title        = {Strong secrecy on a class of Degraded Broadcast Channels using polar
                  codes},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {601--605},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860556},
  doi          = {10.1109/CNS.2016.7860556},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/OlmoF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PanW016,
  author       = {Yao Pan and
                  Jules White and
                  Yu Sun},
  title        = {Assessing the threat of web worker distributed attacks},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {306--314},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860498},
  doi          = {10.1109/CNS.2016.7860498},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PanW016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PengGSSLH16,
  author       = {Wei Peng and
                  Tianchong Gao and
                  Devkishen Sisodia and
                  Tanay Kumar Saha and
                  Feng Li and
                  Mohammad Al Hasan},
  title        = {{ACTS:} Extracting Android App topologiCal signature through graphleT
                  Sampling},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {37--45},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860468},
  doi          = {10.1109/CNS.2016.7860468},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PengGSSLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PhamAV16,
  author       = {Luan Huy Pham and
                  Massimiliano Albanese and
                  Sridhar Venkatesan},
  title        = {A quantitative risk assessment framework for adaptive Intrusion Detection
                  in the cloud},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {489--497},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860540},
  doi          = {10.1109/CNS.2016.7860540},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PhamAV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PisharodyCH16,
  author       = {Sandeep Pisharody and
                  Ankur Chowdhary and
                  Dijiang Huang},
  title        = {Security policy checking in distributed {SDN} based clouds},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {19--27},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860466},
  doi          = {10.1109/CNS.2016.7860466},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PisharodyCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PradhanNVKB16,
  author       = {Parth Pradhan and
                  Kyatsandra G. Nagananda and
                  Parv Venkitasubramaniam and
                  Shalinee Kishore and
                  Rick S. Blum},
  title        = {{GPS} spoofing attack characterization and detection in smart grids},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {391--395},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860525},
  doi          = {10.1109/CNS.2016.7860525},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PradhanNVKB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RahbariK16,
  author       = {Hanif Rahbari and
                  Marwan Krunz},
  title        = {Rolling preambles: Mitigating stealthy {FO} estimation attacks in
                  OFDM-based 802.11 systems},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {118--126},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860477},
  doi          = {10.1109/CNS.2016.7860477},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RahbariK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RahmanFDA16,
  author       = {Mohammad Ashiqur Rahman and
                  Abdullah Al Farooq and
                  Amarjit Datta and
                  Ehab Al{-}Shaer},
  title        = {Automated synthesis of resiliency configurations for cyber networks},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {243--251},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860491},
  doi          = {10.1109/CNS.2016.7860491},
  timestamp    = {Sun, 30 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/RahmanFDA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RashidiF16,
  author       = {Bahman Rashidi and
                  Carol J. Fung},
  title        = {XDroid: An Android permission control using Hidden Markov chain and
                  online learning},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {46--54},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860469},
  doi          = {10.1109/CNS.2016.7860469},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RashidiF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Rawat16,
  author       = {Danda B. Rawat},
  title        = {Analyzing energy efficient physical layer security in large-scale
                  {MIMO} enabled {CRN} with QoS requirements},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {465--471},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860537},
  doi          = {10.1109/CNS.2016.7860537},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Rawat16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ReimairKM16,
  author       = {Florian Reimair and
                  Christian Kollmann and
                  Alexander Marsalek},
  title        = {Emulating {U2F} authenticator devices},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {543--551},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860546},
  doi          = {10.1109/CNS.2016.7860546},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ReimairKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ReimairPRE16,
  author       = {Florian Reimair and
                  Bernd Pr{\"{u}}nster and
                  Andreas Reiter and
                  Christian Ertler},
  title        = {Applied dynamic policy selection},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {507--515},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860542},
  doi          = {10.1109/CNS.2016.7860542},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ReimairPRE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SanatiniaN16,
  author       = {Amirali Sanatinia and
                  Guevara Noubir},
  title        = {Honey Onions: {A} framework for characterizing and identifying misbehaving
                  Tor HSDirs},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {127--135},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860478},
  doi          = {10.1109/CNS.2016.7860478},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SanatiniaN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SchabhuserDB16,
  author       = {Lucas Schabh{\"{u}}ser and
                  Denise Demirel and
                  Johannes Buchmann},
  title        = {An unconditionally hiding auditing procedure for computations over
                  distributed data},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {552--560},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860547},
  doi          = {10.1109/CNS.2016.7860547},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SchabhuserDB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShenMSL16,
  author       = {Dakun Shen and
                  Ian D. Markwood and
                  Dan Shen and
                  Yao Liu},
  title        = {Virtual Safe: Unauthorized movement detection for mobile devices},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {315--323},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860499},
  doi          = {10.1109/CNS.2016.7860499},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ShenMSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShiS16,
  author       = {Yi Shi and
                  Yalin E. Sagduyu},
  title        = {Spectrum learning and access for cognitive satellite communications
                  under jamming},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {472--479},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860538},
  doi          = {10.1109/CNS.2016.7860538},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ShiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShinKCH16,
  author       = {SeongHan Shin and
                  Kazukuni Kobara and
                  Chia{-}Chuan Chuang and
                  Weicheng Huang},
  title        = {A security framework for {MQTT}},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {432--436},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860532},
  doi          = {10.1109/CNS.2016.7860532},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ShinKCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SoysaCM16,
  author       = {Madushanka Soysa and
                  Pamela C. Cosman and
                  Laurence B. Milstein},
  title        = {Video cognitive radio networks for tactical scenarios},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {457--464},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860536},
  doi          = {10.1109/CNS.2016.7860536},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SoysaCM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SpauldingKUM16,
  author       = {Jeffrey Spaulding and
                  Ah Reum Kang and
                  Shambhu J. Upadhyaya and
                  Aziz Mohaisen},
  title        = {A user study of the effectiveness of typosquatting techniques},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {360--361},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860511},
  doi          = {10.1109/CNS.2016.7860511},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SpauldingKUM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Suh-LeeJK16,
  author       = {Candace Suh{-}Lee and
                  Ju{-}Yeon Jo and
                  Yoohwan Kim},
  title        = {Text mining for security threat detection discovering hidden information
                  in unstructured log messages},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {252--260},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860492},
  doi          = {10.1109/CNS.2016.7860492},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Suh-LeeJK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SunDLSY16,
  author       = {Xiaoyan Sun and
                  Jun Dai and
                  Peng Liu and
                  Anoop Singhal and
                  John Yen},
  title        = {Towards probabilistic identification of zero-day attack paths},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {64--72},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860471},
  doi          = {10.1109/CNS.2016.7860471},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SunDLSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Suthaharan16,
  author       = {Shan Suthaharan},
  title        = {A correlation-based subspace analysis for data confidentiality and
                  classification as utility in {CPS}},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {426--431},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860531},
  doi          = {10.1109/CNS.2016.7860531},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/Suthaharan16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SuthaharanS16,
  author       = {Shan Suthaharan and
                  Weining Shen},
  title        = {Pairing of most relevant variables and bootstrap samples with ridge
                  regression for data sharing},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {384--385},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860523},
  doi          = {10.1109/CNS.2016.7860523},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SuthaharanS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Takabi16,
  author       = {Hassan Takabi},
  title        = {Firewall for brain: Towards a privacy preserving ecosystem for {BCI}
                  applications},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {370--371},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860516},
  doi          = {10.1109/CNS.2016.7860516},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Takabi16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TangYKH16,
  author       = {Bo Tang and
                  Jun Yan and
                  Steven Kay and
                  Haibo He},
  title        = {Detection of false data injection attacks in smart grid under colored
                  Gaussian noise},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {172--179},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860483},
  doi          = {10.1109/CNS.2016.7860483},
  timestamp    = {Wed, 11 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TangYKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TaylorS16,
  author       = {Curtis R. Taylor and
                  Craig A. Shue},
  title        = {Validating security protocols with cloud-based middleboxes},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {261--269},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860493},
  doi          = {10.1109/CNS.2016.7860493},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TaylorS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ThompsonMC16,
  author       = {Brian Thompson and
                  James R. Morris{-}King and
                  Hasan Cam},
  title        = {Effectiveness of proactive reset for mitigating impact of stealthy
                  attacks on networks of autonomous systems},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {437--441},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860533},
  doi          = {10.1109/CNS.2016.7860533},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ThompsonMC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TianYY16,
  author       = {Yifan Tian and
                  Jiawei Yuan and
                  Shucheng Yu},
  title        = {{SBPA:} Social behavior based cross Social Network phishing attacks},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {366--367},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860514},
  doi          = {10.1109/CNS.2016.7860514},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TianYY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TrappeG16,
  author       = {Wade Trappe and
                  Andrey Garnaev},
  title        = {Bargaining over secrecy and reliability for low {SNR} {OFDM} communications},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {596--600},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860555},
  doi          = {10.1109/CNS.2016.7860555},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TrappeG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TuGLP16,
  author       = {Wenwen Tu and
                  Mario Goldenbaum and
                  Lifeng Lai and
                  H. Vincent Poor},
  title        = {Multiple key generation with restricted public discussion structure},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {641--645},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860564},
  doi          = {10.1109/CNS.2016.7860564},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TuGLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Vasilomanolakis16,
  author       = {Emmanouil Vasilomanolakis and
                  Michael Stahn and
                  Carlos Garcia Cordero and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {On probe-response attacks in Collaborative Intrusion Detection Systems},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {279--286},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860495},
  doi          = {10.1109/CNS.2016.7860495},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Vasilomanolakis16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/VenkatesanAAJW16,
  author       = {Sridhar Venkatesan and
                  Massimiliano Albanese and
                  Kareem Amin and
                  Sushil Jajodia and
                  Mason Wright},
  title        = {A moving target defense approach to mitigate DDoS attacks against
                  proxy-based architectures},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {198--206},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860486},
  doi          = {10.1109/CNS.2016.7860486},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/VenkatesanAAJW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/VenugopalanPS16,
  author       = {Vivek Venugopalan and
                  Cameron D. Patterson and
                  Devu Manikantan Shila},
  title        = {Detecting and thwarting hardware trojan attacks in cyber-physical
                  systems},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {421--425},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860530},
  doi          = {10.1109/CNS.2016.7860530},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/VenugopalanPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Walsh16,
  author       = {Kevin Walsh},
  title        = {{TLS} with trustworthy certificate authorities},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {516--524},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860543},
  doi          = {10.1109/CNS.2016.7860543},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Walsh16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangSTHW16,
  author       = {Xuanxuan Wang and
                  Rafael F. Schaefer and
                  Lars Thiele and
                  Thomas Haustein and
                  Yongming Wang},
  title        = {Ergodic secrecy sum rate for multiuser {MIMO} downlink systems using
                  block diagonalization},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {636--640},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860563},
  doi          = {10.1109/CNS.2016.7860563},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangSTHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WebbR16,
  author       = {Allen T. Webb and
                  A. L. Narasima Reddy},
  title        = {Finding proxy users at the service using anomaly detection},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {82--90},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860473},
  doi          = {10.1109/CNS.2016.7860473},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WebbR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WeiYTLY16,
  author       = {Zhexiong Wei and
                  F. Richard Yu and
                  Helen Tang and
                  Chengehao Liang and
                  Qiao Yan},
  title        = {Securing cognitive radio vehicular Ad hoc networks with trusted lightweight
                  cloud computing},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {450--456},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860535},
  doi          = {10.1109/CNS.2016.7860535},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/WeiYTLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WieseO16,
  author       = {Moritz Wiese and
                  Tobias J. Oechtering},
  title        = {Secure distributed estimation of linear systems},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {616--620},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860559},
  doi          = {10.1109/CNS.2016.7860559},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WieseO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WuBDJ16,
  author       = {Longfei Wu and
                  Benjamin Brandt and
                  Xiaojiang Du and
                  Bo Ji},
  title        = {Analysis of clickjacking attacks and an effective defense scheme for
                  Android devices},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {55--63},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860470},
  doi          = {10.1109/CNS.2016.7860470},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WuBDJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XinSN16,
  author       = {Liangxiao Xin and
                  David Starobinski and
                  Guevara Noubir},
  title        = {Cascading denial of service attacks on Wi-Fi networks},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {91--99},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860474},
  doi          = {10.1109/CNS.2016.7860474},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XinSN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YangCC16,
  author       = {Huan Yang and
                  Liang Cheng and
                  Mooi Choo Chuah},
  title        = {Evaluation of utility-privacy trade-offs of data manipulation techniques
                  for smart metering},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {396--400},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860526},
  doi          = {10.1109/CNS.2016.7860526},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YangCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YuCZY16,
  author       = {Xiaoqi Yu and
                  Nairen Cao and
                  Jun Zhang and
                  Siu{-}Ming Yiu},
  title        = {Dynamic Proofs of Retrievability with improved worst case overhead},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {576--580},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860551},
  doi          = {10.1109/CNS.2016.7860551},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YuCZY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YuLWW16,
  author       = {Wenqian Yu and
                  Weigang Li and
                  Junyuan Wang and
                  Changzheng Wei},
  title        = {A study of {HSM} based key protection in encryption file system},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {352--353},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860507},
  doi          = {10.1109/CNS.2016.7860507},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/YuLWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YuPSB16,
  author       = {Paul L. Yu and
                  Jake B. Perazzone and
                  Brian M. Sadler and
                  Rick S. Blum},
  title        = {Authenticated side channel via physical layer fingerprinting},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {631--635},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860562},
  doi          = {10.1109/CNS.2016.7860562},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YuPSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZewailY16,
  author       = {Ahmed A. Zewail and
                  Aylin Yener},
  title        = {Coded caching for resolvable networks with security requirements},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {621--625},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860560},
  doi          = {10.1109/CNS.2016.7860560},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZewailY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangWSJZZ16,
  author       = {Zhengguang Zhang and
                  Hong Wen and
                  Huanhuan Song and
                  Yixin Jiang and
                  Jinling Zhang and
                  Xiping Zhu},
  title        = {A {MIMO} cross-layer secure communication scheme based on spatial
                  modulation},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {350--351},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860506},
  doi          = {10.1109/CNS.2016.7860506},
  timestamp    = {Tue, 24 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangWSJZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangWSJZZZ16,
  author       = {Jinling Zhang and
                  Hong Wen and
                  Huanhuan Song and
                  Yixin Jiang and
                  Zhengguang Zhang and
                  Luping Zhang and
                  Xiping Zhu},
  title        = {Using Basis Expansion Model for Physical Layer Authentication in Time-Variant
                  System},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {348--349},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860505},
  doi          = {10.1109/CNS.2016.7860505},
  timestamp    = {Tue, 24 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangWSJZZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangWSTJDZ16,
  author       = {Luping Zhang and
                  Hong Wen and
                  Huanhuan Song and
                  Jie Tang and
                  Yixin Jiang and
                  Weihua Dong and
                  Xiping Zhu},
  title        = {The performance of the {MIMO} physical layer security system with
                  imperfect {CSI}},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {346--347},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860504},
  doi          = {10.1109/CNS.2016.7860504},
  timestamp    = {Tue, 24 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangWSTJDZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhengPGZM16,
  author       = {Chengyu Zheng and
                  Mila Dalla Preda and
                  Jorge Granjal and
                  Stefano Zanero and
                  Federico Maggi},
  title        = {On-chip system call tracing: {A} feasibility study and open prototype},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {73--81},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860472},
  doi          = {10.1109/CNS.2016.7860472},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhengPGZM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZiadAAS16,
  author       = {M. Tarek Ibn Ziad and
                  Amr Al{-}Anwar and
                  Moustafa Alzantot and
                  Mani B. Srivastava},
  title        = {CryptoImg: Privacy preserving processing over encrypted images},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {570--575},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860550},
  doi          = {10.1109/CNS.2016.7860550},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZiadAAS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2016,
  title        = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7854080/proceeding},
  isbn         = {978-1-5090-3065-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AbodunrinMH15,
  author       = {Dare Abodunrin and
                  Yoan Miche and
                  Silke Holtmanns},
  title        = {Some dangers from 2G networks legacy support and a possible mitigation},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {585--593},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346872},
  doi          = {10.1109/CNS.2015.7346872},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AbodunrinMH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AkdoganAL15,
  author       = {Dilara Akdogan and
                  Duygu Karaoglan Altop and
                  Albert Levi},
  title        = {Secure key agreement using pure biometrics},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {191--199},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346828},
  doi          = {10.1109/CNS.2015.7346828},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AkdoganAL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Al-DuwairiAAP15,
  author       = {Basheer Al{-}Duwairi and
                  Ahmad T. Al{-}Hammouri and
                  Monther Aldwairi and
                  Vern Paxson},
  title        = {GFlux: {A} google-based system for Fast Flux detection},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {755--756},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346920},
  doi          = {10.1109/CNS.2015.7346920},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/Al-DuwairiAAP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlbaneseBJ15,
  author       = {Massimiliano Albanese and
                  Ermanno Battista and
                  Sushil Jajodia},
  title        = {A deception based approach for defeating {OS} and service fingerprinting},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {317--325},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346842},
  doi          = {10.1109/CNS.2015.7346842},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlbaneseBJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AliAAD15,
  author       = {Muhammad Qasim Ali and
                  Ayesha Binte Ashfaq and
                  Ehab Al{-}Shaer and
                  Qi Duan},
  title        = {Towards a science of anomaly detection system evasion},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {460--468},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346858},
  doi          = {10.1109/CNS.2015.7346858},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AliAAD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AmbrosinHMCP15,
  author       = {Moreno Ambrosin and
                  Hossein Hosseini and
                  Kalikinkar Mandal and
                  Mauro Conti and
                  Radha Poovendran},
  title        = {Verifiable and privacy-preserving fine-grained data-collection for
                  smart metering},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {655--658},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346882},
  doi          = {10.1109/CNS.2015.7346882},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AmbrosinHMCP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ArchibaldG15,
  author       = {Rennie Archibald and
                  Dipak Ghosal},
  title        = {Design and analysis of a model-based Covert Timing Channel for Skype
                  traffic},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {236--244},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346833},
  doi          = {10.1109/CNS.2015.7346833},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ArchibaldG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AriyapalaCP15,
  author       = {Kanishka Ariyapala and
                  Mauro Conti and
                  Cristina M. Pinotti},
  title        = {CaT: Evaluating cloud-aided {TLS} for smartphone energy efficiency},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {601--609},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346874},
  doi          = {10.1109/CNS.2015.7346874},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AriyapalaCP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ArmandoRTW15,
  author       = {Alessandro Armando and
                  Silvio Ranise and
                  Riccardo Traverso and
                  Konrad S. Wrona},
  title        = {Compiling {NATO} authorization policies for enforcement in the cloud
                  and SDNs},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {741--742},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346913},
  doi          = {10.1109/CNS.2015.7346913},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ArmandoRTW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AyacheEF15,
  author       = {Meryeme Ayache and
                  Mohammed Erradi and
                  Bernd Freisleben},
  title        = {curlX: {A} middleware to enforce access control policies within a
                  cloud environment},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {771--772},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346928},
  doi          = {10.1109/CNS.2015.7346928},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AyacheEF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AydinB15,
  author       = {Mustafa Aydin and
                  Nazife Baykal},
  title        = {Feature extraction and classification phishing websites based on {URL}},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {769--770},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346927},
  doi          = {10.1109/CNS.2015.7346927},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AydinB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AzraouiEOM15,
  author       = {Monir Azraoui and
                  Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Refik Molva},
  title        = {Publicly verifiable conjunctive keyword search in outsourced databases},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {619--627},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346876},
  doi          = {10.1109/CNS.2015.7346876},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AzraouiEOM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BacisMCP15,
  author       = {Enrico Bacis and
                  Simone Mutti and
                  Steven Capelli and
                  Stefano Paraboschi},
  title        = {DockerPolicyModules: Mandatory Access Control for Docker containers},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {749--750},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346917},
  doi          = {10.1109/CNS.2015.7346917},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BacisMCP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BariliL15,
  author       = {Antonio Barili and
                  Dario Lanterna},
  title        = {On the effects of large-scale {DNS} Poisoning},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {723--724},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346904},
  doi          = {10.1109/CNS.2015.7346904},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BariliL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BarretoCVFP15,
  author       = {Luciano Barreto and
                  Antonio Celesti and
                  Massimo Villari and
                  Maria Fazio and
                  Antonio Puliafito},
  title        = {Identity management in IoT Clouds: {A} {FIWARE} case of study},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {680--684},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346887},
  doi          = {10.1109/CNS.2015.7346887},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/BarretoCVFP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BasciftciKA15,
  author       = {Yuksel Ozan Basciftci and
                  Can Emre Koksal and
                  Alexei E. Ashikhmin},
  title        = {Securing massive {MIMO} at the physical layer},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {272--280},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346837},
  doi          = {10.1109/CNS.2015.7346837},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BasciftciKA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BekermanSRB15,
  author       = {Dmitri Bekerman and
                  Bracha Shapira and
                  Lior Rokach and
                  Ariel Bar},
  title        = {Unknown malware detection using network traffic classification},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {134--142},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346821},
  doi          = {10.1109/CNS.2015.7346821},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/BekermanSRB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BenedettoGLW15,
  author       = {Francesco Benedetto and
                  Gaetano Giunta and
                  Angelo Liguori and
                  Arno Wacker},
  title        = {A novel method for securing critical infrastructures by detecting
                  hidden flows of data},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {648--654},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346881},
  doi          = {10.1109/CNS.2015.7346881},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/BenedettoGLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BentonCKS15,
  author       = {Kevin Benton and
                  L. Jean Camp and
                  Timothy Kelley and
                  Martin Swany},
  title        = {Filtering {IP} source spoofing using feasible path reverse path forwarding
                  with {SDN}},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {733--734},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346909},
  doi          = {10.1109/CNS.2015.7346909},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BentonCKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BittlGMBSE15,
  author       = {Sebastian Bittl and
                  Arturo A. Gonzalez and
                  Matthias Myrtus and
                  Hanno Beckmann and
                  Stefan Sailer and
                  Bernd Eissfeller},
  title        = {Emerging attacks on {VANET} security based on {GPS} Time Spoofing},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {344--352},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346845},
  doi          = {10.1109/CNS.2015.7346845},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BittlGMBSE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BockKGMF15,
  author       = {Leon Bock and
                  Shankar Karuppayah and
                  Tim Grube and
                  Max M{\"{u}}hlh{\"{a}}user and
                  Mathias Fischer},
  title        = {Hide and seek: Detecting sensors in {P2P} botnets},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {731--732},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346908},
  doi          = {10.1109/CNS.2015.7346908},
  timestamp    = {Thu, 17 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/BockKGMF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BustinSPS15,
  author       = {Ronit Bustin and
                  Rafael F. Schaefer and
                  H. Vincent Poor and
                  Shlomo Shamai},
  title        = {An {I-MMSE} based graphical representation of rate and equivocation
                  for the Gaussian broadcast channel},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {53--58},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346810},
  doi          = {10.1109/CNS.2015.7346810},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BustinSPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CalvinoRD15,
  author       = {Aida Calvino and
                  Sara Ricci and
                  Josep Domingo{-}Ferrer},
  title        = {Privacy-preserving distributed statistical computation to a semi-honest
                  multi-cloud},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {506--514},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346863},
  doi          = {10.1109/CNS.2015.7346863},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/CalvinoRD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CantaliEGAC15,
  author       = {Gokcan Cantali and
                  Orhan Ermis and
                  G{\"{u}}rkan G{\"{u}}r and
                  Fatih Alag{\"{o}}z and
                  M. Ufuk {\c{C}}aglayan},
  title        = {Lightweight context-aware security system for wireless Internet access},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {765--766},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346925},
  doi          = {10.1109/CNS.2015.7346925},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/CantaliEGAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CaoPC15,
  author       = {Yinzhi Cao and
                  Xiang Pan and
                  Yan Chen},
  title        = {SafePay: Protecting against credit card forgery with existing magnetic
                  card readers},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {164--172},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346825},
  doi          = {10.1109/CNS.2015.7346825},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CaoPC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CarlierSBSMA15,
  author       = {Matthias Carlier and
                  Kris Steenhaut and
                  An Braeken and
                  Ruben Smeets and
                  Nele Mentens and
                  Kris Aerts},
  title        = {Study on impact of adding security in a 6LoWPAN based network},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {577--584},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346871},
  doi          = {10.1109/CNS.2015.7346871},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CarlierSBSMA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChandrasekharS15,
  author       = {Santosh Chandrasekhar and
                  Mukesh Singhal},
  title        = {Efficient and scalable aggregate signcryption scheme based on multi-trapdoor
                  hash functions},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {610--618},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346875},
  doi          = {10.1109/CNS.2015.7346875},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChandrasekharS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChangHL15,
  author       = {Sang{-}Yoon Chang and
                  Yih{-}Chun Hu and
                  Zhuotao Liu},
  title        = {Securing wireless medium access control against insider denial-of-service
                  attackers},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {370--378},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346848},
  doi          = {10.1109/CNS.2015.7346848},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChangHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChatterjeeS15,
  author       = {Ayantika Chatterjee and
                  Indranil Sengupta},
  title        = {Windowing technique for Lazy Sorting of Encrypted data},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {633--637},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346878},
  doi          = {10.1109/CNS.2015.7346878},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChatterjeeS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CheaML15,
  author       = {Visal Chea and
                  Miguel Vargas Martin and
                  Ramiro Liscano},
  title        = {Hamming distance as a metric for the detection of CRC-based side-channel
                  communications in 802.11 wireless networks},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {218--226},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346831},
  doi          = {10.1109/CNS.2015.7346831},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CheaML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenG15,
  author       = {Yao Chen and
                  Guang Gong},
  title        = {Integer arithmetic over ciphertext and homomorphic data aggregation},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {628--632},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346877},
  doi          = {10.1109/CNS.2015.7346877},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChenG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenMP15,
  author       = {Xihui Chen and
                  Andrzej Mizera and
                  Jun Pang},
  title        = {Activity tracking: {A} new attack on location privacy},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {22--30},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346806},
  doi          = {10.1109/CNS.2015.7346806},
  timestamp    = {Sat, 31 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChenMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChoiKC15,
  author       = {SeokHwan Choi and
                  Da{-}Hyeon Kim and
                  Yoon{-}Ho Choi},
  title        = {Timely login status control using mobile app},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {743--744},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346914},
  doi          = {10.1109/CNS.2015.7346914},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChoiKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChuatSPLM15,
  author       = {Laurent Chuat and
                  Pawel Szalachowski and
                  Adrian Perrig and
                  Ben Laurie and
                  Eran Messeri},
  title        = {Efficient gossip protocols for verifying the consistency of Certificate
                  logs},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {415--423},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346853},
  doi          = {10.1109/CNS.2015.7346853},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ChuatSPLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ClassenSH15,
  author       = {Jiska Classen and
                  Matthias Schulz and
                  Matthias Hollick},
  title        = {Practical covert channels for WiFi systems},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {209--217},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346830},
  doi          = {10.1109/CNS.2015.7346830},
  timestamp    = {Wed, 03 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ClassenSH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Clemente15,
  author       = {F{\'{e}}lix J. Garc{\'{\i}}a Clemente},
  title        = {A privacy-preserving recommender system for mobile commerce},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {725--726},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346905},
  doi          = {10.1109/CNS.2015.7346905},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Clemente15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CohenHN15,
  author       = {Reuven Cohen and
                  Raziel Hess{-}Green and
                  Gabi Nakibly},
  title        = {Small lies, lots of damage: a partition attack on link-state routing
                  protocols},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {397--405},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346851},
  doi          = {10.1109/CNS.2015.7346851},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CohenHN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CompagnoCLLM15,
  author       = {Alberto Compagno and
                  Mauro Conti and
                  Daniele Lain and
                  Giulio Lovisotto and
                  Luigi Vincenzo Mancini},
  title        = {Boten {ELISA:} {A} novel approach for botnet C{\&}C in Online
                  Social Networks},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {74--82},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346813},
  doi          = {10.1109/CNS.2015.7346813},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/CompagnoCLLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CorderoVMKHM15,
  author       = {Carlos Garcia Cordero and
                  Emmanouil Vasilomanolakis and
                  Nikolay Milanov and
                  Christian Koch and
                  David Hausheer and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {{ID2T:} {A} {DIY} dataset creation toolkit for Intrusion Detection
                  Systems},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {739--740},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346912},
  doi          = {10.1109/CNS.2015.7346912},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CorderoVMKHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Costin15,
  author       = {Andrei Costin},
  title        = {All your cluster-grids are belong to us: Monitoring the (in)security
                  of infrastructure monitoring systems},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {550--558},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346868},
  doi          = {10.1109/CNS.2015.7346868},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Costin15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Cuff15,
  author       = {Paul Cuff},
  title        = {A stronger soft-covering lemma and applications},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {40--43},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346808},
  doi          = {10.1109/CNS.2015.7346808},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Cuff15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DrazenEG15,
  author       = {Whitney A. Drazen and
                  Emmanuel Ekwedike and
                  Rosario Gennaro},
  title        = {Highly scalable verifiable encrypted search},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {497--505},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346862},
  doi          = {10.1109/CNS.2015.7346862},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DrazenEG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Ducatel15,
  author       = {Gery Ducatel},
  title        = {Identity as a service: {A} cloud based common capability},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {675--679},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346886},
  doi          = {10.1109/CNS.2015.7346886},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Ducatel15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/EsayasMSBB15,
  author       = {Samson Yoseph Esayas and
                  Tobias Mahler and
                  Fredrik Seehusen and
                  Frode Bjornstad and
                  Veda Brubakk},
  title        = {An integrated method for compliance and risk assessment},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {568--576},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346870},
  doi          = {10.1109/CNS.2015.7346870},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/EsayasMSBB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Espinosa-Aranda15,
  author       = {Jos{\'{e}} Luis Espinosa{-}Aranda and
                  Noelia V{\'{a}}llez and
                  Carlos Sanchez{-}Bueno and
                  Daniel Aguado{-}Araujo and
                  Gloria Bueno Garc{\'{\i}}a and
                  Oscar D{\'{e}}niz},
  title        = {Pulga, a tiny open-source {MQTT} broker for flexible and secure IoT
                  deployments},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {690--694},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346889},
  doi          = {10.1109/CNS.2015.7346889},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Espinosa-Aranda15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FanLC15,
  author       = {Jingyao Fan and
                  Qinghua Li and
                  Guohong Cao},
  title        = {Privacy-aware and trustworthy data aggregation in mobile sensing},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {31--39},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346807},
  doi          = {10.1109/CNS.2015.7346807},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/FanLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FarhangHZ15,
  author       = {Sadegh Farhang and
                  Yezekael Hayel and
                  Quanyan Zhu},
  title        = {PHY-layer location privacy-preserving access point selection mechanism
                  in next-generation wireless networks},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {263--271},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346836},
  doi          = {10.1109/CNS.2015.7346836},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/FarhangHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FisherKZJ15,
  author       = {Andrew Fisher and
                  Carson Kent and
                  David Zage and
                  John Jarocki},
  title        = {Using linkography to understand cyberattacks},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {290--298},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346839},
  doi          = {10.1109/CNS.2015.7346839},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/FisherKZJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FoleyN15,
  author       = {Simon N. Foley and
                  Ultan Neville},
  title        = {A firewall algebra for OpenStack},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {541--549},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346867},
  doi          = {10.1109/CNS.2015.7346867},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/FoleyN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ForestiPS15,
  author       = {Sara Foresti and
                  Vincenzo Piuri and
                  Gerson Antunes Soares},
  title        = {On the use of fuzzy logic in dependable cloud management},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {767--768},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346926},
  doi          = {10.1109/CNS.2015.7346926},
  timestamp    = {Fri, 12 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ForestiPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ForutanF15,
  author       = {Vahid Forutan and
                  Robert F. H. Fischer},
  title        = {Security-enhanced network coding through public-key cryptography},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {717--718},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346901},
  doi          = {10.1109/CNS.2015.7346901},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ForutanF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FunkeDWKM15,
  author       = {Sebastian Funke and
                  J{\"{o}}rg Daubert and
                  Alexander Wiesmaier and
                  Panayotis Kikiras and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {End-2-End privacy architecture for IoT},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {705--706},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346895},
  doi          = {10.1109/CNS.2015.7346895},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/FunkeDWKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GabryLJ15,
  author       = {Frederic Gabry and
                  Pin{-}Hsun Lin and
                  Eduard A. Jorswieck},
  title        = {Energy efficiency performance of cooperative schemes in cognitive
                  radio networks with secrecy},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {753--754},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346919},
  doi          = {10.1109/CNS.2015.7346919},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GabryLJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GabryTS15,
  author       = {Frederic Gabry and
                  Ragnar Thobaben and
                  Mikael Skoglund},
  title        = {Secrecy games in cognitive radio networks with multiple secondary
                  users},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {143--148},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346822},
  doi          = {10.1109/CNS.2015.7346822},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GabryTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GeramiXSS15,
  author       = {Majid Gerami and
                  Ming Xiao and
                  Somayeh Salimi and
                  Mikael Skoglund},
  title        = {Secure partial repair in wireless caching networks with broadcast
                  channels},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {353--360},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346846},
  doi          = {10.1109/CNS.2015.7346846},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GeramiXSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GodefroyTHM15,
  author       = {Erwan Godefroy and
                  Eric Totel and
                  Michel Hurfin and
                  Fr{\'{e}}d{\'{e}}ric Majorczyk},
  title        = {Generation and assessment of correlation rules to detect complex attack
                  scenarios},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {707--708},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346896},
  doi          = {10.1109/CNS.2015.7346896},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GodefroyTHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GunluKS15,
  author       = {Onur G{\"{u}}nl{\"{u}} and
                  Gerhard Kramer and
                  Maciej Skorski},
  title        = {Privacy and secrecy with multiple measurements of physical and biometric
                  identifiers},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {89--94},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346815},
  doi          = {10.1109/CNS.2015.7346815},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GunluKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HeMJJ15,
  author       = {Ying He and
                  Leandros A. Maglaras and
                  Helge Janicke and
                  Kevin I. Jones},
  title        = {An Industrial Control Systems incident response decision framework},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {761--762},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346923},
  doi          = {10.1109/CNS.2015.7346923},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HeMJJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HiranCS15,
  author       = {Rahul Hiran and
                  Niklas Carlsson and
                  Nahid Shahmehri},
  title        = {Crowd-based detection of routing anomalies on the internet},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {388--396},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346850},
  doi          = {10.1109/CNS.2015.7346850},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HiranCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HsuL15,
  author       = {Ruei{-}Hau Hsu and
                  Jemin Lee},
  title        = {Group anonymous {D2D} communication with end-to-end security in {LTE-A}},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {451--459},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346857},
  doi          = {10.1109/CNS.2015.7346857},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HsuL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HuZL15,
  author       = {Bocan Hu and
                  Yan Zhang and
                  Loukas Lazos},
  title        = {{PHYVOS:} Physical layer voting for secure and fast cooperation},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {245--253},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346834},
  doi          = {10.1109/CNS.2015.7346834},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HuZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HuangZG15,
  author       = {Chu Huang and
                  Sencun Zhu and
                  Quanlong Guan},
  title        = {Multi-objective software assignment for active cyber defense},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {299--307},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346840},
  doi          = {10.1109/CNS.2015.7346840},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HuangZG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JandaWNBJ15,
  author       = {Carsten Rudolf Janda and
                  Moritz Wiese and
                  Janis N{\"{o}}tzel and
                  Holger Boche and
                  Eduard A. Jorswieck},
  title        = {Wiretap-channels under constrained active and passive attacks},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {16--21},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346805},
  doi          = {10.1109/CNS.2015.7346805},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/JandaWNBJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JinZ15,
  author       = {Rong Jin and
                  Kai Zeng},
  title        = {SecNFC: Securing inductively-coupled Near Field Communication at physical
                  layer},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {149--157},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346823},
  doi          = {10.1109/CNS.2015.7346823},
  timestamp    = {Thu, 16 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/JinZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JinZ15a,
  author       = {Rong Jin and
                  Kai Zeng},
  title        = {Physical layer key agreement under signal injection attacks},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {254--262},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346835},
  doi          = {10.1109/CNS.2015.7346835},
  timestamp    = {Thu, 16 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/JinZ15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KaoCHSLLH15,
  author       = {Chia{-}Nan Kao and
                  Yung{-}Cheng Chang and
                  Nen{-}Fu Huang and
                  I. Salim S and
                  I{-}Ju Liao and
                  Rong{-}Tai Liu and
                  Hsien{-}Wei Hung},
  title        = {A predictive zero-day network defense using long-term port-scan recording},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {695--696},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346890},
  doi          = {10.1109/CNS.2015.7346890},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KaoCHSLLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KittichokechaiC15,
  author       = {Kittipong Kittichokechai and
                  Giuseppe Caire},
  title        = {Optimal tradeoff of secure PUF-based authentication},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {83--88},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346814},
  doi          = {10.1109/CNS.2015.7346814},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KittichokechaiC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KlickLMMR15,
  author       = {Johannes Klick and
                  Stephan Lau and
                  Daniel Marzin and
                  Jan{-}Ole Malchow and
                  Volker Roth},
  title        = {Internet-facing PLCs as a network backdoor},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {524--532},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346865},
  doi          = {10.1109/CNS.2015.7346865},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KlickLMMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KotsonS15,
  author       = {Michael C. Kotson and
                  Alexia Schulz},
  title        = {Characterizing phishing threats with Natural Language Processing},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {308--316},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346841},
  doi          = {10.1109/CNS.2015.7346841},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KotsonS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LatifT15,
  author       = {Waqas A. Latif and
                  Chiu C. Tan},
  title        = {SmartArgos: Improving mobile surveillance systems with software defined
                  networks},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {763--764},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346924},
  doi          = {10.1109/CNS.2015.7346924},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LatifT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LazzerettiP15,
  author       = {Riccardo Lazzeretti and
                  Tommaso Pignata},
  title        = {Privacy preserving cloud computing through piecewise approximation
                  of multivariate functions},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {515--523},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346864},
  doi          = {10.1109/CNS.2015.7346864},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LazzerettiP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LeeSSCC15,
  author       = {Changmin Lee and
                  Chen Shen and
                  Gokhan Sahin and
                  Kwanghee Choi and
                  Hyeong{-}Ah Choi},
  title        = {A novel and scalable communication-history-based Knapsack authentication
                  framework for {IEEE} 802.11 networks},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {44--52},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346809},
  doi          = {10.1109/CNS.2015.7346809},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LeeSSCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiDC15,
  author       = {QianQian Li and
                  Ding Ding and
                  Mauro Conti},
  title        = {Brain-Computer Interface applications: Security and privacy challenges},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {663--666},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346884},
  doi          = {10.1109/CNS.2015.7346884},
  timestamp    = {Tue, 01 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiDC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiguoriBGKW15,
  author       = {Angelo Liguori and
                  Francesco Benedetto and
                  Gaetano Giunta and
                  Nils Kopal and
                  Arno Wacker},
  title        = {Analysis and monitoring of hidden {TCP} traffic based on an open-source
                  covert timing channel},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {667--674},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346885},
  doi          = {10.1109/CNS.2015.7346885},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiguoriBGKW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiuBMC15,
  author       = {Weijie Liu and
                  Rakesh B. Bobba and
                  Sibin Mohan and
                  Roy H. Campbell},
  title        = {Inter-flow consistency: {A} novel {SDN} update abstraction for supporting
                  inter-flow constraints},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {469--478},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346859},
  doi          = {10.1109/CNS.2015.7346859},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiuBMC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiuYWWW15,
  author       = {Guangchi Liu and
                  Qing Yang and
                  Honggang Wang and
                  Shaoen Wu and
                  Mike P. Wittie},
  title        = {Uncovering the mystery of trust in an online social network},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {488--496},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346861},
  doi          = {10.1109/CNS.2015.7346861},
  timestamp    = {Fri, 26 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiuYWWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LuoTZSLNM15,
  author       = {Pengkui Luo and
                  Ruben Torres and
                  Zhi{-}Li Zhang and
                  Sabyasachi Saha and
                  Sung{-}Ju Lee and
                  Antonio Nucci and
                  Marco Mellia},
  title        = {Leveraging client-side {DNS} failure patterns to identify malicious
                  behaviors},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {406--414},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346852},
  doi          = {10.1109/CNS.2015.7346852},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LuoTZSLNM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MalchowMKKR15,
  author       = {Jan{-}Ole Malchow and
                  Daniel Marzin and
                  Johannes Klick and
                  Robert Kovacs and
                  Volker Roth},
  title        = {{PLC} Guard: {A} practical defense against attacks on cyber-physical
                  systems},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {326--334},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346843},
  doi          = {10.1109/CNS.2015.7346843},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MalchowMKKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MalchowR15,
  author       = {Jan{-}Ole Malchow and
                  Volker Roth},
  title        = {CryptID - distributed identity management infrastructure},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {735--736},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346910},
  doi          = {10.1109/CNS.2015.7346910},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MalchowR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MattettiSACDF15,
  author       = {Massimiliano Mattetti and
                  Alexandra Shulman{-}Peleg and
                  Yair Allouche and
                  Antonio Corradi and
                  Shlomi Dolev and
                  Luca Foschini},
  title        = {Securing the infrastructure and the workloads of linux containers},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {559--567},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346869},
  doi          = {10.1109/CNS.2015.7346869},
  timestamp    = {Wed, 12 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/MattettiSACDF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MekkyMZ15,
  author       = {Hesham Mekky and
                  Aziz Mohaisen and
                  Zhi{-}Li Zhang},
  title        = {Separation of benign and malicious network events for accurate malware
                  family classification},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {125--133},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346820},
  doi          = {10.1109/CNS.2015.7346820},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MekkyMZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MoriyamaY15,
  author       = {Daisuke Moriyama and
                  Moti Yung},
  title        = {The bright side arguments for the coming smartphones crypto war: The
                  added value of device encryption},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {65--73},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346812},
  doi          = {10.1109/CNS.2015.7346812},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MoriyamaY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MunozMGH15,
  author       = {Alfonso Mu{\~{n}}oz and
                  Ignacio Mart{\'{\i}}n and
                  Antonio Guzm{\'{a}}n and
                  Jos{\'{e}} Alberto Hern{\'{a}}ndez},
  title        = {Android malware detection from Google Play meta-data: Selection of
                  important features},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {701--702},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346893},
  doi          = {10.1109/CNS.2015.7346893},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MunozMGH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MuttiBP15,
  author       = {Simone Mutti and
                  Enrico Bacis and
                  Stefano Paraboschi},
  title        = {An SELinux-based intent manager for Android},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {747--748},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346916},
  doi          = {10.1109/CNS.2015.7346916},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MuttiBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MutuSM15,
  author       = {Laura Mutu and
                  Rania Saleh and
                  Ashraf Matrawy},
  title        = {Improved {SDN} responsiveness to {UDP} flood attacks},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {715--716},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346900},
  doi          = {10.1109/CNS.2015.7346900},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MutuSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/NaldiD15,
  author       = {Maurizio Naldi and
                  Giuseppe D'Acquisto},
  title        = {Option pricing in a privacy-aware market},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {759--760},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346922},
  doi          = {10.1109/CNS.2015.7346922},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/NaldiD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/NaslundDSL15,
  author       = {Mats N{\"{a}}slund and
                  Elena Dubrova and
                  G{\"{o}}ran Selander and
                  Fredrik Lindqvist},
  title        = {A random access procedure based on tunable puzzles},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {533--540},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346866},
  doi          = {10.1109/CNS.2015.7346866},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/NaslundDSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/NgSS15,
  author       = {Derrick Wing Kwan Ng and
                  Yan Sun and
                  Robert Schober},
  title        = {Power efficient and secure full-duplex wireless communication systems},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346803},
  doi          = {10.1109/CNS.2015.7346803},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/NgSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/OrtizRMIO15,
  author       = {Antonio M. Ortiz and
                  Erkuden Rios and
                  Wissam Mallouli and
                  Eider Iturbe and
                  Edgardo Montes de Oca},
  title        = {Self-protecting multi-cloud applications},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {643--647},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346880},
  doi          = {10.1109/CNS.2015.7346880},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/OrtizRMIO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PalmaMGB15,
  author       = {David Palma and
                  Pier Luca Montessoro and
                  Giulia Giordano and
                  Franco Blanchini},
  title        = {A dynamic algorithm for palmprint recognition},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {659--662},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346883},
  doi          = {10.1109/CNS.2015.7346883},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PalmaMGB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PapadimitriouPG15,
  author       = {Kyprianos Papadimitriou and
                  Polydoros Petrakis and
                  Miltos D. Grammatikakis and
                  Marcello Coppola},
  title        = {Security Enhancements for building saturation-free, low-power NoC-based
                  MPSoCs},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {594--600},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346873},
  doi          = {10.1109/CNS.2015.7346873},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PapadimitriouPG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RassS15,
  author       = {Stefan Rass and
                  Peter Schartner},
  title        = {Licensed processing of encrypted information},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {703--704},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346894},
  doi          = {10.1109/CNS.2015.7346894},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/RassS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RenWCC015,
  author       = {Yanzhi Ren and
                  Chen Wang and
                  Yingying Chen and
                  Mooi Choo Chuah and
                  Jie Yang},
  title        = {Critical segment based real-time E-signature for securing mobile transactions},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {7--15},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346804},
  doi          = {10.1109/CNS.2015.7346804},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RenWCC015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RezaeiHSRS15,
  author       = {Fahimeh Rezaei and
                  Michael Hempel and
                  Pradhumna Lai Shrestha and
                  Sushanta Mohan Rakshit and
                  Hamid Sharif},
  title        = {A novel Covert Timing Channel detection approach for online network
                  traffic},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {737--738},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346911},
  doi          = {10.1109/CNS.2015.7346911},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RezaeiHSRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SaikiC15,
  author       = {Cornelius Saiki and
                  Arsenia Chorti},
  title        = {A novel physical layer authenticated encryption protocol exploiting
                  shared randomness},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {113--118},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346818},
  doi          = {10.1109/CNS.2015.7346818},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SaikiC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SalimiJSP15,
  author       = {Somayeh Salimi and
                  Eduard A. Jorswieck and
                  Mikael Skoglund and
                  Panos Papadimitratos},
  title        = {Key agreement over an interference channel with noiseless feedback:
                  Achievable region {\&} distributed allocation},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {59--64},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346811},
  doi          = {10.1109/CNS.2015.7346811},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SalimiJSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ScaifeCT15,
  author       = {Nolen Scaife and
                  Henry Carter and
                  Patrick Traynor},
  title        = {OnionDNS: {A} seizure-resistant top-level Domain},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {379--387},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346849},
  doi          = {10.1109/CNS.2015.7346849},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ScaifeCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SeeberSR15,
  author       = {Sebastian Seeber and
                  Lars Stiemert and
                  Gabi Dreo Rodosek},
  title        = {Towards an SDN-enabled {IDS} environment},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {751--752},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346918},
  doi          = {10.1109/CNS.2015.7346918},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SeeberSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShresthaHRS15,
  author       = {Pradhumna Lal Shrestha and
                  Michael Hempel and
                  Fahimeh Rezaei and
                  Hamid Sharif},
  title        = {A novel analytical model and its test bed verification for network
                  covert timing channels},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {227--235},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346832},
  doi          = {10.1109/CNS.2015.7346832},
  timestamp    = {Fri, 23 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ShresthaHRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SteinmetzerCCKH15,
  author       = {Daniel Steinmetzer and
                  Joe Chen and
                  Jiska Classen and
                  Edward W. Knightly and
                  Matthias Hollick},
  title        = {Eavesdropping with periscopes: Experimental security analysis of highly
                  directional millimeter waves},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {335--343},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346844},
  doi          = {10.1109/CNS.2015.7346844},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SteinmetzerCCKH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TaiebC15,
  author       = {Mohamed Haj Taieb and
                  Jean{-}Yves Chouinard},
  title        = {Reliable and secure communications over Gaussian wiretap channel using
                  {HARQ} {LDPC} codes and error contamination},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {158--163},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346824},
  doi          = {10.1109/CNS.2015.7346824},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/TaiebC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Tomasin15,
  author       = {Stefano Tomasin},
  title        = {A Gale-Shapley algorithm for allocation of relayed parallel wiretap
                  coding channels},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {119--124},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346819},
  doi          = {10.1109/CNS.2015.7346819},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Tomasin15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TuLPL15,
  author       = {Guan{-}Hua Tu and
                  Chi{-}Yu Li and
                  Chunyi Peng and
                  Songwu Lu},
  title        = {How voice call technology poses security threats in 4G {LTE} networks},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {442--450},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346856},
  doi          = {10.1109/CNS.2015.7346856},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TuLPL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Urien15,
  author       = {Pascal Urien},
  title        = {New direction for open {NFC} trusted mobile applications: The {MOBISIM}
                  project},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {711--712},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346898},
  doi          = {10.1109/CNS.2015.7346898},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/Urien15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Vasilomanolakis15,
  author       = {Emmanouil Vasilomanolakis and
                  Michael Stahn and
                  Carlos Garcia Cordero and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {Probe-response attacks on collaborative intrusion detection systems:
                  Effectiveness and countermeasures},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {699--700},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346892},
  doi          = {10.1109/CNS.2015.7346892},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Vasilomanolakis15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Vasilomanolakis15a,
  author       = {Emmanouil Vasilomanolakis and
                  Shreyas Srinivasa and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {Did you really hack a nuclear power plant? An industrial control mobile
                  honeypot},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {729--730},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346907},
  doi          = {10.1109/CNS.2015.7346907},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Vasilomanolakis15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/VenkatesanAJ15,
  author       = {Sridhar Venkatesan and
                  Massimiliano Albanese and
                  Sushil Jajodia},
  title        = {Disrupting stealthy botnets through strategic placement of detectors},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {95--103},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346816},
  doi          = {10.1109/CNS.2015.7346816},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/VenkatesanAJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/VuCASED15,
  author       = {Quang Hieu Vu and
                  Maurizio Colombo and
                  Rasool Asal and
                  Ali Sajjad and
                  Fadi Ali El{-}Moussa and
                  Theo Dimitrakos},
  title        = {Secure Cloud Storage: {A} framework for Data Protection as a Service
                  in the multi-cloud environment},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {638--642},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346879},
  doi          = {10.1109/CNS.2015.7346879},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/VuCASED15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/VukovicGD15,
  author       = {Dijana Vukovic and
                  Danilo Gligoroski and
                  Zoran Djuric},
  title        = {CryptoCloak protocol and the prototype application},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {721--722},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346903},
  doi          = {10.1109/CNS.2015.7346903},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/VukovicGD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangLGX15,
  author       = {Zhaoguo Wang and
                  Chenglong Li and
                  Yi Guan and
                  Yibo Xue},
  title        = {DroidChain: {A} novel malware detection method for Android based on
                  behavior chain},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {727--728},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346906},
  doi          = {10.1109/CNS.2015.7346906},
  timestamp    = {Tue, 07 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangLGX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangLH15,
  author       = {Bing Wang and
                  Wenjing Lou and
                  Y. Thomas Hou},
  title        = {Modeling the side-channel attacks in data deduplication with game
                  theory},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {200--208},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346829},
  doi          = {10.1109/CNS.2015.7346829},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangLTZ15,
  author       = {Yufeng Wang and
                  Waqas Latif and
                  Chiu C. Tan and
                  Yifan Zhang},
  title        = {Security and privacy for body cameras used in law enforcement},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {173--181},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346826},
  doi          = {10.1109/CNS.2015.7346826},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangLTZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangLWL15,
  author       = {Boyang Wang and
                  Ming Li and
                  Haitao Wang and
                  Hui Li},
  title        = {Circular range search on encrypted spatial data},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {182--190},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346827},
  doi          = {10.1109/CNS.2015.7346827},
  timestamp    = {Wed, 10 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangLWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangS15,
  author       = {Pengwei Wang and
                  Reihaneh Safavi{-}Naini},
  title        = {Adversarial wiretap channel with public discussion},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {281--289},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346838},
  doi          = {10.1109/CNS.2015.7346838},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangW15,
  author       = {Jing Wang and
                  Hongjun Wu},
  title        = {{URFDS:} Systematic discovery of Unvalidated Redirects and Forwards
                  in web applications},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {697--698},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346891},
  doi          = {10.1109/CNS.2015.7346891},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/WangW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangYKH15,
  author       = {Qinglong Wang and
                  Amir Yahyavi and
                  Bettina Kemme and
                  Wenbo He},
  title        = {I know what you did on your smartphone: Inferring app usage over encrypted
                  data traffic},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {433--441},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346855},
  doi          = {10.1109/CNS.2015.7346855},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangYKH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangZLF15,
  author       = {Kai Wang and
                  Yuqing Zhang and
                  Qixu Liu and
                  Dan Fan},
  title        = {A fuzzing test for dynamic vulnerability detection on Android Binder
                  mechanism},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {709--710},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346897},
  doi          = {10.1109/CNS.2015.7346897},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangZLF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XuP15,
  author       = {Yisi Xu and
                  Derek Chi{-}Wai Pao},
  title        = {Space-time tradeoff in the Aho-Corasick string matching algorithm},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {713--714},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346899},
  doi          = {10.1109/CNS.2015.7346899},
  timestamp    = {Thu, 20 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XuP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YangL15,
  author       = {Lei Yang and
                  Fengjun Li},
  title        = {mTor: {A} multipath Tor routing beyond bandwidth throttling},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {479--487},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346860},
  doi          = {10.1109/CNS.2015.7346860},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YangL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YangL15a,
  author       = {Lei Yang and
                  Fengjun Li},
  title        = {Enhancing traffic analysis resistance for Tor hidden services with
                  multipath routing},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {745--746},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346915},
  doi          = {10.1109/CNS.2015.7346915},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YangL15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YangO15,
  author       = {Huihui Yang and
                  Vladimir A. Oleshchuk},
  title        = {Traceable hierarchical attribute-based authentication for the cloud},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {685--689},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346888},
  doi          = {10.1109/CNS.2015.7346888},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YangO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YangVN15,
  author       = {Y. Yang and
                  Natalija Vlajic and
                  Uyen Trang Nguyen},
  title        = {Web bots that mimic human browsing behavior on previously unvisited
                  web-sites: Feasibility study and security implications},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {757--758},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346921},
  doi          = {10.1109/CNS.2015.7346921},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/YangVN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YuanWCWQ15,
  author       = {Xingliang Yuan and
                  Xinyu Wang and
                  Yilei Chu and
                  Cong Wang and
                  Chen Qian},
  title        = {Towards a scalable, private, and searchable key-value store},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {773--774},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346929},
  doi          = {10.1109/CNS.2015.7346929},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YuanWCWQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangM15,
  author       = {Liyang Zhang and
                  Tommaso Melodia},
  title        = {Hammer and anvil: The threat of a cross-layer jamming-aided data control
                  attack in multihop wireless networks},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {361--369},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346847},
  doi          = {10.1109/CNS.2015.7346847},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangP15,
  author       = {Han Zhang and
                  Christos Papadopoulos},
  title        = {Early detection of high entropy traffic},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {104--112},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346817},
  doi          = {10.1109/CNS.2015.7346817},
  timestamp    = {Mon, 16 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangSZZ15,
  author       = {Jinxue Zhang and
                  Jingchao Sun and
                  Rui Zhang and
                  Yanchao Zhang},
  title        = {Your actions tell where you are: Uncovering Twitter users in a metropolitan
                  area},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {424--432},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346854},
  doi          = {10.1109/CNS.2015.7346854},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangSZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZorguiRAJA15,
  author       = {Marwen Zorgui and
                  Zouheir Rezki and
                  Basel Alomair and
                  Eduard A. Jorswieck and
                  Mohamed{-}Slim Alouini},
  title        = {Secret-key agreement over spatially correlated multiple-antenna channels
                  in the low-SNR regime},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {719--720},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346902},
  doi          = {10.1109/CNS.2015.7346902},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZorguiRAJA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2015,
  title        = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7336674/proceeding},
  isbn         = {978-1-4673-7876-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/0001S14,
  author       = {Jun Li and
                  Shad Stafford},
  title        = {Detecting smart, self-propagating Internet worms},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {193--201},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997486},
  doi          = {10.1109/CNS.2014.6997486},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/0001S14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AbdouMO14,
  author       = {AbdelRahman Abdou and
                  Ashraf Matrawy and
                  Paul C. van Oorschot},
  title        = {Location verification on the Internet: Towards enforcing location-aware
                  access policies over Internet clients},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {175--183},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997484},
  doi          = {10.1109/CNS.2014.6997484},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AbdouMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlbaneseBJC14,
  author       = {Massimiliano Albanese and
                  Ermanno Battista and
                  Sushil Jajodia and
                  Valentina Casola},
  title        = {Manipulating the attacker's view of a system's attack surface},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {472--480},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997517},
  doi          = {10.1109/CNS.2014.6997517},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlbaneseBJC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AliYAKZ14,
  author       = {Muhammad Qasim Ali and
                  Reza Yousefian and
                  Ehab Al{-}Shaer and
                  Sukumar Kamalasadan and
                  Quanyan Zhu},
  title        = {Two-tier data-driven intrusion detection for automatic generation
                  control in smart grid},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {292--300},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997497},
  doi          = {10.1109/CNS.2014.6997497},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AliYAKZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlisPOS14,
  author       = {Jorge Blasco Al{\'{\i}}s and
                  Roberto Di Pietro and
                  Agust{\'{\i}}n Orfila and
                  Alessandro Sorniotti},
  title        = {A tunable proof of ownership scheme for deduplication using Bloom
                  filters},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {481--489},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997518},
  doi          = {10.1109/CNS.2014.6997518},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlisPOS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlsalehA14,
  author       = {Mohammed Noraden Alsaleh and
                  Ehab Al{-}Shaer},
  title        = {Security configuration analytics using video games},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {256--264},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997493},
  doi          = {10.1109/CNS.2014.6997493},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlsalehA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BauerCJPT14,
  author       = {Lujo Bauer and
                  Shaoying Cai and
                  Limin Jia and
                  Timothy Passaro and
                  Yuan Tian},
  title        = {Analyzing the dangers posed by Chrome extensions},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {184--192},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997485},
  doi          = {10.1109/CNS.2014.6997485},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BauerCJPT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BeatoCPV14,
  author       = {Filipe Beato and
                  Mauro Conti and
                  Bart Preneel and
                  Dario Vettore},
  title        = {VirtualFriendship: Hiding interactions on Online Social Networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {328--336},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997501},
  doi          = {10.1109/CNS.2014.6997501},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BeatoCPV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BorgesBM14,
  author       = {F{\'{a}}bio Borges and
                  Johannes Buchmann and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {Introducing asymmetric DC-Nets},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {508--509},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997528},
  doi          = {10.1109/CNS.2014.6997528},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/BorgesBM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BorgesM14,
  author       = {F{\'{a}}bio Borges and
                  Leonardo A. Martucci},
  title        = {iKUP keeps users' privacy in the Smart Grid},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {310--318},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997499},
  doi          = {10.1109/CNS.2014.6997499},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BorgesM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Braun14,
  author       = {Johannes Braun},
  title        = {Ubiquitous support of multi path probing: Preventing man in the middle
                  attacks on Internet communication},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {510--511},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997529},
  doi          = {10.1109/CNS.2014.6997529},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Braun14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CarlsonNHOC14,
  author       = {C. Carlson and
                  Vieny Nguyen and
                  Seth D. Hitefield and
                  Timothy J. O'Shea and
                  T. Charles Clancy},
  title        = {Measuring smart jammer strategy efficacy over the air},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {7--13},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997459},
  doi          = {10.1109/CNS.2014.6997459},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CarlsonNHOC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChandrasekharS14,
  author       = {Santosh Chandrasekhar and
                  Mukesh Singhal},
  title        = {Multi-trapdoor hash functions and their applications in network security},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {463--471},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997516},
  doi          = {10.1109/CNS.2014.6997516},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChandrasekharS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenG14,
  author       = {Wenji Chen and
                  Yong Guan},
  title        = {Identifying global hot items in distributed dynamic data streams},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {418--426},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997511},
  doi          = {10.1109/CNS.2014.6997511},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChenG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenNS14,
  author       = {Kan Chen and
                  Balasubramaniam Natarajan and
                  Steve Shattil},
  title        = {Relay-based secret key generation in {LTE-A}},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {139--144},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997479},
  doi          = {10.1109/CNS.2014.6997479},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChenNS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenXFY14,
  author       = {Fei Chen and
                  Tao Xiang and
                  Xinwen Fu and
                  Wei Yu},
  title        = {Towards verifiable file search on the cloud},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {346--354},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997503},
  doi          = {10.1109/CNS.2014.6997503},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ChenXFY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChouB14,
  author       = {Remi A. Chou and
                  Matthieu R. Bloch},
  title        = {Uniform distributed source coding for the multiple access wiretap
                  channel},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {127--132},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997477},
  doi          = {10.1109/CNS.2014.6997477},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChouB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CorellaL14,
  author       = {Francisco Corella and
                  Karen Pomian Lewison},
  title        = {Identity-based protocol design patterns for machine-to-machine secure
                  channels},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {91--96},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997471},
  doi          = {10.1109/CNS.2014.6997471},
  timestamp    = {Mon, 02 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CorellaL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CuiY14,
  author       = {Biru Cui and
                  Shanchieh Jay Yang},
  title        = {{NRE:} Suppress Selective Forwarding attacks in Wireless Sensor Networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {229--237},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997490},
  doi          = {10.1109/CNS.2014.6997490},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CuiY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Draper-GilFHT14,
  author       = {Gerard Draper{-}Gil and
                  Josep Llu{\'{\i}}s Ferrer{-}Gomila and
                  M. Francisca Hinarejos and
                  Arne Tauber},
  title        = {An optimistic certified e-mail protocol for the current Internet e-mail
                  architecture},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {382--390},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997507},
  doi          = {10.1109/CNS.2014.6997507},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/Draper-GilFHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FontBBH14,
  author       = {Giselle Font and
                  Javier Bustos{-}Jim{\'{e}}nez and
                  Sebastian Blasco and
                  Alejandro Hevia},
  title        = {Location privacy for a quality of access to mobile Internet monitoring
                  system},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {518--519},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997533},
  doi          = {10.1109/CNS.2014.6997533},
  timestamp    = {Tue, 12 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/FontBBH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GarnaevT14,
  author       = {Andrey Garnaev and
                  Wade Trappe},
  title        = {Bandwidth scanning involving a Bayesian approach to adapting the belief
                  of an adversary's presence},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {35--43},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997463},
  doi          = {10.1109/CNS.2014.6997463},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GarnaevT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GermanusRSS14,
  author       = {Daniel Germanus and
                  Stefanie Roos and
                  Thorsten Strufe and
                  Neeraj Suri},
  title        = {Mitigating Eclipse attacks in Peer-To-Peer networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {400--408},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997509},
  doi          = {10.1109/CNS.2014.6997509},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GermanusRSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GungorK14,
  author       = {Onur G{\"{u}}ng{\"{o}}r and
                  Can Emre Koksal},
  title        = {RF-fingerprint based authentication: Exponents and achievable rates},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {97--102},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997472},
  doi          = {10.1109/CNS.2014.6997472},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GungorK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HarrisonB14,
  author       = {Willie K. Harrison and
                  Parker Boyce},
  title        = {Parity modifications and stopping sets in high-rate codes for physical-layer
                  security},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {115--120},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997475},
  doi          = {10.1109/CNS.2014.6997475},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HarrisonB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HeDHWSN14,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Yufan Huang and
                  Dong Wang and
                  Wenbo Shen and
                  Peng Ning},
  title        = {The security of link signature: {A} view from channel models},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {103--108},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997473},
  doi          = {10.1109/CNS.2014.6997473},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HeDHWSN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HitefieldNCOC14,
  author       = {Seth D. Hitefield and
                  Vieny Nguyen and
                  C. Carlson and
                  Timothy J. O'Shea and
                  T. Charles Clancy},
  title        = {Demonstrated LLC-layer attack and defense strategies for wireless
                  communication systems},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {60--66},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997466},
  doi          = {10.1109/CNS.2014.6997466},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HitefieldNCOC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/IglesiasZ14,
  author       = {F{\'{e}}lix Iglesias and
                  Tanja Zseby},
  title        = {Modelling {IP} darkspace traffic by means of clustering techniques},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {166--174},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997483},
  doi          = {10.1109/CNS.2014.6997483},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/IglesiasZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JinMAS14,
  author       = {Zituo Jin and
                  J. P. Morgan and
                  Santhanakrishnan Anand and
                  K. P. Subbalakshmi},
  title        = {{NEAT:} {A} NEighbor AssisTed spectrum decision protocol for resilience
                  against {PUEA}},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {44--52},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997464},
  doi          = {10.1109/CNS.2014.6997464},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/JinMAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JinSZPM14,
  author       = {Rong Jin and
                  Liu Shi and
                  Kai Zeng and
                  Amit Pande and
                  Prasant Mohapatra},
  title        = {MagPairing: Exploiting magnetometers for pairing smartphones in close
                  proximity},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {445--453},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997514},
  doi          = {10.1109/CNS.2014.6997514},
  timestamp    = {Thu, 16 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/JinSZPM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Kim14,
  author       = {Sang Wu Kim},
  title        = {Physical integrity check in wireless relay networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {514--515},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997531},
  doi          = {10.1109/CNS.2014.6997531},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Kim14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KimDT14,
  author       = {Yu Seung Kim and
                  Bruce DeBruhl and
                  Patrick Tague},
  title        = {{JADE:} Jamming-averse routing on cognitive radio mesh networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {21--28},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997461},
  doi          = {10.1109/CNS.2014.6997461},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KimDT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KimTNT14,
  author       = {Yu Seung Kim and
                  Yuan Tian and
                  Le T. Nguyen and
                  Patrick Tague},
  title        = {LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi
                  networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {427--435},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997512},
  doi          = {10.1109/CNS.2014.6997512},
  timestamp    = {Wed, 08 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KimTNT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KrimmlingP14,
  author       = {Jana Krimmling and
                  Steffen Peter},
  title        = {Integration and evaluation of intrusion detection for CoAP in smart
                  city applications},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {73--78},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997468},
  doi          = {10.1109/CNS.2014.6997468},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KrimmlingP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KwonJLL14,
  author       = {Jonghoon Kwon and
                  Jihwan Jeong and
                  Jehyun Lee and
                  Heejo Lee},
  title        = {DroidGraph: discovering Android malware by analyzing semantic behavior},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {498--499},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997523},
  doi          = {10.1109/CNS.2014.6997523},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KwonJLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LeeZCC14,
  author       = {Changmin Lee and
                  Luca Zappaterra and
                  Kwanghee Choi and
                  Hyeong{-}Ah Choi},
  title        = {Securing smart home: Technologies, security challenges, and security
                  requirements},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {67--72},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997467},
  doi          = {10.1109/CNS.2014.6997467},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LeeZCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiVHWZ14,
  author       = {Bing Li and
                  Ashwin Prabhu Verleker and
                  Dijiang Huang and
                  Zhijie Wang and
                  Yan Zhu},
  title        = {Attribute-based access control for {ICN} naming scheme},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {391--399},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997508},
  doi          = {10.1109/CNS.2014.6997508},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiVHWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiZTJ14,
  author       = {Longquan Li and
                  Sencun Zhu and
                  Don J. Torrieri and
                  Sushil Jajodia},
  title        = {Self-healing wireless networks under insider jamming attacks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {220--228},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997489},
  doi          = {10.1109/CNS.2014.6997489},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiZTJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LinJ14,
  author       = {Pin{-}Hsun Lin and
                  Eduard A. Jorswieck},
  title        = {On the fading Gaussian wiretap channel with statistical channel state
                  information at transmitter},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {121--126},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997476},
  doi          = {10.1109/CNS.2014.6997476},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LinJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LuZCS14,
  author       = {Xiaoyan Lu and
                  Michael Zuba and
                  Jun{-}Hong Cui and
                  Zhijie Jerry Shi},
  title        = {Uncooperative localization improves attack performance in Underwater
                  Acoustic Networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {454--462},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997515},
  doi          = {10.1109/CNS.2014.6997515},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LuZCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MaJWWGC14,
  author       = {Ting Ma and
                  Yixin Jiang and
                  Hong Wen and
                  Bin Wu and
                  Xiaobin Guo and
                  Zhen Chen},
  title        = {Physical Layer Assist Mutual Authentication scheme for smart meter
                  system},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {494--495},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997521},
  doi          = {10.1109/CNS.2014.6997521},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MaJWWGC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MarchettaPP14,
  author       = {Pietro Marchetta and
                  Valerio Persico and
                  Antonio Pescap{\`{e}}},
  title        = {The Greenhouse Effect Attack},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {516--517},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997532},
  doi          = {10.1109/CNS.2014.6997532},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/MarchettaPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MarttinenWJ14,
  author       = {Aleksi Marttinen and
                  Alexander M. Wyglinski and
                  Riku J{\"{a}}ntti},
  title        = {Moving-target defense mechanisms against source-selective jamming
                  attacks in tactical cognitive radio MANETs},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {14--20},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997460},
  doi          = {10.1109/CNS.2014.6997460},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MarttinenWJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MohaisenWMA14,
  author       = {Aziz Mohaisen and
                  Andrew G. West and
                  Allison Mankin and
                  Omar Alrawi},
  title        = {Chatter: Classifying malware families using system event ordering},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {283--291},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997496},
  doi          = {10.1109/CNS.2014.6997496},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MohaisenWMA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MunozMM14,
  author       = {Melesio Calderon Munoz and
                  Melody Moh and
                  Teng{-}Sheng Moh},
  title        = {Improving smart grid security using Merkle Trees},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {522--523},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997535},
  doi          = {10.1109/CNS.2014.6997535},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MunozMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MustafaX14,
  author       = {Hossen Asiful Mustafa and
                  Wenyuan Xu},
  title        = {{CETAD:} Detecting evil twin access point attacks in wireless hotspots},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {238--246},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997491},
  doi          = {10.1109/CNS.2014.6997491},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MustafaX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/NingSMKCM14,
  author       = {Jianxia Ning and
                  Indrajeet Singh and
                  Harsha V. Madhyastha and
                  Srikanth V. Krishnamurthy and
                  Guohong Cao and
                  Prasant Mohapatra},
  title        = {Secret message sharing using online social media},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {319--327},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997500},
  doi          = {10.1109/CNS.2014.6997500},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/NingSMKCM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/NotraSGSB14,
  author       = {Sukhvir Notra and
                  Muhammad Siddiqi and
                  Hassan Habibi Gharakheili and
                  Vijay Sivaraman and
                  Roksana Boreli},
  title        = {An experimental study of security and privacy risks with emerging
                  household appliances},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {79--84},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997469},
  doi          = {10.1109/CNS.2014.6997469},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/NotraSGSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Onishi14,
  author       = {Hiro Onishi},
  title        = {Approaches for vehicle cyber security},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {506--507},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997527},
  doi          = {10.1109/CNS.2014.6997527},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Onishi14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ParkLS14,
  author       = {Young{-}Hoon Park and
                  Eun{-}Dong Lee and
                  Seung{-}Woo Seo},
  title        = {Lightweight (k, n)-file sharing scheme for distributed storages with
                  diverse communication capacities},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {373--381},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997506},
  doi          = {10.1109/CNS.2014.6997506},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ParkLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ProbstPK14,
  author       = {Matthew J. Probst and
                  Jun Cheol Park and
                  Sneha Kumar Kasera},
  title        = {Exploiting altruism in social networks for friend-to-friend malware
                  detection},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {274--282},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997495},
  doi          = {10.1109/CNS.2014.6997495},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ProbstPK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RefaeyNWC14,
  author       = {Ahmed Refaey and
                  Raheleh Niati and
                  Xianbin Wang and
                  Jean{-}Yves Chouinard},
  title        = {Blind detection approach for LDPC, convolutional, and turbo codes
                  in non-noisy environment},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {502--503},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997525},
  doi          = {10.1109/CNS.2014.6997525},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RefaeyNWC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RehmanSAA14,
  author       = {Saeed Ur Rehman and
                  Kevin W. Sowerby and
                  Shafiq Alam and
                  Iman Tabatabaei Ardekani},
  title        = {Portability of an {RF} fingerprint of a wireless transmitter},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {151--156},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997481},
  doi          = {10.1109/CNS.2014.6997481},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RehmanSAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RehmanSAA14a,
  author       = {Saeed Ur Rehman and
                  Kevin W. Sowerby and
                  Shafiq Alam and
                  Iman Tabatabaei Ardekani},
  title        = {Radio frequency fingerprinting and its challenges},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {496--497},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997522},
  doi          = {10.1109/CNS.2014.6997522},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RehmanSAA14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RenJGHWWC14,
  author       = {Mengyin Ren and
                  Yixin Jiang and
                  Xiaobin Guo and
                  Qiyi Han and
                  Hong Wen and
                  Bin Wu and
                  Zhen Chen},
  title        = {{P2P} networks monitoring based on the social network analysis and
                  the topological potential},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {492--493},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997520},
  doi          = {10.1109/CNS.2014.6997520},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RenJGHWWC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Saint-PierreCB14,
  author       = {Cecilia Saint{-}Pierre and
                  Francisco Cifuentes and
                  Javier Bustos{-}Jim{\'{e}}nez},
  title        = {Detecting anomalies in {DNS} protocol traces via Passive Testing and
                  Process Mining},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {520--521},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997534},
  doi          = {10.1109/CNS.2014.6997534},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Saint-PierreCB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SamaniJSG14,
  author       = {Elaheh Biglar Beigi Samani and
                  Hossein Hadian Jazi and
                  Natalia Stakhanova and
                  Ali A. Ghorbani},
  title        = {Towards effective feature selection in machine learning-based botnet
                  detection approaches},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {247--255},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997492},
  doi          = {10.1109/CNS.2014.6997492},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SamaniJSG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SchaeferP14,
  author       = {Rafael F. Schaefer and
                  H. Vincent Poor},
  title        = {On secure communication over multiple access wiretap channels under
                  channel uncertainty},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {109--114},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997474},
  doi          = {10.1109/CNS.2014.6997474},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SchaeferP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShaoZCX14,
  author       = {Yiyang Shao and
                  Luoshi Zhang and
                  Xiaoxian Chen and
                  Yibo Xue},
  title        = {Towards time-varying classification based on traffic pattern},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {512--513},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997530},
  doi          = {10.1109/CNS.2014.6997530},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ShaoZCX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShenNHDL14,
  author       = {Wenbo Shen and
                  Peng Ning and
                  Xiaofan He and
                  Huaiyu Dai and
                  Yao Liu},
  title        = {{MCR} Decoding: {A} {MIMO} approach for defending against wireless
                  jamming attacks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {133--138},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997478},
  doi          = {10.1109/CNS.2014.6997478},
  timestamp    = {Sat, 24 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ShenNHDL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SibomanaZT14,
  author       = {Louis Sibomana and
                  Hans{-}J{\"{u}}rgen Zepernick and
                  Hung Tran},
  title        = {Achievable secrecy capacity in an underlay cognitive radio network},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997458},
  doi          = {10.1109/CNS.2014.6997458},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SibomanaZT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Sodagari14,
  author       = {Shabnam Sodagari},
  title        = {Secure distributed spectrum sensing in cognitive radio networks using
                  multi-armed bandits},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {29--34},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997462},
  doi          = {10.1109/CNS.2014.6997462},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Sodagari14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/StevanovicV14,
  author       = {Dusan Stevanovic and
                  Natalija Vlajic},
  title        = {Application-layer DDoS in dynamic Web-domains: Building defenses against
                  next-generation attack behavior},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {490--491},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997519},
  doi          = {10.1109/CNS.2014.6997519},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/StevanovicV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Sun0ZZ14,
  author       = {Jingchao Sun and
                  Rui Zhang and
                  Jinxue Zhang and
                  Yanchao Zhang},
  title        = {TouchIn: Sightless two-factor authentication on multi-touch mobile
                  devices},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {436--444},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997513},
  doi          = {10.1109/CNS.2014.6997513},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Sun0ZZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TangSPWWJGC14,
  author       = {Jie Tang and
                  Huanhuan Song and
                  Fei Pan and
                  Hong Wen and
                  Bin Wu and
                  Yixin Jiang and
                  Xiaobin Guo and
                  Zhen Chen},
  title        = {A {MIMO} cross-layer precoding security communication system},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {500--501},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997524},
  doi          = {10.1109/CNS.2014.6997524},
  timestamp    = {Tue, 24 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TangSPWWJGC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TianDBD14,
  author       = {Guanyu Tian and
                  Zhenhai Duan and
                  Todd Baumeister and
                  Yingfei Dong},
  title        = {Reroute on loop in anonymous peer-to-peer content sharing networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {409--417},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997510},
  doi          = {10.1109/CNS.2014.6997510},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TianDBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/UluagacLB14,
  author       = {A. Selcuk Uluagac and
                  Wenyi Liu and
                  Raheem A. Beyah},
  title        = {A multi-factor re-authentication framework with user privacy},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {504--505},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997526},
  doi          = {10.1109/CNS.2014.6997526},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/UluagacLB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/UluagacSB14,
  author       = {A. Selcuk Uluagac and
                  Venkatachalam Subramanian and
                  Raheem A. Beyah},
  title        = {Sensory channel threats to Cyber Physical Systems: {A} wake-up call},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {301--309},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997498},
  doi          = {10.1109/CNS.2014.6997498},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/UluagacSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/UludagLRN14,
  author       = {Suleyman Uludag and
                  King{-}Shan Lui and
                  Wenyu Ren and
                  Klara Nahrstedt},
  title        = {Practical and secure Machine-to-Machine data collection protocol in
                  Smart Grid},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {85--90},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997470},
  doi          = {10.1109/CNS.2014.6997470},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/UludagLRN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/VimercatiFJLPS14,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Giovanni Livraga and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Integrity for distributed queries},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {364--372},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997505},
  doi          = {10.1109/CNS.2014.6997505},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/VimercatiFJLPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangC14,
  author       = {Ji Wang and
                  Ing{-}Ray Chen},
  title        = {Trust-based data fusion mechanism design in cognitive radio networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {53--59},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997465},
  doi          = {10.1109/CNS.2014.6997465},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangLC014,
  author       = {Boyang Wang and
                  Ming Li and
                  Sherman S. M. Chow and
                  Hui Li},
  title        = {A tale of two clouds: Computing on data encrypted under multiple keys},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {337--345},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997502},
  doi          = {10.1109/CNS.2014.6997502},
  timestamp    = {Wed, 19 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/WangLC014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangWN14,
  author       = {Chaofeng Wang and
                  Zhaohui Wang and
                  Saeid Nooshabadi},
  title        = {Signal alignment for secure underwater coordinated multipoint transmissions},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {145--150},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997480},
  doi          = {10.1109/CNS.2014.6997480},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangWN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XuZXY14,
  author       = {Li Xu and
                  Zhenxin Zhan and
                  Shouhuai Xu and
                  Keying Ye},
  title        = {An evasion and counter-evasion study in malicious websites detection},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {265--273},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997494},
  doi          = {10.1109/CNS.2014.6997494},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XuZXY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YoungY14,
  author       = {Adam L. Young and
                  Moti Yung},
  title        = {The drunk motorcyclist protocol for anonymous communication},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {157--165},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997482},
  doi          = {10.1109/CNS.2014.6997482},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YoungY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZengRY14,
  author       = {Kexiong Curtis Zeng and
                  Sreeraksha Kondaji Ramesh and
                  Yaling Yang},
  title        = {Location spoofing attack and its countermeasures in database-driven
                  cognitive radio networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {202--210},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997487},
  doi          = {10.1109/CNS.2014.6997487},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZengRY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangLJH14,
  author       = {Ning Zhang and
                  Wenjing Lou and
                  Xuxian Jiang and
                  Y. Thomas Hou},
  title        = {Enabling Trusted Data-intensive execution in cloud computing},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {355--363},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997504},
  doi          = {10.1109/CNS.2014.6997504},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangLJH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhengWC014,
  author       = {Xiuyuan Zheng and
                  Chen Wang and
                  Yingying Chen and
                  Jie Yang},
  title        = {Accurate rogue access point localization leveraging fine-grained channel
                  information},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {211--219},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997488},
  doi          = {10.1109/CNS.2014.6997488},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhengWC014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2014,
  title        = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6982337/proceeding},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/0002GR13,
  author       = {Robert Koch and
                  Mario Golling and
                  Gabi Dreo Rodosek},
  title        = {An architecture for supervising {COTS} products},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {403--404},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682749},
  doi          = {10.1109/CNS.2013.6682749},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/0002GR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/0002GR13a,
  author       = {Robert Koch and
                  Mario Golling and
                  Gabi Dreo Rodosek},
  title        = {Attracting sophisticated attacks to secure systems: {A} new honeypot
                  architecture},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {409--410},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682752},
  doi          = {10.1109/CNS.2013.6682752},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/0002GR13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/0002KB13,
  author       = {Aditi Gupta and
                  Michael S. Kirkpatrick and
                  Elisa Bertino},
  title        = {A secure architecture design based on application isolation, code
                  minimization and randomization},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {423--429},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682756},
  doi          = {10.1109/CNS.2013.6682756},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/0002KB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlbaneseBJS13,
  author       = {Massimiliano Albanese and
                  Alessandra De Benedictis and
                  Sushil Jajodia and
                  Kun Sun},
  title        = {A moving target defense mechanism for MANETs based on identity virtualization},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {278--286},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682717},
  doi          = {10.1109/CNS.2013.6682717},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlbaneseBJS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlsalehAA13,
  author       = {Mohammed Noraden Alsaleh and
                  Saeed Al{-}Haj and
                  Ehab Al{-}Shaer},
  title        = {Objective metrics for firewall security: {A} holistic view},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {470--477},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682762},
  doi          = {10.1109/CNS.2013.6682762},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlsalehAA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AtighetchiSPLSG13,
  author       = {Michael Atighetchi and
                  Nathaniel Soule and
                  Partha P. Pal and
                  Joseph P. Loyall and
                  Asher Sinclair and
                  Robert Grant},
  title        = {Safe configuration of {TLS} connections},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {415--422},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682755},
  doi          = {10.1109/CNS.2013.6682755},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AtighetchiSPLSG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BhuiyanMLH13,
  author       = {Mansurul Bhuiyan and
                  Aziz Mohaisen and
                  Yannis Labrou and
                  Mohammad Al Hasan},
  title        = {Characterization of the dynamics and interactions of domain names
                  and name server},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {387--388},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682741},
  doi          = {10.1109/CNS.2013.6682741},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BhuiyanMLH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BijonKS13,
  author       = {Khalid Zaman Bijon and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  title        = {A framework for risk-aware role based access control},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {462--469},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682761},
  doi          = {10.1109/CNS.2013.6682761},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BijonKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CallegariCGPP13,
  author       = {Christian Callegari and
                  Alessandro Casella and
                  Stefano Giordano and
                  Michele Pagano and
                  Teresa Pepe},
  title        = {Sketch-based multidimensional {IDS:} {A} new approach for network
                  anomaly detection},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {350--358},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682725},
  doi          = {10.1109/CNS.2013.6682725},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CallegariCGPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenHJS13,
  author       = {Zhigang Chen and
                  Xin Hu and
                  Xiaoen Ju and
                  Kang G. Shin},
  title        = {{LISA:} Location information ScrAmbler for privacy protection on smartphones},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {296--304},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682719},
  doi          = {10.1109/CNS.2013.6682719},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChenHJS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChengTLLLCTY13,
  author       = {Ray{-}Guang Cheng and
                  Po{-}Yao Tsai and
                  Ping{-}Chen Lin and
                  Chia{-}Liang Lian and
                  Tse{-}Han Liu and
                  Hsien{-}Cheng Chou and
                  Shiao{-}Li Tsao and
                  Shanchieh Jay Yang},
  title        = {Design and implementation of a Skype Protocol Analyzer},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {375--376},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682735},
  doi          = {10.1109/CNS.2013.6682735},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChengTLLLCTY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChoiS13,
  author       = {Sunghyun Choi and
                  Kang G. Shin},
  title        = {Secure cooperative spectrum sensing in cognitive radio networks using
                  interference signatures},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {19--27},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682688},
  doi          = {10.1109/CNS.2013.6682688},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ChoiS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CollbergGMSHS13,
  author       = {Christian S. Collberg and
                  Aaron Gibson and
                  Sam Martin and
                  Nitin Shinde and
                  Amir Herzberg and
                  Haya Schulmann},
  title        = {Provenance of exposure: Identifying sources of leaked documents},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {367--368},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682731},
  doi          = {10.1109/CNS.2013.6682731},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CollbergGMSHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Doerr13,
  author       = {Christian Doerr},
  title        = {Challenge tracing and mitigation under partial information and uncertainty},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {446--453},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682759},
  doi          = {10.1109/CNS.2013.6682759},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Doerr13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DuY13,
  author       = {Haitao Du and
                  Shanchieh Jay Yang},
  title        = {Sequential modeling for obfuscated network attack action sequences},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {389--390},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682742},
  doi          = {10.1109/CNS.2013.6682742},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DuY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DuanAJ13,
  author       = {Qi Duan and
                  Ehab Al{-}Shaer and
                  Jafar Haadi Jafarian},
  title        = {Efficient Random Route Mutation considering flow and network constraints},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {260--268},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682715},
  doi          = {10.1109/CNS.2013.6682715},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DuanAJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ElicesP13,
  author       = {Juan A. Elices and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Locating Tor hidden services through an interval-based traffic-correlation
                  attack},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {385--386},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682740},
  doi          = {10.1109/CNS.2013.6682740},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ElicesP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FitzgeraldF13,
  author       = {William M. Fitzgerald and
                  Simon N. Foley},
  title        = {Avoiding inconsistencies in the Security Content Automation Protocol},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {454--461},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682760},
  doi          = {10.1109/CNS.2013.6682760},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/FitzgeraldF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FrancoisSE13,
  author       = {J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and
                  Radu State and
                  Thomas Engel},
  title        = {Aggregated representations and metrics for scalable flow analysis},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {478--482},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682763},
  doi          = {10.1109/CNS.2013.6682763},
  timestamp    = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/FrancoisSE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GuanWST13,
  author       = {Kyle Guan and
                  Peter J. Winzer and
                  Emina Soljanin and
                  Antonia M. Tulino},
  title        = {On the secrecy capacity of the space-division multiplexed fiber optical
                  communication systems},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {207--214},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682709},
  doi          = {10.1109/CNS.2013.6682709},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GuanWST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GuoZF13,
  author       = {Linke Guo and
                  Chi Zhang and
                  Yuguang Fang},
  title        = {Privacy-preserving revocable content sharing in geosocial networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {118--126},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682699},
  doi          = {10.1109/CNS.2013.6682699},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/GuoZF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GustafsonL13,
  author       = {Jason Gustafson and
                  Jun Li},
  title        = {Leveraging the crowds to disrupt phishing},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {82--90},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682695},
  doi          = {10.1109/CNS.2013.6682695},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GustafsonL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GwonDFK13,
  author       = {Youngjune Gwon and
                  Siamak Dastangoo and
                  Carl Fossa and
                  H. T. Kung},
  title        = {Competing Mobile Network Game: Embracing antijamming and jamming strategies
                  with reinforcement learning},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {28--36},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682689},
  doi          = {10.1109/CNS.2013.6682689},
  timestamp    = {Tue, 28 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GwonDFK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HalfordCC13,
  author       = {Thomas R. Halford and
                  Thomas A. Courtade and
                  Keith M. Chugg},
  title        = {Energy-efficient, secure group key agreement for ad hoc networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {181--188},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682706},
  doi          = {10.1109/CNS.2013.6682706},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HalfordCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HanYZWXZJG13,
  author       = {Qiyi Han and
                  Lin Yu and
                  Rui Zhang and
                  Hong Wen and
                  Yuanpeng Xie and
                  Xiping Zhu and
                  Yixin Jiang and
                  Xiaobin Guo},
  title        = {A {P2P} recommended trust nodes selection algorithm based on topological
                  potential},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {395--396},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682745},
  doi          = {10.1109/CNS.2013.6682745},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HanYZWXZJG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HeDN13,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Peng Ning},
  title        = {Dynamic adaptive anti-jamming via controlled mobility},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682686},
  doi          = {10.1109/CNS.2013.6682686},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HeDN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HerzbergS13,
  author       = {Amir Herzberg and
                  Haya Schulmann},
  title        = {Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {224--232},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682711},
  doi          = {10.1109/CNS.2013.6682711},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HerzbergS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HerzbergS13a,
  author       = {Amir Herzberg and
                  Haya Schulmann},
  title        = {{DNSSEC:} Security and availability challenges},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {365--366},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682730},
  doi          = {10.1109/CNS.2013.6682730},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HerzbergS13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HsiaoCSC13,
  author       = {Shun{-}Wen Hsiao and
                  Yi{-}Ning Chen and
                  Yeali S. Sun and
                  Meng Chang Chen},
  title        = {A cooperative botnet profiling and detection in virtualized environment},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {154--162},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682703},
  doi          = {10.1109/CNS.2013.6682703},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/HsiaoCSC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HuCTW13,
  author       = {Kekai Hu and
                  Harikrishnan Chandrikakutty and
                  Russell Tessier and
                  Tilman Wolf},
  title        = {Scalable hardware monitors to protect network processors from data
                  plane attacks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {314--322},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682721},
  doi          = {10.1109/CNS.2013.6682721},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HuCTW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JajodiaLT13,
  author       = {Sushil Jajodia and
                  Wenjing Lou and
                  Wade Trappe},
  title        = {Welcome message},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682675},
  doi          = {10.1109/CNS.2013.6682675},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/JajodiaLT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JiangGLWLR13,
  author       = {Yixin Jiang and
                  Xiaobin Guo and
                  Chao Li and
                  Hong Wen and
                  Cai Lei and
                  Zhang Rui},
  title        = {An efficient and secure search database scheme for cloud computing
                  in smart grid},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {413--414},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682754},
  doi          = {10.1109/CNS.2013.6682754},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/JiangGLWLR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KhiabaniW13,
  author       = {Yahya Sowti Khiabani and
                  Shuangqing Wei},
  title        = {Exponential secrecy against unbounded adversary using joint encryption
                  and privacy amplification},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {198--206},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682708},
  doi          = {10.1109/CNS.2013.6682708},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KhiabaniW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KhouryLBBC13,
  author       = {Hicham El Khoury and
                  Romain Laborde and
                  Fran{\c{c}}ois Barr{\`{e}}re and
                  Abdelmalek Benzekri and
                  Maroun Chamoun},
  title        = {A specification method for analyzing fine grained network security
                  mechanism configurations},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {483--487},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682764},
  doi          = {10.1109/CNS.2013.6682764},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KhouryLBBC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KienzleEE13,
  author       = {Darrell M. Kienzle and
                  Nathan S. Evans and
                  Matthew C. Elder},
  title        = {{NICE:} Network Introspection by Collaborating Endpoints},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {411--412},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682753},
  doi          = {10.1109/CNS.2013.6682753},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KienzleEE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KirazL13,
  author       = {Osman Kiraz and
                  Albert Levi},
  title        = {Maintaining trajectory privacy in mobile wireless sensor networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {401--402},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682748},
  doi          = {10.1109/CNS.2013.6682748},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KirazL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KosbaMWT13,
  author       = {Ahmed E. Kosba and
                  Aziz Mohaisen and
                  Andrew G. West and
                  Trevor Tonn},
  title        = {{ADAM:} Automated detection and attribution of malicious webpages},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {399--400},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682747},
  doi          = {10.1109/CNS.2013.6682747},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KosbaMWT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Kumar0CB13,
  author       = {Vireshwar Kumar and
                  Jung{-}Min Park and
                  T. Charles Clancy and
                  Kaigui Bian},
  title        = {PHY-layer authentication by introducing controlled inter symbol interference},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {10--18},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682687},
  doi          = {10.1109/CNS.2013.6682687},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Kumar0CB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiDN13,
  author       = {Hongyang Li and
                  Gy{\"{o}}rgy D{\'{a}}n and
                  Klara Nahrstedt},
  title        = {{FADEC:} Fast authentication for dynamic electric vehicle charging},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {369--370},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682732},
  doi          = {10.1109/CNS.2013.6682732},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiDN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiMC13,
  author       = {Liyun Li and
                  Suhas Mathur and
                  Baris Coskun},
  title        = {Gangs of the internet: Towards automatic discovery of peer-to-peer
                  communities},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {64--72},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682693},
  doi          = {10.1109/CNS.2013.6682693},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiMC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiSPZL13,
  author       = {Huian Li and
                  Yan Sui and
                  Wei Peng and
                  Xukai Zou and
                  Feng Li},
  title        = {A viewable e-voting scheme for environments with conflict of interest},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {251--259},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682714},
  doi          = {10.1109/CNS.2013.6682714},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiSPZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiaoUB13,
  author       = {Xiaojing Liao and
                  A. Selcuk Uluagac and
                  Raheem A. Beyah},
  title        = {S-Match: An efficient privacy-preserving profile matching scheme},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {377--378},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682736},
  doi          = {10.1109/CNS.2013.6682736},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiaoUB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Limthong13,
  author       = {Kriangkrai Limthong},
  title        = {Performance of interval-based features for anomaly detection in network
                  traffic},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {361--362},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682727},
  doi          = {10.1109/CNS.2013.6682727},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Limthong13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiuCCY13,
  author       = {Hongbo Liu and
                  Yingying Chen and
                  Mooi Choo Chuah and
                  Jie Yang},
  title        = {Towards self-healing smart grid via intelligent local controller switching
                  under jamming},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {127--135},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682700},
  doi          = {10.1109/CNS.2013.6682700},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiuCCY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiuCG13,
  author       = {Yang Liu and
                  Wenji Chen and
                  Yong Guan},
  title        = {Identifying high-cardinality hosts from network-wide traffic measurements},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {287--295},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682718},
  doi          = {10.1109/CNS.2013.6682718},
  timestamp    = {Tue, 16 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiuCG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiyanageYG13,
  author       = {Madhusanka Liyanage and
                  Mika Ylianttila and
                  Andrei V. Gurtov},
  title        = {Secure hierarchical Virtual Private {LAN} Services for provider provisioned
                  networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {233--241},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682712},
  doi          = {10.1109/CNS.2013.6682712},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiyanageYG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MellH13,
  author       = {Peter Mell and
                  Richard E. Harang},
  title        = {Limitations to threshold random walk scan detection and mitigating
                  enhancements},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {332--340},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682723},
  doi          = {10.1109/CNS.2013.6682723},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MellH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MohaisenAWM13,
  author       = {Aziz Mohaisen and
                  Omar Alrawi and
                  Andrew G. West and
                  Allison Mankin},
  title        = {Babble: Identifying malware by its dialects},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {407--408},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682751},
  doi          = {10.1109/CNS.2013.6682751},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/MohaisenAWM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MoskalKHWYK13,
  author       = {Stephen Moskal and
                  Derek Kreider and
                  Lydia Hays and
                  Ben Wheeler and
                  Shanchieh Jay Yang and
                  Michael E. Kuhl},
  title        = {Simulating attack behaviors in enterprise networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {359--360},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682726},
  doi          = {10.1109/CNS.2013.6682726},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MoskalKHWYK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/NicanfarHATL13,
  author       = {Hasen Nicanfar and
                  Javad Hajipour and
                  Farshid Agharebparast and
                  Peyman TalebiFard and
                  Victor C. M. Leung},
  title        = {Privacy-preserving handover mechanism in 4G},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {373--374},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682734},
  doi          = {10.1109/CNS.2013.6682734},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/NicanfarHATL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PengLHZ013,
  author       = {Wei Peng and
                  Feng Li and
                  Keesook J. Han and
                  Xukai Zou and
                  Jie Wu},
  title        = {T-dominance: Prioritized defense deployment for {BYOD} security},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {37--45},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682690},
  doi          = {10.1109/CNS.2013.6682690},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/PengLHZ013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PerlmanK13,
  author       = {Radia J. Perlman and
                  Charlie Kaufman},
  title        = {Byzantine robustness, hierarchy, and scalability},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {242--250},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682713},
  doi          = {10.1109/CNS.2013.6682713},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PerlmanK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PieczulF13,
  author       = {Olgierd Pieczul and
                  Simon N. Foley},
  title        = {Discovering emergent norms in security logs},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {438--445},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682758},
  doi          = {10.1109/CNS.2013.6682758},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/PieczulF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PortnoiS13,
  author       = {Marcos Portnoi and
                  Chien{-}Chung Shen},
  title        = {Secure Zones: An Attribute-Based Encryption advisory system for safe
                  firearms},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {397--398},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682746},
  doi          = {10.1109/CNS.2013.6682746},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PortnoiS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PortnoiS13a,
  author       = {Marcos Portnoi and
                  Chien{-}Chung Shen},
  title        = {Location-aware sign-on and key exchange using attribute-based encryption
                  and Bluetooth beacons},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {405--406},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682750},
  doi          = {10.1109/CNS.2013.6682750},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PortnoiS13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RahmanMA13,
  author       = {Mohammad Ashiqur Rahman and
                  Mohammad Hossein Manshaei and
                  Ehab Al{-}Shaer},
  title        = {A game-theoretic approach for deceiving Remote Operating System Fingerprinting},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {73--81},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682694},
  doi          = {10.1109/CNS.2013.6682694},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RahmanMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Safavi-NainiW13,
  author       = {Reihaneh Safavi{-}Naini and
                  Pengwei Wang},
  title        = {Efficient codes for Limited View adversarial channels},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {215--223},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682710},
  doi          = {10.1109/CNS.2013.6682710},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Safavi-NainiW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SanatiniaNN13,
  author       = {Amirali Sanatinia and
                  Sashank Narain and
                  Guevara Noubir},
  title        = {Wireless spreading of WiFi APs infections using {WPS} flaws: An epidemiological
                  and experimental study},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {430--437},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682757},
  doi          = {10.1109/CNS.2013.6682757},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SanatiniaNN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SankaranS13,
  author       = {Sriram Sankaran and
                  Ramalingam Sridhar},
  title        = {User-adaptive energy-aware security for mobile devices},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {391--392},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682743},
  doi          = {10.1109/CNS.2013.6682743},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SankaranS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SarikayaEG13,
  author       = {Yunus Sarikaya and
                  {\"{O}}zg{\"{u}}r Er{\c{c}}etin and
                  {\"{O}}zg{\"{u}}r G{\"{u}}rb{\"{u}}z},
  title        = {Dynamic control for cooperative jamming with a non-altruistic node},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {381--382},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682738},
  doi          = {10.1109/CNS.2013.6682738},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SarikayaEG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShinKYLBZ13,
  author       = {Dong{-}Hoon Shin and
                  Jinkyu Koo and
                  Lei Yang and
                  Xiaojun Lin and
                  Saurabh Bagchi and
                  Junshan Zhang},
  title        = {Low-complexity secure protocols to defend cyber-physical systems against
                  network isolation attacks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {91--99},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682696},
  doi          = {10.1109/CNS.2013.6682696},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ShinKYLBZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Stelte13,
  author       = {Bj{\"{o}}rn Stelte},
  title        = {{ISP} traceback - Attack path detection},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {363--364},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682728},
  doi          = {10.1109/CNS.2013.6682728},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Stelte13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TalamoASD13,
  author       = {Maurizio Talamo and
                  Franco Arcieri and
                  Christian H. Schunck and
                  Andrea Callia D'Iddio},
  title        = {Providing context-based security for inter-organizational electronic
                  business processes},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {393--394},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682744},
  doi          = {10.1109/CNS.2013.6682744},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TalamoASD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TongSC013,
  author       = {Yue Tong and
                  Jinyuan Sun and
                  Sherman S. M. Chow and
                  Pan Li},
  title        = {Towards auditable cloud-assisted access of encrypted health data},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {514--519},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682769},
  doi          = {10.1109/CNS.2013.6682769},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TongSC013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/UluagacRCBB13,
  author       = {A. Selcuk Uluagac and
                  Sakthi V. Radhakrishnan and
                  Cherita L. Corbett and
                  Antony Baca and
                  Raheem A. Beyah},
  title        = {A passive technique for fingerprinting wireless devices with Wired-side
                  Observations},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {305--313},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682720},
  doi          = {10.1109/CNS.2013.6682720},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/UluagacRCBB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Urien13,
  author       = {Pascal Urien},
  title        = {Cloud of Secure Elements perspectives for mobile and cloud applications
                  security},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {371--372},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682733},
  doi          = {10.1109/CNS.2013.6682733},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/Urien13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/VikramYG13,
  author       = {Shardul Vikram and
                  Chao Yang and
                  Guofei Gu},
  title        = {{NOMAD:} Towards non-intrusive moving-target defense against web bots},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {55--63},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682692},
  doi          = {10.1109/CNS.2013.6682692},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/VikramYG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangLCL13,
  author       = {Boyang Wang and
                  Ming Li and
                  Sherman S. M. Chow and
                  Hui Li},
  title        = {Computing encrypted cloud data efficiently under multiple keys},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {504--513},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682768},
  doi          = {10.1109/CNS.2013.6682768},
  timestamp    = {Wed, 19 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/WangLCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangLLL13,
  author       = {Boyang Wang and
                  Baochun Li and
                  Hui Li and
                  Fenghua Li},
  title        = {Certificateless public auditing for data integrity in the cloud},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {136--144},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682701},
  doi          = {10.1109/CNS.2013.6682701},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangLLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangT13,
  author       = {Yufeng Wang and
                  Chiu C. Tan},
  title        = {Looking at the overheads of transmitting encrypted data to the cloud},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {493--497},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682766},
  doi          = {10.1109/CNS.2013.6682766},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WenZCTZJG13,
  author       = {Hong Wen and
                  Xiaochun Zhang and
                  Lei Cai and
                  Jie Tang and
                  Xiping Zhu and
                  Yixin Jiang and
                  Xiaobin Guo},
  title        = {A novel detection scheme for malicious nodes in smart meter system},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {379--380},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682737},
  doi          = {10.1109/CNS.2013.6682737},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WenZCTZJG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XieW13,
  author       = {Xiongwei Xie and
                  Weichao Wang},
  title        = {Rootkit detection on virtual machines through deep information extraction
                  at hypervisor-level},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {498--503},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682767},
  doi          = {10.1109/CNS.2013.6682767},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XieW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XieZFWHZJG13,
  author       = {Yuanpeng Xie and
                  Jinsong Zhang and
                  Ge Fu and
                  Hong Wen and
                  Qiyi Han and
                  Xiping Zhu and
                  Yixin Jiang and
                  Xiaobin Guo},
  title        = {The security issue of WSNs based on cloud computing},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {383--384},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682739},
  doi          = {10.1109/CNS.2013.6682739},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XieZFWHZJG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XiongZZY13,
  author       = {Huijun Xiong and
                  Qingji Zheng and
                  Xinwen Zhang and
                  Danfeng Yao},
  title        = {CloudSafe: Securing data processing within vulnerable virtualization
                  environments in the cloud},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {172--180},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682705},
  doi          = {10.1109/CNS.2013.6682705},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XiongZZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XuAG13,
  author       = {Gang Xu and
                  George T. Amariucai and
                  Yong Guan},
  title        = {A lightweight argument system with efficient verifier},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {163--171},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682704},
  doi          = {10.1109/CNS.2013.6682704},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XuAG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YanWNK13,
  author       = {Zheng Yan and
                  Mingjun Wang and
                  Valtteri Niemi and
                  Raimo Kantola},
  title        = {Secure pervasive social networking based on multi-dimensional trust
                  levels},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {100--108},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682697},
  doi          = {10.1109/CNS.2013.6682697},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YanWNK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YaoFZ13,
  author       = {Wei{-}Min Yao and
                  Sonia Fahmy and
                  Jiahong Zhu},
  title        = {EasyScale: Easy mapping for large-scale network security experiments},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {269--277},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682716},
  doi          = {10.1109/CNS.2013.6682716},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YaoFZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YuXCM13,
  author       = {Wei Yu and
                  Guobin Xu and
                  Zhijiang Chen and
                  Paul Moulema},
  title        = {A cloud computing based architecture for cyber security situation
                  awareness},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {488--492},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682765},
  doi          = {10.1109/CNS.2013.6682765},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/YuXCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YuanXD13,
  author       = {Zhenlong Yuan and
                  Yibo Xue and
                  Yingfei Dong},
  title        = {Harvesting unique characteristics in packet sequences for effective
                  application classification},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {341--349},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682724},
  doi          = {10.1109/CNS.2013.6682724},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YuanXD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YuanY13,
  author       = {Jiawei Yuan and
                  Shucheng Yu},
  title        = {Secure and constant cost public cloud storage auditing with deduplication},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {145--153},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682702},
  doi          = {10.1109/CNS.2013.6682702},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YuanY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YuanY13a,
  author       = {Jiawei Yuan and
                  Shucheng Yu},
  title        = {Flexible and publicly verifiable aggregation query for outsourced
                  databases in cloud},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {520--524},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682770},
  doi          = {10.1109/CNS.2013.6682770},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YuanY13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Zhang0ZY13,
  author       = {Jinxue Zhang and
                  Rui Zhang and
                  Yanchao Zhang and
                  Guanhua Yan},
  title        = {On the impact of social botnets for spam distribution and digital-influence
                  manipulation},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {46--54},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682691},
  doi          = {10.1109/CNS.2013.6682691},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Zhang0ZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhaoA13,
  author       = {Ziming Zhao and
                  Gail{-}Joon Ahn},
  title        = {Using instruction sequence abstraction for shellcode detection and
                  attribution},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {323--331},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682722},
  doi          = {10.1109/CNS.2013.6682722},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhaoA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZouEF13,
  author       = {Jun Zou and
                  Arash Einolghozati and
                  Faramarz Fekri},
  title        = {Privacy-preserving item-based Collaborative Filtering using semi-distributed
                  Belief Propagation},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {189--197},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682707},
  doi          = {10.1109/CNS.2013.6682707},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZouEF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZubaFCS13,
  author       = {Michael Zuba and
                  Michael Fagan and
                  Jun{-}Hong Cui and
                  Zhijie Jerry Shi},
  title        = {A vulnerability study of geographic routing in Underwater Acoustic
                  Networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {109--117},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682698},
  doi          = {10.1109/CNS.2013.6682698},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZubaFCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2013,
  title        = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6675898/proceeding},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}