NSS B

60 papers

YearTitle / Authors
20175G Slicing as a Tool to Test User Equipment Against Advanced Persistent Threats.
Lauri Isotalo
2017A Denial of Service Attack Method for IoT System in Photovoltaic Energy System.
Lulu Liang, Kai Zheng, Qiankun Sheng, Wei Wang, Rong Fu, Xin Huang
2017A Detecting Method of Array Bounds Defects Based on Symbolic Execution.
Chun Shan, Shiyou Sun, Jingfeng Xue, Changzhen Hu, Hongjin Zhu
2017A Discrete Wavelet Transform Approach to Fraud Detection.
Roberto Saia
2017A Formal Approach for Network Security Policy Relevancy Checking.
Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala
2017A Generic Construction of Secure-Channel Free Searchable Encryption with Multiple Keywords.
Keita Emura
2017A Generic yet Efficient Method for Secure Inner Product.
Lihua Wang, Takuya Hayashi, Yoshinori Aono, Le Trieu Phong
2017A Novel Approach to Network Security Situation Assessment Based on Attack Confidence.
Donghang Liu, Lihua Dong, Shaoqing Lv, Ying Dong, Fannv He, Chensi Wu, Yuqing Zhang, Hua Ma
2017A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks.
Jing Li, Lihua Yin, Yunchuan Guo, Chao Li, Fenghua Li, Lihua Chen
2017A Practical Method to Confine Sensitive API Invocations on Commodity Hardware.
Donghai Tian, Dingjun Qi, Li Zhan, Yuhang Yin, Changzhen Hu, Jingfeng Xue
2017A Quantitative Method for Evaluating Network Security Based on Attack Graph.
Yukun Zheng, Kun Lv, Changzhen Hu
2017A Role-Based Access Control System for Intelligent Buildings.
Nian Xue, Chenglong Jiang, Xin Huang, Dawei Liu
2017A State Recovery Attack on ACORN-v1 and ACORN-v2.
Deepak Kumar Dalai, Dibyendu Roy
2017A Systematic Analysis of Random Forest Based Social Media Spam Classification.
Mohammed Al-Janabi, Peter Andras
2017Access Control Model for AWS Internet of Things.
Smriti Bhatt, Farhan Patwa, Ravi S. Sandhu
2017Adaptively Secure Hierarchical Identity-Based Encryption over Lattice.
Leyou Zhang, Qing Wu
2017An Android Vulnerability Detection System.
Jiayuan Zhang, Yao Yao, Xiaoqi Li, Jian Xie, Gaofei Wu
2017An Automatic Vulnerabilities Classification Method Based on Their Relevance.
Hao Zhang, Kun Lv, Changzhen Hu
2017Application Research on Network Attacks and Defenses with Zachman Framework.
Chensi Wu, Yuqing Zhang, Ying Dong
2017Area-Dividing Route Mutation in Moving Target Defense Based on SDN.
Huiting Tan, Chaojing Tang, Chen Zhang, Shaolei Wang
2017Coincer: Decentralised Trustless Platform for Exchanging Decentralised Cryptocurrencies.
Michal Zima
2017Concealing IMSI in 5G Network Using Identity Based Encryption.
Mohsin Khan, Valtteri Niemi
2017CookiesWall: Preventing Session Hijacking Attacks Using Client Side Proxy.
Somanath Tripathy, Praveen Kumar
2017Covert Channels Implementation and Detection in Virtual Environments.
Irina Mihai, Catalin Adrian Leordeanu, Alecsandru Patrascu
2017Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme.
Jayaprakash Kar
2017DNA-Droid: A Real-Time Android Ransomware Detection Framework.
Amirhossein Gharib, Ali A. Ghorbani
2017Defenses Against Wormhole Attacks in Wireless Sensor Networks.
Rui Ma, Siyu Chen, Ke Ma, Changzhen Hu, Xiajing Wang
2017Detecting DNS Tunneling Using Ensemble Learning.
Saeed Shafieian, Daniel Smith, Mohammad Zulkernine
2017EEG-Based Random Number Generators.
Dang Nguyen, Dat Tran, Wanli Ma, Khoa Nguyen
2017Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet.
Deepak Kumar Dalai, Pinaki Sarkar
2017Experiences in Trusted Cloud Computing.
Ian Oliver, Silke Holtmanns, Yoan Miche, Shankar Lal, Leo Hippeläinen, Aapo Kalliola, Sowmya Ravidas
2017Exploiting AUTOSAR Safety Mechanisms to Launch Security Attacks.
Ahmad M. K. Nasser, Di Ma, Sam Lauzon
2017Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study.
Lijun Jiang, Weizhi Meng, Yu Wang, Chunhua Su, Jin Li
2017Hardware Secured, Password-based Authentication for Smart Sensors for the Industrial Internet of Things.
Thomas W. Pieber, Thomas Ulz, Christian Steger, Rainer Matischek
2017Hardware and Software Support for Transposition of Bit Matrices in High-Speed Encryption.
Patrick Eitschberger, Jörg Keller, Simon Holmbacka
2017IPsec and IKE as Functions in SDN Controlled Network.
Markku Vajaranta, Joona Kannisto, Jarmo Harju
2017Implementation of Bitsliced AES Encryption on CUDA-Enabled GPU.
Naoki Nishikawa, Hideharu Amano, Keisuke Iwai
2017Improving Alert Accuracy for Smart Vehicles.
Chia-Mei Chen, Gu Hsin Lai, Yen-Chih Kuo, Tan-Ho Chang
2017Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS).
Pinaki Sarkar
2017Machine Learning for Analyzing Malware.
Yajie Dong, Zhenyan Liu, Yida Yan, Yong Wang, Tu Peng, Ji Zhang
2017Mind Your Right to Know: On De-anonymization Auditability in V2X Communications.
Tommi Meskanen, Masoud Naderpour, Valtteri Niemi
2017Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent Analysis.
Fannv He, Yuqing Zhang, Donghang Liu, Ying Dong, Caiyun Liu, Chensi Wu
2017Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings
Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
2017OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating.
Jialu Hao, Jian Liu, Hong Rong, Huimei Wang, Ming Xian
2017Optimal Attack Path Generation Based on Supervised Kohonen Neural Network.
Yun Chen, Kun Lv, Changzhen Hu
2017Platform for Detection of Holes in the Bogotá D.C. Road Network and Exposure of the Information in a Web Environment.
Rendon Sánchez Angel Mecías, Octavio José Salcedo Parra, Correa Sánchez Lewys
2017Privacy Verification Chains for IoT.
Noria Foukia, David Billard, Eduardo Solana
2017Privacy-Preserving Stochastic Gradient Descent with Multiple Distributed Trainers.
Le Trieu Phong
2017Private Membership Test Protocol with Low Communication Complexity.
Sara Ramezanian, Tommi Meskanen, Masoud Naderpour, Valtteri Niemi
2017Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks.
Elena Ivannikova, Mikhail Zolotukhin, Timo Hämäläinen
2017Randomization Can't Stop BPF JIT Spray.
Elena Reshetova, Filippo Bonazzi, N. Asokan
2017Risk Modelling of Blockchain Ecosystem.
Igor Kabashkin
2017Safety of ABAC _\alpha Is Decidable.
Tahmina Ahmed, Ravi S. Sandhu
2017Subscriber Profile Extraction and Modification via Diameter Interconnection.
Silke Holtmanns, Yoan Miche, Ian Oliver
2017SulleyEX: A Fuzzer for Stateful Network Protocol.
Rui Ma, Tianbao Zhu, Changzhen Hu, Chun Shan, Xiaolin Zhao
2017Survey on Big Data Analysis Algorithms for Network Security Measurement.
Hanlu Chen, Yulong Fu, Zheng Yan
2017The Time Will Tell on You: Exploring Information Leaks in SSH Public Key Authentication.
Joona Kannisto, Jarmo Harju
2017Tor De-anonymisation Techniques.
Juha Nurmi, Mikko S. Niemelä
2017Towards Dependably Detecting Geolocation of Cloud Servers.
Leo Hippelainen, Ian Oliver, Shankar Lal
2017\mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems.
Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle