SecureComm C

22 papers

YearTitle / Authors
2013Security and Privacy in Communication Networks - 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers
Angelos D. Keromytis, Roberto Di Pietro
2012A Detection Mechanism for SMS Flooding Attacks in Cellular Networks.
Eun-Kyoung Kim, Patrick D. McDaniel, Thomas La Porta
2012A Voice Spam Filter to Clean Subscribers' Mailbox.
Seyed Amir Iranmanesh, Hemant Sengar, Haining Wang
2012Anonymous Transferable Conditional E-cash.
Jiangxiao Zhang, Zhoujun Li, Hua Guo
2012BINSPECT: Holistic Analysis and Detection of Malicious Web Pages.
Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam
2012Building General-Purpose Security Services on EMV Payment Cards.
Chunhua Chen, Shaohua Tang, Chris J. Mitchell
2012DAFA - A Lightweight DES Augmented Finite Automaton Cryptosystem.
Sarshad Abubaker, Kui Wu
2012Data Leak Detection as a Service.
Xiaokui Shu, Danfeng (Daphne) Yao
2012Detection of Configuration Vulnerabilities in Distributed (Web) Environments.
Matteo Maria Casalino, Michele Mangili, Henrik Plate, Serena Elisa Ponta
2012Improvement on Ahn et al.'s RSA P-Homomorphic Signature Scheme.
Zhiwei Wang
2012Improving the Resilience of an IDS against Performance Throttling Attacks.
Govind Sreekar Shenoy, Jordi Tubella, Antonio González
2012JSGuard: Shellcode Detection in JavaScript.
Boxuan Gu, Wenbin Zhang, Xiaole Bai, Adam C. Champion, Feng Qin, Dong Xuan
2012More Anonymity through Trust Degree in Trust-Based Onion Routing.
Peng Zhou, Xiapu Luo, Rocky K. C. Chang
2012New Multi-dimensional Sorting Based K-Anonymity Microaggregation for Statistical Disclosure Control.
Abdun Naser Mahmood, Md. Enamul Kabir, Abdul K. Mustafa
2012Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing.
Jiawei Yuan, Shucheng Yu
2012Random Host Mutation for Moving Target Defense.
Ehab Al-Shaer, Qi Duan, Jafar Haadi Jafarian
2012Revealing Cooperating Hosts by Connection Graph Analysis.
Jan Jusko, Martin Rehák
2012Set Difference Attacks in Wireless Sensor Networks.
Tulio de Souza, Joss Wright, Piers O'Hanlon, Ian Brown
2012The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent.
Tom Chothia, Marco Cova, Chris Novakovic, Camilo González Toro
2012Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection.
Yuxin Meng, Lam-for Kwok, Wenjuan Li
2012Towards a Framework for Evaluating the Security of Physical-Layer Identification Systems.
Ryan M. Gerdes, Mani Mina, Thomas E. Daniels
2012Two Improvements of Random Key Predistribution for Wireless Sensor Networks.
Jirí Kur, Vashek Matyás, Petr Svenda