SecureComm C

49 papers

YearTitle / Authors
2015A Decentralized Access Control Model for Dynamic Collaboration of Autonomous Peers.
Stefan Craß, Gerson Joskowicz, Eva Kühn
2015A Markov Random Field Approach to Automated Protocol Signature Inference.
Yongzheng Zhang, Tao Xu, Yipeng Wang, Jianliang Sun, Xiaoyu Zhang
2015A Novel Clustering Algorithm for Database Anomaly Detection.
Jinkun Geng, Daren Ye, Ping Luo, Pin Lv
2015A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering.
Ala' F. A. Aburumman, Wei Jye Seo, Md. Rafiqul Islam, Muhammad Khurram Khan, Kim-Kwang Raymond Choo
2015An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications.
Chunqiang Hu, Xiuzhen Cheng, Zhi Tian, Jiguo Yu, Kemal Akkaya, Limin Sun
2015An Effective t-way Test Data Generation Strategy.
Khandakar Rabbi, Quazi Mamun
2015An Improved Method for Anomaly-Based Network Scan Detection.
Ashton Webster, Margaret Gratian, Ryan Eckenrod, Daven Patel, Michel Cukier
2015Authenticating Top-k Results of Secure Multi-keyword Search in Cloud Computing.
Xiaojun Xiao, Yaping Lin, Wei Zhang, Xin Yao, Qi Gu
2015Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability.
Xing Zhang, Cancan Jin, Cong Li, Zilong Wen, Qingni Shen, Yuejian Fang, Zhonghai Wu
2015Community-Based Collaborative Intrusion Detection.
Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Max Mühlhäuser, Mathias Fischer
2015Defeating Kernel Driver Purifier.
Jidong Xiao, Hai Huang, Haining Wang
2015Detection, Classification and Characterization of Android Malware Using API Data Dependency.
Yongfeng Li, Tong Shen, Xin Sun, Xuerui Pan, Bing Mao
2015Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing.
Lei Yang, Fengjun Li
2015FineDroid: Enforcing Permissions with System-Wide Application Execution Context.
Yuan Zhang, Min Yang, Guofei Gu, Hao Chen
2015Generation of Transmission Control Rules Compliant with Existing Access Control Policies.
Yoann Bertrand, Mireille Blay-Fornarino, Karima Boudaoud, Michel Riveill
2015How to Prevent to Delegate Authentication.
Mohsen Alimomeni, Reihaneh Safavi-Naini
2015Human Surveillance System for Security Application.
Mozammel Chowdhury, Junbin Gao, Rafiqul Islam
2015Image Spam Classification Using Neural Network.
Mozammel Chowdhury, Junbin Gao, Morshed U. Chowdhury
2015Intrinsic Code Attestation by Instruction Chaining for Embedded Devices.
Oliver Stecklina, Peter Langendörfer, Frank Vater, Thorsten Kranz, Gregor Leander
2015Kernel Data Attack Is a Realistic Security Threat.
Jidong Xiao, Hai Huang, Haining Wang
2015KeyPocket - Improving Security and Usability for Provider Independent Login Architectures with Mobile Devices.
André Ebert, Chadly Marouane, Benno Rott, Martin Werner
2015POSTER: A Collaborative Approach on Behavior-Based Android Malware Detection.
Chanwoo Bae, Jesung Jung, Jaehyun Nam, Seungwon Shin
2015POSTER: A Security Adaptive Steganography System Applied on Digital Audio.
Xuejie Ding, Wei-qing Huang, Meng Zhang, Jianlin Zhao
2015POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware.
Dongdong Tian, Xiaohong Li, Jing Hu, Guangquan Xu, Zhiyong Feng
2015POSTER: An Approach to Assess Security, Capacity and Reachability for Heterogeneous Industrial Networks.
Apala Ray, Johan Åkerberg, Mats Björkman, Mikael Gidlund
2015POSTER: An Online Prefix-Preserving IP Address Anonymization Algorithm for Passive Measurement Systems.
Kai Cao, Yunchun Li, Hailong Yang, Jiqiang Tang, Xiaoxiang Zou
2015POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts.
Yuejian Fang, Zilong Wen, Qingni Shen, Yahui Yang, Zhonghai Wu
2015POSTER: Context-Adaptive User-Centric Privacy Scheme for VANET.
Karim Emara, Wolfgang Woerndl, Johann H. Schlichter
2015POSTER: Reliable and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure.
Vitaly Ford, Ambareen Siraj
2015POSTER: Semantics-Aware Rule Recommendation and Enforcement for Event Paths.
Yongbo Li, Fan Yao, Tian Lan, Guru Venkataramani
2015POSTER: Using Improved Singular Value Decomposition to Enhance Correlation Power Analysis.
Degang Sun, Xinping Zhou, Zhu Wang, Changhai Ou, Wei-qing Huang, Juan Ai
2015Practicality of Using Side-Channel Analysis for Software Integrity Checking of Embedded Systems.
Hong Liu, Hongmin Li, Eugene Y. Vasserman
2015Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols.
Hugo Gascon, Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck
2015RScam: Cloud-Based Anti-Malware via Reversible Sketch.
Hao Sun, Xiaofeng Wang, Jinshu Su, Peixin Chen
2015Remote Activation of Hardware Trojans via a Covert Temperature Channel.
Priyabrat Dash, Chris Perkins, Ryan M. Gerdes
2015Resource Efficient Privacy Preservation of Online Social Media Conversations.
Indrajeet Singh, Masoud Akhoondi, Mustafa Y. Arslan, Harsha V. Madhyastha, Srikanth V. Krishnamurthy
2015Route Leaks Identification by Detecting Routing Loops.
Song Li, Hai-Xin Duan, Zhiliang Wang, Xing Li
2015Secrecy Rate Based User Selection Algorithms for Massive MIMO Wireless Networks.
M. Arif Khan, Rafiqul Islam
2015Securing Application with Software Partitioning: A Case Study Using SGX.
Ahmad Atamli-Reineh, Andrew P. Martin
2015Security Considerations for Wireless Carrier Agonistic Bio-Monitoring Systems.
Ben Townsend, Jemal H. Abawajy
2015Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers
Bhavani Thuraisingham, Xiaofeng Wang, Vinod Yegneswaran
2015SplitDroid: Isolated Execution of Sensitive Components for Mobile Applications.
Lin Yan, Yao Guo, Xiangqun Chen
2015SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services.
Yueqiang Cheng, Qing Li, Miao Yu, Xuhua Ding, Qingni Shen
2015TADOOP: Mining Network Traffic Anomalies with Hadoop.
Geng Tian, Zhiliang Wang, Xia Yin, Zimu Li, Xingang Shi, Ziyi Lu, Chao Zhou, Yang Yu, Dan Wu
2015Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android.
Vaibhav Rastogi, Zhengyang Qu, Jedidiah McClurg, Yinzhi Cao, Yan Chen
2015Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps.
Chao Yang, Guangliang Yang, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, Guofei Gu
2015Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks.
Gustavo Gonzalez Granadillo, Joaquín García-Alfaro, Hervé Debar
2015Why Web Servers Should Fear Their Clients - Abusing Websockets in Browsers for DoS.
Juan D. Parra Rodriguez, Joachim Posegga
2015You Are How You Query: Deriving Behavioral Fingerprints from DNS Traffic.
Dae Wook Kim, Junjie Zhang