Abstract is missing.
- Achievable secrecy capacity in an underlay cognitive radio networkLouis Sibomana, Hans-Jürgen Zepernick, Hung Tran. 1-6 [doi]
- Measuring smart jammer strategy efficacy over the airC. Carlson, V. Nguyen, Seth D. Hitefield, Tim O'Shea, T. Charles Clancy. 7-13 [doi]
- Moving-target defense mechanisms against source-selective jamming attacks in tactical cognitive radio MANETsAleksi Marttinen, Alexander M. Wyglinski, Riku Jäntti. 14-20 [doi]
- JADE: Jamming-averse routing on cognitive radio mesh networksYu Seung Kim, Bruce DeBruhl, Patrick Tague. 21-28 [doi]
- Secure distributed spectrum sensing in cognitive radio networks using multi-armed banditsShabnam Sodagari. 29-34 [doi]
- Bandwidth scanning involving a Bayesian approach to adapting the belief of an adversary's presenceAndrey Garnaev, Wade Trappe. 35-43 [doi]
- NEAT: A NEighbor AssisTed spectrum decision protocol for resilience against PUEAZituo Jin, J. P. Morgan, Santhanakrishnan Anand, K. P. Subbalakshmi. 44-52 [doi]
- Trust-based data fusion mechanism design in cognitive radio networksJi Wang, Ing-Ray Chen. 53-59 [doi]
- Demonstrated LLC-layer attack and defense strategies for wireless communication systemsSeth D. Hitefield, V. Nguyen, C. Carlson, Tim O'Shea, T. Charles Clancy. 60-66 [doi]
- Securing smart home: Technologies, security challenges, and security requirementsChangmin Lee, Luca Zappaterra, KwangHee Choi, Hyeong-Ah Choi. 67-72 [doi]
- Integration and evaluation of intrusion detection for CoAP in smart city applicationsJana Krimmling, Steffen Peter. 73-78 [doi]
- An experimental study of security and privacy risks with emerging household appliancesSukhvir Notra, Muhammad Siddiqi, Hassan Habibi Gharakheili, Vijay Sivaraman, Roksana Boreli. 79-84 [doi]
- Practical and secure Machine-to-Machine data collection protocol in Smart GridSuleyman Uludag, King-Shan Lui, Wenyu Ren, Klara Nahrstedt. 85-90 [doi]
- Identity-based protocol design patterns for machine-to-machine secure channelsFrancisco Corella, Karen P. Lewison. 91-96 [doi]
- RF-fingerprint based authentication: Exponents and achievable ratesOnur Güngör 0002, Can Emre Koksal. 97-102 [doi]
- The security of link signature: A view from channel modelsXiaofan He, Huaiyu Dai, Yufan Huang, Dong Wang, Wenbo Shen, Peng Ning. 103-108 [doi]
- On secure communication over multiple access wiretap channels under channel uncertaintyRafael F. Schaefer, H. Vincent Poor. 109-114 [doi]
- Parity modifications and stopping sets in high-rate codes for physical-layer securityWillie K. Harrison, Parker Boyce. 115-120 [doi]
- On the fading Gaussian wiretap channel with statistical channel state information at transmitterPin-Hsun Lin, Eduard A. Jorswieck. 121-126 [doi]
- Uniform distributed source coding for the multiple access wiretap channelRemi A. Chou, Matthieu R. Bloch. 127-132 [doi]
- MCR Decoding: A MIMO approach for defending against wireless jamming attacksWenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai, Yao Liu. 133-138 [doi]
- Relay-based secret key generation in LTE-AKan Chen, Balasubramaniam Natarajan, Steve Shattil. 139-144 [doi]
- Signal alignment for secure underwater coordinated multipoint transmissionsChaofeng Wang, Zhaohui Wang, Saeid Nooshabadi. 145-150 [doi]
- Portability of an RF fingerprint of a wireless transmitterSaeed-ur Rehman, Kevin W. Sowerby, Shafiq Alam, Iman Ardekani. 151-156 [doi]
- The drunk motorcyclist protocol for anonymous communicationAdam L. Young, Moti Yung. 157-165 [doi]
- Modelling IP darkspace traffic by means of clustering techniquesFélix Iglesias, Tanja Zseby. 166-174 [doi]
- Location verification on the Internet: Towards enforcing location-aware access policies over Internet clientsAbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot. 175-183 [doi]
- Analyzing the dangers posed by Chrome extensionsLujo Bauer, Shaoying Cai, Limin Jia, Timothy Passaro, Yuan Tian. 184-192 [doi]
- Detecting smart, self-propagating Internet wormsJun Li 0001, Shad Stafford. 193-201 [doi]
- Location spoofing attack and its countermeasures in database-driven cognitive radio networksKexiong Zeng, Sreeraksha Kondaji Ramesh, Yaling Yang. 202-210 [doi]
- Accurate rogue access point localization leveraging fine-grained channel informationXiuyuan Zheng, Chen Wang, Yingying Chen, Jie Yang 0003. 211-219 [doi]
- Self-healing wireless networks under insider jamming attacksLongquan Li, Sencun Zhu, Don Torrieri, Sushil Jajodia. 220-228 [doi]
- NRE: Suppress Selective Forwarding attacks in Wireless Sensor NetworksBiru Cui, Shanchieh Jay Yang. 229-237 [doi]
- CETAD: Detecting evil twin access point attacks in wireless hotspotsHossen A. Mustafa, Wenyuan Xu. 238-246 [doi]
- Towards effective feature selection in machine learning-based botnet detection approachesElaheh Biglar Beigi Samani, Hossein Hadian Jazi, Natalia Stakhanova, Ali A. Ghorbani. 247-255 [doi]
- Security configuration analytics using video gamesMohammed Noraden Alsaleh, Ehab Al-Shaer. 256-264 [doi]
- An evasion and counter-evasion study in malicious websites detectionLi Xu, Zhenxin Zhan, Shouhuai Xu, Keying Ye. 265-273 [doi]
- Exploiting altruism in social networks for friend-to-friend malware detectionMatthew J. Probst, Jun-Cheol Park, Sneha Kumar Kasera. 274-282 [doi]
- Chatter: Classifying malware families using system event orderingAziz Mohaisen, Andrew G. West, Allison Mankin, Omar Alrawi. 283-291 [doi]
- Two-tier data-driven intrusion detection for automatic generation control in smart gridMuhammad Qasim Ali, Reza Yousefian, Ehab Al-Shaer, Sukumar Kamalasadan, Quanyan Zhu. 292-300 [doi]
- Sensory channel threats to Cyber Physical Systems: A wake-up callA. Selcuk Uluagac, Venkatachalam Subramanian, Raheem A. Beyah. 301-309 [doi]
- iKUP keeps users' privacy in the Smart GridFábio Borges, Leonardo A. Martucci. 310-318 [doi]
- Secret message sharing using online social mediaJianxia Ning, Indrajeet Singh, Harsha V. Madhyastha, Srikanth V. Krishnamurthy, Guohong Cao, Prasant Mohapatra. 319-327 [doi]
- VirtualFriendship: Hiding interactions on Online Social NetworksFilipe Beato, Mauro Conti, Bart Preneel, Dario Vettore. 328-336 [doi]
- A tale of two clouds: Computing on data encrypted under multiple keysBoyang Wang, Ming Li, Sherman S. M. Chow, Hui Li 0006. 337-345 [doi]
- Towards verifiable file search on the cloudFei Chen, Tao Xiang, Xinwen Fu, Wei Yu. 346-354 [doi]
- Enabling Trusted Data-intensive execution in cloud computingNing Zhang, Wenjing Lou, Xuxian Jiang, Y. Thomas Hou. 355-363 [doi]
- Integrity for distributed queriesSabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati. 364-372 [doi]
- Lightweight (k, n)-file sharing scheme for distributed storages with diverse communication capacitiesYoung-Hoon Park, Eun-Dong Lee, Seung-Woo Seo. 373-381 [doi]
- An optimistic certified e-mail protocol for the current Internet e-mail architectureGerard Draper-Gil, Josep Lluís Ferrer-Gomila, M. Francisca Hinarejos, Arne Tauber. 382-390 [doi]
- Attribute-based access control for ICN naming schemeBing Li, Ashwin Prabhu Verleker, Dijiang Huang, Zhijie Wang, Yan Zhu. 391-399 [doi]
- Mitigating Eclipse attacks in Peer-To-Peer networksDaniel Germanus, Stefanie Roos, Thorsten Strufe, Neeraj Suri. 400-408 [doi]
- Reroute on loop in anonymous peer-to-peer content sharing networksGuanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong. 409-417 [doi]
- Identifying global hot items in distributed dynamic data streamsWenji Chen, Yong Guan. 418-426 [doi]
- LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networksYu Seung Kim, Yuan Tian, Le T. Nguyen, Patrick Tague. 427-435 [doi]
- TouchIn: Sightless two-factor authentication on multi-touch mobile devicesJingchao Sun, Rui Zhang 0007, Jinxue Zhang, Yanchao Zhang. 436-444 [doi]
- MagPairing: Exploiting magnetometers for pairing smartphones in close proximityRong Jin, Liu Shi, Kai Zeng, Amit Pande, Prasant Mohapatra. 445-453 [doi]
- Uncooperative localization improves attack performance in Underwater Acoustic NetworksXiaoyan Lu, Michael Zuba, Jun-Hong Cui, Zhijie Jerry Shi. 454-462 [doi]
- Multi-trapdoor hash functions and their applications in network securitySantosh Chandrasekhar, Mukesh Singhal. 463-471 [doi]
- Manipulating the attacker's view of a system's attack surfaceMassimiliano Albanese, Ermanno Battista, Sushil Jajodia, Valentina Casola. 472-480 [doi]
- A tunable proof of ownership scheme for deduplication using Bloom filtersJorge Blasco Alís, Roberto Di Pietro, Agustín Orfila, Alessandro Sorniotti. 481-489 [doi]
- Application-layer DDoS in dynamic Web-domains: Building defenses against next-generation attack behaviorDusan Stevanovic, Natalija Vlajic. 490-491 [doi]
- P2P networks monitoring based on the social network analysis and the topological potentialMengyin Ren, Yixin Jiang, Xiaobin Guo, Qiyi Han, Hong Wen, Bin Wu, Zhen Chen. 492-493 [doi]
- Physical Layer Assist Mutual Authentication scheme for smart meter systemTing Ma, Yixin Jiang, Hong Wen, Bin Wu, Xiaobin Guo, Zhen Chen. 494-495 [doi]
- Radio frequency fingerprinting and its challengesSaeed-ur Rehman, Kevin W. Sowerby, Shafiq Alam, Iman Ardekani. 496-497 [doi]
- DroidGraph: discovering Android malware by analyzing semantic behaviorJonghoon Kwon, Jihwan Jeong, Jehyun Lee, Heejo Lee. 498-499 [doi]
- A MIMO cross-layer precoding security communication systemJie Tang, Huan-Huan Song, Fei Pan, Hong Wen, Bin Wu, Yixin Jiang, Xiaobin Guo, Zhen Chen. 500-501 [doi]
- Blind detection approach for LDPC, convolutional, and turbo codes in non-noisy environmentAhmed Refaey, Raheleh Niati, Xianbin Wang, Jean-Yves Chouinard. 502-503 [doi]
- A multi-factor re-authentication framework with user privacyA. Selcuk Uluagac, Wenyi Liu, Raheem A. Beyah. 504-505 [doi]
- Approaches for vehicle cyber securityHiro Onishi. 506-507 [doi]
- Introducing asymmetric DC-NetsFábio Borges, Johannes Buchmann, Max Mühlhüuser. 508-509 [doi]
- Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communicationJohannes Braun. 510-511 [doi]
- Towards time-varying classification based on traffic patternYiyang Shao, Luoshi Zhang, Xiaoxian Chen, Yibo Xue. 512-513 [doi]
- Physical integrity check in wireless relay networksSang Wu Kim. 514-515 [doi]
- The Greenhouse Effect AttackPietro Marchetta, Valerio Persico, Antonio Pescapè. 516-517 [doi]
- Location privacy for a quality of access to mobile Internet monitoring systemGiselle Font, Javier Bustos, Sebastian Blasco, Alejandro Hevia. 518-519 [doi]
- Detecting anomalies in DNS protocol traces via Passive Testing and Process MiningCecilia Saint-Pierre, Francisco Cifuentes, Javier Bustos-Jiménez. 520-521 [doi]
- Improving smart grid security using Merkle TreesMelesio Calderon Munoz, Melody Moh, Teng-Sheng Moh. 522-523 [doi]