Abstract is missing.
- SEGAUTH: A segment-based approach to behavioral biometric authenticationYanyan Li, Mengjun Xie, Jiang Bian. 1-9 [doi]
- TwinPeaks: A new approach for certificateless public key distributionEunsang Cho, Minkyung Park, Ted Taekyoung Kwon. 10-18 [doi]
- Security policy checking in distributed SDN based cloudsSandeep Pisharody, Ankur Chowdhary, Dijiang Huang. 19-27 [doi]
- SDNShield: Towards more comprehensive defense against DDoS attacks on SDN control planeKuan-yin Chen, Anudeep Reddy Junuthula, Ishant Kumar Siddhrau, Yang Xu, H. Jonathan Chao. 28-36 [doi]
- ACTS: Extracting Android App topologiCal signature through graphleT SamplingWei Peng, Tianchong Gao, Devkishen Sisodia, Tanay Kumar Saha, Feng Li, Mohammad Al Hasan. 37-45 [doi]
- XDroid: An Android permission control using Hidden Markov chain and online learningBahman Rashidi, Carol J. Fung. 46-54 [doi]
- Analysis of clickjacking attacks and an effective defense scheme for Android devicesLongfei Wu, Benjamin Brandt, Xiaojiang Du, Bo Ji. 55-63 [doi]
- Towards probabilistic identification of zero-day attack pathsXiaoyan Sun, Jun Dai, Peng Liu, Anoop Singhal, John Yen. 64-72 [doi]
- On-chip system call tracing: A feasibility study and open prototypeChengyu Zheng, Mila Dalla Preda, Jorge Granjal, Stefano Zanero, Federico Maggi. 73-81 [doi]
- Finding proxy users at the service using anomaly detectionAllen T. Webb, A. L. Narasima Reddy. 82-90 [doi]
- Cascading denial of service attacks on Wi-Fi networksLiangxiao Xin, David Starobinski, Guevara Noubir. 91-99 [doi]
- Online learning-based optimal primary user emulation attacks in cognitive radio networksMonireh Dabaghchian, Amir Alipour Fanid, Kai Zeng, Qingsi Wang. 100-108 [doi]
- On the security of Angle of Arrival estimationAmr Abdelaziz, Can Emre Koksal, Hesham El Gamal. 109-117 [doi]
- Rolling preambles: Mitigating stealthy FO estimation attacks in OFDM-based 802.11 systemsHanif Rahbari, Marwan Krunz. 118-126 [doi]
- Honey Onions: A framework for characterizing and identifying misbehaving Tor HSDirsAmirali Sanatinia, Guevara Noubir. 127-135 [doi]
- MaxPace: Speed-constrained location queriesPer A. Hallgren, Martín Ochoa, Andrei Sabelfeld. 136-144 [doi]
- BidGuard: A framework for privacy-preserving crowdsensing incentive mechanismsJian Lin, Dejun Yang, Ming Li, Jia Xu, Guoliang Xue. 145-153 [doi]
- ExtensionGuard: Towards runtime browser extension information leakage detectionWentao Chang, Songqing Chen. 154-162 [doi]
- Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest metersMoreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti, Radha Poovendran. 163-171 [doi]
- Detection of false data injection attacks in smart grid under colored Gaussian noiseBo Tang, Jun Yan, Steven Kay, Haibo He. 172-179 [doi]
- IoTSAT: A formal framework for security analysis of the internet of things (IoT)Mujahid Mohsin, Zahid Anwar, Ghaith Husari, Ehab Al-Shaer, Mohammad Ashiqur Rahman. 180-188 [doi]
- Preventing kernel code-reuse attacks through disclosure resistant code diversificationJason Gionta, William Enck, Per Larsen. 189-197 [doi]
- A moving target defense approach to mitigate DDoS attacks against proxy-based architecturesSridhar Venkatesan, Massimiliano Albanese, Kareem Amin, Sushil Jajodia, Mason Wright. 198-206 [doi]
- A time-dependent SIS-model for long-term computer worm evolutionMarcus Märtens, Hadi Asghari, Michel van Eeten, Piet Van Mieghem. 207-215 [doi]
- Malicious peers eviction for P2P overlaysHatem Ismail, Daniel Germanus, Neeraj Suri. 216-224 [doi]
- On the resilience of P2P-based botnet graphsSteffen Haas, Shankar Karuppayah, Selvakumar Manickam, Max Mühlhäuser, Mathias Fischer. 225-233 [doi]
- Attribute-based authorization tickets for Car-to-X communicationCarsten Büttner, Sorin A. Huss. 234-242 [doi]
- Automated synthesis of resiliency configurations for cyber networksMohammad Ashiqur Rahman, Abdullah Farooq, Amarjit Datta, Ehab Al-Shaer. 243-251 [doi]
- Text mining for security threat detection discovering hidden information in unstructured log messagesCandace Suh-Lee, Ju-Yeon Jo, Yoohwan Kim. 252-260 [doi]
- Validating security protocols with cloud-based middleboxesCurtis R. Taylor, Craig A. Shue. 261-269 [doi]
- Automated cross layer feature selection for effective intrusion detection in networked systemsAzeem Aqil, Ahmed Osama Fathy Atya, Srikanth V. Krishnamurthy, Paul Yu, Ananthram Swami, Jeff Rowe, Karl N. Levitt, Alexander Poylisher, Constantin Serban, Ritu Chadha. 270-278 [doi]
- On probe-response attacks in Collaborative Intrusion Detection SystemsEmmanouil Vasilomanolakis, Michael Stahn, Carlos Garcia Cordero, Max Mühlhäuser. 279-286 [doi]
- Scan prediction and reconnaissance mitigation through commodity graphics cardsChristian Doerr, Mourad el Maouchi, Sille Kamoen, Jarno Moree. 287-295 [doi]
- Real-time GPU-based timing channel detection using entropyRoss K. Gegan, Vishal Ahuja, John D. Owens, Dipak Ghosal. 296-305 [doi]
- Assessing the threat of web worker distributed attacksYao Pan, Jules White, Yu Sun 0002. 306-314 [doi]
- Virtual Safe: Unauthorized movement detection for mobile devicesDakun Shen, Ian D. Markwood, Dan Shen, Yao Liu. 315-323 [doi]
- A framework to mitigate airliner risk in air traffic managementDepeng Li, Rui Zhang. 324-332 [doi]
- PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access controlTao Li, Rui Zhang, Yanchao Zhang. 333-341 [doi]
- Optimized Aho-Corasick string matching algorithm for smart phonesRui Lu, Derek Pao. 342-343 [doi]
- WHAP: Web-hacking profiling using Case-Based ReasoningMee Lan Han, Hee Chan Han, Ah Reum Kang, Byung Il Kwak, Aziz Mohaisen, Huy Kang Kim. 344-345 [doi]
- The performance of the MIMO physical layer security system with imperfect CSILuping Zhang, Hong Wen, Huanhuan Song, Jie Tang, Yixin Jiang, Weihua Dong, XiPing Zhu. 346-347 [doi]
- Using Basis Expansion Model for Physical Layer Authentication in Time-Variant SystemJinling Zhang, Hong Wen, Huanhuan Song, Yixin Jiang, Zhengguang Zhang, Luping Zhang, XiPing Zhu. 348-349 [doi]
- A MIMO cross-layer secure communication scheme based on spatial modulationZhengguang Zhang, Hong Wen, Huanhuan Song, Yixin Jiang, Jinling Zhang, XiPing Zhu. 350-351 [doi]
- A study of HSM based key protection in encryption file systemWenqian Yu, Weigang Li, Junyuan Wang, Changzheng Wei. 352-353 [doi]
- Transparency of the new gTLD's centralized zone data service: A measurement studyAh Reum Kang, Aziz Mohaisen. 354-355 [doi]
- IDSaaS in SDN: Intrusion Detection System as a service in software defined networksJulian Chukwu, Ose Osamudiamen, Ashraf Matrawy. 356-357 [doi]
- Assessing DNS privacy under partial deployment of special-use Domain NamesAh Reum Kang, Aziz Mohaisen. 358-359 [doi]
- A user study of the effectiveness of typosquatting techniquesJeffrey Spaulding, Ah Reum Kang, Shambhu J. Upadhyaya, Aziz Mohaisen. 360-361 [doi]
- Automatic alerts annotation for improving DDoS mitigation systemsAh Reum Kang, Aziz Mohaisen. 362-363 [doi]
- Encryption-based privacy protection for police body-worn camerasDaniel T. Martinez, Claire M. Cochrane, Chiu C. Tan. 364-365 [doi]
- SBPA: Social behavior based cross Social Network phishing attacksYifan Tian, Jiawei Yuan, Shucheng Yu. 366-367 [doi]
- Joint beamforming and antenna subarray formation for secrecy capacity maximization in MIMO wiretap channelsJianli Huang, Yixin Jiang, Aidong Xu, Hong Wen, Huajun Chen, Xiaobin Guo, Zewu Guan, Zhiming Wang. 368-369 [doi]
- Firewall for brain: Towards a privacy preserving ecosystem for BCI applicationsHassan Takabi. 370-371 [doi]
- Comparison between fingerprint and behavioral biometric authentication using 2D and 3D gesturesDiana K. Anguiano Cervantes, Ghouri Mohammad Saaduddin, Yanyan Li, Mengjun Xie. 372-373 [doi]
- Remote live forensics for Android devicesJonathan Ming, Mengjun Xie. 374-375 [doi]
- Towards sequencing malicious system callsPooria Madani, Natalija Vlajic. 376-377 [doi]
- Analyzing deviant behaviors on social media using cyber forensics-based methodologiesBrandon Dalton, Nitin Agarwal. 378-379 [doi]
- Real time motion-based authentication for smartwatchAntwane Lewis, Yanyan Li, Mengjun Xie. 380-381 [doi]
- A framework for counterfeit smart grid device detectionLeonardo Babun, Hidayet Aksu, A. Selcuk Uluagac. 382-383 [doi]
- Pairing of most relevant variables and bootstrap samples with ridge regression for data sharingShan Suthaharan, Weining Shen. 384-385 [doi]
- Modeling Modbus TCP for intrusion detectionMustafa Faisal, Alvaro A. Cardenas, Avishai Wool. 386-390 [doi]
- GPS spoofing attack characterization and detection in smart gridsParth Pradhan, Kyatsandra Nagananda, Parv Venkitasubramaniam, Shalinee Kishore, Rick S. Blum. 391-395 [doi]
- Evaluation of utility-privacy trade-offs of data manipulation techniques for smart meteringHuan Yang, Liang Cheng, Mooi Choo Chuah. 396-400 [doi]
- Inducing data loss in Zigbee networks via join/association handshake spoofingSpencer Michaels, Kemal Akkaya, A. Selcuk Uluagac. 401-405 [doi]
- Attacking supercomputers through targeted alteration of environmental control: A data driven case studyKey-whan Chung, Valerio Formicola, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Alexander Withers, Adam J. Slagell. 406-410 [doi]
- Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systemsWoo Hyun Ko, Bharadwaj Satchidanandan, P. R. Kumar. 416-420 [doi]
- Detecting and thwarting hardware trojan attacks in cyber-physical systemsVivek Venugopalan, Cameron D. Patterson, Devu Manikantan Shila. 421-425 [doi]
- A correlation-based subspace analysis for data confidentiality and classification as utility in CPSShan Suthaharan. 426-431 [doi]
- A security framework for MQTTSeongHan Shin, Kazukuni Kobara, Chia-Chuan Chuang, Weicheng Huang. 432-436 [doi]
- Effectiveness of proactive reset for mitigating impact of stealthy attacks on networks of autonomous systemsBrian Thompson, James R. Morris-King, Hasan Cam. 437-441 [doi]
- Robust and secure beamformer design for MIMO relaying with imperfect eavesdropper CSINadim Badra, Jiaxin Yang, Ioannis N. Psaromiligkos, Benoît Champagne. 442-449 [doi]
- Securing cognitive radio vehicular Ad hoc networks with trusted lightweight cloud computingZhexiong Wei, F. Richard Yu, Helen Tang, Chengehao Liang, Qiao Yan. 450-456 [doi]
- Video cognitive radio networks for tactical scenariosMadushanka Soysa, Pamela C. Cosman, Laurence B. Milstein. 457-464 [doi]
- Analyzing energy efficient physical layer security in large-scale MIMO enabled CRN with QoS requirementsDanda B. Rawat. 465-471 [doi]
- Spectrum learning and access for cognitive satellite communications under jammingYi Shi, Yalin E. Sagduyu. 472-479 [doi]
- Efficient and secure template blinding for biometric authenticationSiddhant Deshmukh, Henry Carter, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler. 480-488 [doi]
- A quantitative risk assessment framework for adaptive Intrusion Detection in the cloudLuan Huy Pham, Massimiliano Albanese, Sridhar Venkatesan. 489-497 [doi]
- Secured systems in Clouds with Model-Driven OrchestrationEddy Caron, Arnaud Lefray, Jonathan Rouzaud-Cornabas. 498-506 [doi]
- Applied dynamic policy selectionFlorian Reimair, Bernd Prünster, Andreas Reiter, Christian Ertler. 507-515 [doi]
- TLS with trustworthy certificate authoritiesKevin Walsh. 516-524 [doi]
- EncFS goes multi-user: Adding access control to an encrypted file systemDominik Leibenger, Jonas Fortmann, Christoph Sorge. 525-533 [doi]
- Server-assisted fully homomorphic computation protocolsGiovanni Di Crescenzo. 534-542 [doi]
- Emulating U2F authenticator devicesFlorian Reimair, Christian Kollmann, Alexander Marsalek. 543-551 [doi]
- An unconditionally hiding auditing procedure for computations over distributed dataLucas Schabhüser, Denise Demirel, Johannes A. Buchmann. 552-560 [doi]
- SecureCEdit: An approach for secure cloud-based document editingShashank Arora, Gaurav Varshney, Pradeep K. Atrey, Manoj Mishra. 561-564 [doi]
- A simple authentication scheme for cloudsAndrea Huszti, Norbert Olah. 565-569 [doi]
- CryptoImg: Privacy preserving processing over encrypted imagesM. Tarek Ibn Ziad, Amr Al-Anwar, Moustafa Alzantot, Mani B. Srivastava. 570-575 [doi]
- Dynamic Proofs of Retrievability with improved worst case overheadXiaoqi Yu, Nairen Cao, Jun Zhang, Siu-Ming Yiu. 576-580 [doi]
- TwinCloud: Secure cloud sharing without explicit key managementKemal Bicakci, Davut Deniz Yavuz, Sezin Gurkan. 581-585 [doi]
- Anomaly detection for web server log reduction: A simple yet efficient crawling based approachEric Asselin, Carlos Aguilar Melchor, Gentian Jakllari. 586-590 [doi]
- On the secure Degrees of Freedom for the K-user symmetric MIMO Wiretap MAC channelAhmed S. Bendary, Yahya Z. Mohasseb, Hisham Dahshan. 591-595 [doi]
- Bargaining over secrecy and reliability for low SNR OFDM communicationsWade Trappe, Andrey Garnaev. 596-600 [doi]
- Strong secrecy on a class of Degraded Broadcast Channels using polar codesJaume del Olmo, Javier Rodríguez Fonollosa. 601-605 [doi]
- On secure communication over the Z-ChannelAbdallah Fayed, Tamer Khattab, Lifeng Lai. 606-610 [doi]
- List decoding for arbitrarily varying wiretap channelsAhmed S. Mansour, Holger Boche, Rafael F. Schaefer. 611-615 [doi]
- Secure distributed estimation of linear systemsMoritz Wiese, Tobias J. Oechtering. 616-620 [doi]
- Coded caching for resolvable networks with security requirementsAhmed A. Zewail, Aylin Yener. 621-625 [doi]
- Covert bits through queuesPritam Mukherjee, Sennur Ulukus. 626-630 [doi]
- Authenticated side channel via physical layer fingerprintingPaul L. Yu, Jake B. Perazzone, Brian M. Sadler, Rick S. Blum. 631-635 [doi]
- Ergodic secrecy sum rate for multiuser MIMO downlink systems using block diagonalizationXuanxuan Wang, Rafael F. Schaefer, Lars Thiele, Thomas Haustein, Yongming Wang. 636-640 [doi]
- Multiple key generation with restricted public discussion structureWenwen Tu, Mario Goldenbaum, Lifeng Lai, H. Vincent Poor. 641-645 [doi]