Abstract is missing.
- SecureCASH: Securing Context-Aware Distributed Storage and Query Processing in Hybrid Cloud FrameworkGeremew Begna, Danda B. Rawat, Moses Garuba, Laurent Njilla. 1-2 [doi]
- Detecting Payload Attacks on Programmable Logic Controllers (PLCs)Huan Yang, Liang Cheng, Mooi Choo Chuah. 1-9 [doi]
- Manipulating Drone Dynamic State Estimation to Compromise NavigationWenxin Chen, Yingfei Dong, Zhenhai Duan. 1-9 [doi]
- PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in CloudsAzadeh Tabiban, Suryadipta Majumdar, Lingyu Wang 0001, Mourad Debbabi. 1-7 [doi]
- Secure and Efficient Multi-Attribute Range Queries based on Comparable Inner Product EncodingQin Liu 0001, SiXia Wu, Shuyu Pei, Jie Wu 0001, Tao Peng, Guojun Wang. 1-9 [doi]
- Context-aware Data Aggregation with Localized Information PrivacyBo Jiang, Ming Li, Ravi Tandon. 1-9 [doi]
- Malware Coordination using the Blockchain: An Analysis of the Cerber RansomwareStijn Pletinckx, Cyril Trap, Christian Doerr. 1-9 [doi]
- Behavior Rhythm: An Effective Model for Massive Logs Characterizing and Security Monitoring in CloudTao Qin, Chao He, Hezhi Jiang, Ruoya Chen. 1-7 [doi]
- Spot the Difference: Your Bucket is Leaking : A Novel Methodology to Expose A/B Testing EffortlesslyMauro Conti, Ankit Gangwal, Sarada Prasad Gochhayat, Gabriele Tolomei. 1-7 [doi]
- A Study and Simulation Research of Blackhole Attack on Mobile AdHoc NetworkGuoquan Li, Zheng Yan, Yulong Fu. 1-6 [doi]
- An Efficient Privacy-Preserving Dynamic Pricing-based Billing Scheme for Smart GridsProsanta Gope, Biplab Sikdar. 1-2 [doi]
- A Search-based Firmware Code Analysis Method for IoT DevicesYifei Xu, Ting Liu 0002, Pengfei Liu, Hong Sun. 1-2 [doi]
- SCPN-based Game Model for Security Situational Awareness in the Intenet of ThingsFannv He, Yuqing Zhang, Huizheng Liu, Wei Zhou. 1-5 [doi]
- Cyber-Physical Security Risk Assessment for Train Control and Monitoring SystemsMouna Rekik 0002, Christophe Gransart, Marion Berbineau. 1-9 [doi]
- Pilot Contamination Attack Detection for NOMA in Mm-Wave and Massive MIMO 5G CommunicationNing Wang, Long Jiao, Kai Zeng. 1-9 [doi]
- Hardware Security Threats Against Bluetooth Mesh NetworksAlexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson. 1-9 [doi]
- ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access ControlSantiago Aragon, Marco Tiloca, Max Maass, Matthias Hollick, Shahid Raza. 1-9 [doi]
- Blind Rendezvous: A Promising Candidate of Secure Spectrum Access for D2D communications in IoTXingya Liu. 1-5 [doi]
- Support Vector Machine Detection of Data Framing Attack in Smart GridWang Jiao, Victor O. K. Li. 1-5 [doi]
- Pseudonym Inference in Cooperative Vehicular Traffic ScenariosXu Chu, Na Ruan, Ming Li 0003, Weijia Jia. 1-9 [doi]
- Protecting Your Own Private Key in Cloud: Security, Scalability and PerformanceWenqian Yu, Ping Yu, Junyuan Wang, Changzheng Wei, Lu Gong, Weigang Li, Bo Cui, Hari K. Tadepalli, Brian Will. 1-2 [doi]
- SecureMatch: Scalable Authentication and Key Relegation for IoT Using Physical-Layer TechniquesHanif Rahbari, Jinshan Liu, Jung-Min "Jerry" Park. 1-9 [doi]
- Efficient Signature Generation for Classifying Cross-Architecture IoT MalwareMohannad Alhanahnah, Qicheng Lin, Qiben Yan, Ning Zhang 0017, Zhenxiang Chen. 1-9 [doi]
- SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio SignalsMingyue Wang, Wen Tao Zhu, Shen Yan, Qiongxiao Wang. 1-9 [doi]
- Shooting to the Stars: Secure Location Verification via Meteor Burst CommunicationsSavio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro. 1-9 [doi]
- Fine-grained Android Malware Detection based on Deep LearningDongfang Li, Zhaoguo Wang, Yibo Xue. 1-2 [doi]
- Dynamic Practical Byzantine Fault ToleranceHao Xu, Yu Long, Zhiqiang Liu, Zhen Liu, Dawu Gu. 1-8 [doi]
- DPDA: A Differentially Private Double Auction Scheme for Mobile Crowd SensingWenqiang Jin, Ming Li, Linke Guo, Lei Yang. 1-9 [doi]
- Physical Intrusion Detection for Industrial Control SystemPengfei Liu, Ting Liu 0002. 1-2 [doi]
- Real-time Detection of Passive Backdoor Behaviors on Android SystemYao Yao, Lipeng Zhu, He Wang. 1-9 [doi]
- Block Chain Based Secure Scheme For Mobile CommunicationLiuFei Chen, YuShan Li, Hong Wen, WenXin Lei, Wenjing Hou, Jie Chen. 1-2 [doi]
- Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio ProximityPrakash Shrestha, Babins Shrestha, Nitesh Saxena. 1-9 [doi]
- Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V CommunicationsMingshun Sun, Ming Li 0003, Ryan M. Gerdes. 1-9 [doi]
- Cloud-Assisted Privacy-Preserving Classification for IoT ApplicationsLei Yang, FengJun Li. 1-9 [doi]
- Aggregated-Query-as-a-Secure-Service for RF Spectrum Database-Driven Opportunistic Wireless CommunicationsAbdulhamid Adebayo, Danda B. Rawat, Moses Garuba, Laurent Njilla. 1-2 [doi]
- Secret Dispersion: Secure Data Delivery in Cyber Physical SystemRui Hu, Yanmin Gong. 1-2 [doi]
- SignatureMiner: A Fast Anti-Virus Signature Intelligence ToolIgnacio Martín 0001, José Alberto Hernández, Sergio de los Santos. 1-2 [doi]
- Towards In-baggage Suspicious Object Detection Using Commodity WiFiChen Wang, Jian Liu 0001, Yingying Chen 0001, Hongbo Liu, Yan Wang 0003. 1-9 [doi]
- BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber AttacksMina Guirguis, Alireza Tahsini, Khan Siddique, Clara Novoa, Justin Moore, Christine Julien 0001, Noah Dunstatter. 1-9 [doi]
- Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery SystemsKamrul Hasan, Sachin Shetty, Amin Hassanzadeh, Malek Ben Salem, Jay Chen. 1-9 [doi]
- Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud DataQiuxiang Dong, Dijiang Huang, Jim Luo, Myong H. Kang. 1-9 [doi]
- An ISO/IEC 15408-2 Compliant Security Auditing System with Blockchain TechnologyShi-Cho Cha, Kuo-Hui Yeh. 1-2 [doi]
- Acceleration of Packet Classification via Inclusive RulesTakashi Harada, Ken Tanaka, Kenji Mikawa. 1-2 [doi]
- Preserving Location Privacy in Ride-Hailing ServiceYoussef Khazbak, Jingyao Fan, Sencun Zhu, Guohong Cao. 1-9 [doi]
- A Low Complexity Feature Extraction for the RF Fingerprinting ProcessYuShan Li, LiuFei Chen, Jie Chen, FeiYi Xie, Songlin Chen, Hong Wen. 1-2 [doi]
- SYBILFUSE: Combining Local Attributes with Global Structure to Perform Robust Sybil DetectionPeng Gao, Binghui Wang, Neil Zhenqiang Gong, Sanjeev R. Kulkarni, Kurt Thomas, Prateek Mittal. 1-9 [doi]
- Inference Attack in Android Activity based on Program FingerprintLi Yang, Teng Wei, Jianfeng Ma, Shui Yu, Chao Yang. 1-9 [doi]
- Social-aware Jamming Allocation for Physical-layer Security in D2D Multicast NetworkShiwei Yan, Yong Shang, Yanbo Huang. 1-7 [doi]
- Detecting Data Integrity Attacks on Correlated Solar Farms Using Multi-layer Data Driven AlgorithmKin Gwn Lore, Devu Manikantan Shila, Lingyu Ren. 1-9 [doi]
- DOPA: Detecting Open Ports in Android OSAli Alshehri, Hani Alshahrani, Abdulrahman Alzahrani, Raed Alharthi, Huirong Fu, Anyi Liu, Ye Zhu. 1-2 [doi]
- Mitigation of Cascading Denial of Service Attacks on Wi-Fi NetworksLiangxiao Xin, David Starobinski. 1-9 [doi]
- Defending against Social Network Sybils with Interaction Graph EmbeddingZhi Yang, Yusi Zhang, Yafei Dai. 1-9 [doi]
- T-PAAD: Trajectory Privacy Attack on Autonomous DrivingAbdelnasser Banihani, Abdulrahman Alzahrani, Raed Alharthi, Huirong Fu, George P. Corser. 1-2 [doi]
- Status-based Detection of malicious code in Internet of Things (IoT) devicesDongdi Wei, Xiaofeng Qiu. 1-7 [doi]
- Towards High-performance X25519/448 Key Agreement in General Purpose GPUsJiankuo Dong, Fangyu Zheng, Juanjuan Cheng, Jingqiang Lin, Wuqiong Pan, Ziyang Wang. 1-9 [doi]
- Privacy-Preserving Watermarking Transformation Technique in a Distributed EnvironmentAli Ataeemh Allami, Mukesh K. Mohania, Wei Jiang. 1-9 [doi]
- Compact Energy and Delay-Aware AuthenticationMuslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz. 1-9 [doi]
- Integrity of Integrated Navigation SystemsMass Soldal Lund, Jorgen Emil Gulland, Odd Sveinung Hareide, Øyvind Jøsok, Karl Olav Carlsson Weum. 1-5 [doi]
- Delegating Elliptic-Curve Operations with Homomorphic EncryptionCarlos Aguilar Melchor, Jean-Christophe Deneuville, Philippe Gaborit, Tancrède Lepoint, Thomas Ricosset. 1-9 [doi]
- On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory Data SharingRajkarn Singh, George Theodorakopoulos, Mahesh K. Marina, Myrto Arapinis. 1-9 [doi]
- ROSTER: Radio Context Attestation in Cognitive Radio NetworkNing Zhang 0017, Wenhai Sun, Wenjing Lou, Y. Thomas Hou, Wade Trappe. 1-9 [doi]
- Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix FactorizationShiran Pan, Fangyu Zheng, Wen Tao Zhu, Qiongxiao Wang. 1-9 [doi]
- Secure RSS-Fingerprint-Based Indoor Positioning: Attacks and CountermeasuresLizhou Yuan, Yidan Hu, Yunzhi Li, Rui Zhang, Yanchao Zhang, Terri Hedgpeth. 1-9 [doi]
- The Dark Side of Operational Wi-Fi Calling ServicesTian Xie, Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Jiawei Li, Mi Zhang. 1 [doi]
- LMHADC: Lightweight Method for Host based Anomaly Detection in Cloud using Mobile AgentsTao Qin, Ruoya Chen, Lei Wang, Chao He. 1-8 [doi]
- e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical DevicesHaotian Chi, Longfei Wu, Xiaojiang Du, Qiang Zeng 0001, Paul Ratazzi. 1-9 [doi]
- An Approach for Predicting the Popularity of Online Security News ArticlesJunli Kong, Baocang Wang, Caiyun Liu, Gaofei Wu. 1-6 [doi]
- N-Guard: a Solution to Secure Access to NFC tagsRoberto Di Pietro, Gabriele Oligeri, Xavier Salleras, Matteo Signorini. 1-9 [doi]
- Fraus: Launching Cost-efficient and Scalable Mobile Click Fraud Has Never Been So EasyElliott Wen, Jiannong Cao, Jiaxing Shen, Xuefeng Liu. 1-9 [doi]
- Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security ServicesXiao-Si Wang, Ian Herwono, Francesco Di Cerbo, Paul Kearney, Mark Shackleton. 1-7 [doi]
- Mitigating Stealthy False Data Injection Attacks Against State Estimation in Smart GridJingyao Fan, Youssef Khazbak, Jue Tian, Ting Liu 0002, Guohong Cao. 1-9 [doi]
- Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud BackupWenhai Sun, Ning Zhang 0017, Wenjing Lou, Y. Thomas Hou. 1-9 [doi]
- Deploying Robust Security in Internet of ThingsRuozhou Yu, Guoliang Xue, Vishnu Teja Kilari, Xiang Zhang 0005. 1-9 [doi]
- Physical Layer Key Generation Using Virtual AoA and AoD of mmWave Massive MIMO ChannelLong Jiao, Jie Tang, Kai Zeng. 1-9 [doi]
- Privacy-Preserving Average Consensus on Directed Graphs Using Push-SumHuan Gao, Chunlei Zhang, Muaz Ahmad, Yongqiang Wang. 1-9 [doi]
- Emergency Access Control Management Via Attribute Based Encrypted QR CodesSana Belguith, Sarada Prasad Gochhayat, Mauro Conti, Giovanni Russello. 1-8 [doi]
- The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and CountermeasuresXinyu Lei, Guan-Hua Tu, Alex X. Liu, Chi-Yu Li, Tian Xie. 1-9 [doi]
- Practical Collaborative Learning for Crowdsensing in the Internet of Things with Differential PrivacyYuanxiong Guo, Yanmin Gong. 1-9 [doi]
- T-PriDO: A Tree-based Privacy-Preserving and Contextual Collaborative Online Big Data Processing SystemAnni Zhou, Pan Zhou, Dapeng Oliver Wu, Yuchong Hu, Shouling Ji. 1-9 [doi]
- CONCEAL: A Strategy Composition for Resilient Cyber Deception-Framework, Metrics and DeploymentQi Duan, Ehab Al-Shaer, Mazharul Islam, Jafar Haadi Jafarian. 1-9 [doi]
- Repairing Faulty Nodes and Locating a Dynamically Spawned Black Hole Search Using TokensMengfei Peng, Wei Shi 0001, Jean-Pierre Corriveau. 1-9 [doi]
- Function-Oriented Programming: A New Class of Code Reuse Attack in C ApplicationsYingjie Guo, Liwei Chen, Gang Shi. 1-9 [doi]
- Feasibility of Passive Eavesdropping in Massive MIMO: An Experimental ApproachChia-Yi Yeh, Edward W. Knightly. 1-9 [doi]
- PSCluster: Differentially Private Spatial Cluster Detection for Mobile Crowdsourcing ApplicationsBoyang Hu, Baojian Zhou, Qiben Yan, Adil Alim, Feng Chen 0001, Huacheng Zeng. 1-9 [doi]
- Revisiting OAKE in the eCK Security ModelGuangye Sui, Yunlei Zhao. 9 [doi]