Abstract is missing.
- A Generic Construction of Secure-Channel Free Searchable Encryption with Multiple KeywordsKeita Emura. 3-18 [doi]
- Experiences in Trusted Cloud ComputingIan Oliver, Silke Holtmanns, Yoan Miche, Shankar Lal, Leo Hippeläinen, Aapo Kalliola, Sowmya Ravidas. 19-30 [doi]
- Private Membership Test Protocol with Low Communication ComplexitySara Ramezanian, Tommi Meskanen, Masoud Naderpour, Valtteri Niemi. 31-45 [doi]
- Adaptively Secure Hierarchical Identity-Based Encryption over LatticeLeyou Zhang, Qing Wu. 46-58 [doi]
- Risk Modelling of Blockchain EcosystemIgor Kabashkin. 59-70 [doi]
- Exploiting AUTOSAR Safety Mechanisms to Launch Security AttacksAhmad M. K. Nasser, Di Ma, Sam Lauzon. 73-86 [doi]
- CookiesWall: Preventing Session Hijacking Attacks Using Client Side ProxySomanath Tripathy, Praveen Kumar. 87-98 [doi]
- Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent AnalysisFannv He, Yuqing Zhang, Donghang Liu, Ying Dong, Caiyun Liu, Chensi Wu. 99-111 [doi]
- Detecting DNS Tunneling Using Ensemble LearningSaeed Shafieian, Daniel Smith, Mohammad Zulkernine. 112-127 [doi]
- Survey on Big Data Analysis Algorithms for Network Security MeasurementHanlu Chen, Yulong Fu, Zheng Yan. 128-142 [doi]
- A Practical Method to Confine Sensitive API Invocations on Commodity HardwareDonghai Tian, Dingjun Qi, Li Zhan, Yuhang Yin, Changzhen Hu, Jingfeng Xue. 145-159 [doi]
- Hardware and Software Support for Transposition of Bit Matrices in High-Speed EncryptionPatrick Eitschberger, Jörg Keller 0001, Simon Holmbacka. 160-168 [doi]
- An Android Vulnerability Detection SystemJiayuan Zhang, Yao Yao, Xiaoqi Li, Jian Xie, Gaofei Wu. 169-183 [doi]
- DNA-Droid: A Real-Time Android Ransomware Detection FrameworkAmirhossein Gharib, Ali Ghorbani. 184-198 [doi]
- Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot StudyLijun Jiang, Weizhi Meng, Yu Wang, Chunhua Su, Jin Li. 199-213 [doi]
- A Generic yet Efficient Method for Secure Inner ProductLihua Wang, Takuya Hayashi 0001, Yoshinori Aono, Le Trieu Phong. 217-232 [doi]
- Randomization Can't Stop BPF JIT SprayElena Reshetova, Filippo Bonazzi, N. Asokan. 233-247 [doi]
- EEG-Based Random Number GeneratorsDang Nguyen, Dat Tran, Wanli Ma, Khoa Nguyen. 248-256 [doi]
- Safety of ABAC _\alpha Is DecidableTahmina Ahmed, Ravi Sandhu. 257-272 [doi]
- Implementation of Bitsliced AES Encryption on CUDA-Enabled GPUNaoki Nishikawa, Hideharu Amano, Keisuke Iwai. 273-287 [doi]
- Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature SchemeJayaprakash Kar. 291-300 [doi]
- The Time Will Tell on You: Exploring Information Leaks in SSH Public Key AuthenticationJoona Kannisto, Jarmo Harju. 301-314 [doi]
- Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS)Pinaki Sarkar. 315-331 [doi]
- A State Recovery Attack on ACORN-v1 and ACORN-v2Deepak Kumar Dalai, Dibyendu Roy. 332-345 [doi]
- A Quantitative Method for Evaluating Network Security Based on Attack GraphYukun Zheng, Kun Lv, Changzhen Hu. 349-358 [doi]
- SulleyEX: A Fuzzer for Stateful Network ProtocolRui Ma, Tianbao Zhu, Changzhen Hu, Chun Shan, Xiaolin Zhao. 359-372 [doi]
- A Detecting Method of Array Bounds Defects Based on Symbolic ExecutionChun Shan, Shiyou Sun, Jingfeng Xue, Changzhen Hu, Hongjin Zhu. 373-385 [doi]
- Machine Learning for Analyzing MalwareYajie Dong, Zhenyan Liu, Yida Yan, Yong Wang, Tu Peng, Ji Zhang. 386-398 [doi]
- Optimal Attack Path Generation Based on Supervised Kohonen Neural NetworkYun Chen, Kun Lv, Changzhen Hu. 399-412 [doi]
- Defenses Against Wormhole Attacks in Wireless Sensor NetworksRui Ma, Siyu Chen, Ke Ma, Changzhen Hu, Xiajing Wang. 413-426 [doi]
- A Systematic Analysis of Random Forest Based Social Media Spam ClassificationMohammed Al-Janabi, Peter Andras. 427-438 [doi]
- Application Research on Network Attacks and Defenses with Zachman FrameworkChensi Wu, Yuqing Zhang, Ying Dong. 439-449 [doi]
- A Novel Approach to Network Security Situation Assessment Based on Attack ConfidenceDonghang Liu, Lihua Dong, Shaoqing Lv, Ying Dong, Fannv He, Chensi Wu, Yuqing Zhang, Hua Ma. 450-463 [doi]
- A Discrete Wavelet Transform Approach to Fraud DetectionRoberto Saia. 464-474 [doi]
- An Automatic Vulnerabilities Classification Method Based on Their RelevanceHao Zhang, Kun Lv, Changzhen Hu. 475-485 [doi]
- A Novel Threat-Driven Data Collection Method for Resource-Constrained NetworksJing Li, Lihua Yin, Yunchuan Guo, Chao Li, FengHua Li, Lihua Chen. 486-496 [doi]
- OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy UpdatingJialu Hao, Jian Liu, Hong Rong, Huimei Wang, Ming-xian. 499-509 [doi]
- Privacy-Preserving Stochastic Gradient Descent with Multiple Distributed TrainersLe Trieu Phong. 510-518 [doi]
- IPsec and IKE as Functions in SDN Controlled NetworkMarkku Vajaranta, Joona Kannisto, Jarmo Harju. 521-530 [doi]
- Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined NetworksElena Ivannikova, Mikhail Zolotukhin, Timo Hämäläinen 0002. 531-543 [doi]
- Concealing IMSI in 5G Network Using Identity Based EncryptionMohsin Khan, Valtteri Niemi. 544-554 [doi]
- A Formal Approach for Network Security Policy Relevancy CheckingFakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala. 555-564 [doi]
- Area-Dividing Route Mutation in Moving Target Defense Based on SDNHuiting Tan, Chaojing Tang, Chen Zhang, Shaolei Wang. 565-574 [doi]
- Covert Channels Implementation and Detection in Virtual EnvironmentsIrina Mihai, Catalin Leordeanu, Alecsandru Patrascu. 575-584 [doi]
- Subscriber Profile Extraction and Modification via Diameter InterconnectionSilke Holtmanns, Yoan Miche, Ian Oliver. 585-594 [doi]
- 5G Slicing as a Tool to Test User Equipment Against Advanced Persistent ThreatsLauri Isotalo. 595-603 [doi]
- Mind Your Right to Know: On De-anonymization Auditability in V2X CommunicationsTommi Meskanen, Masoud Naderpour, Valtteri Niemi. 604-610 [doi]
- A Denial of Service Attack Method for IoT System in Photovoltaic Energy SystemLulu Liang, Kai Zheng 0003, Qiankun Sheng, Wei Wang, Rong Fu, Xin Huang. 613-622 [doi]
- Improving Alert Accuracy for Smart VehiclesChia-Mei Chen, Gu Hsin Lai, Yen-Chih Kuo, Tan-Ho Chang. 623-631 [doi]
- Hardware Secured, Password-based Authentication for Smart Sensors for the Industrial Internet of ThingsThomas W. Pieber, Thomas Ulz, Christian Steger, Rainer Matischek. 632-642 [doi]
- Towards Dependably Detecting Geolocation of Cloud ServersLeo Hippelainen, Ian Oliver, Shankar Lal. 643-656 [doi]
- Tor De-anonymisation TechniquesJuha Nurmi, Mikko S. Niemelä. 657-671 [doi]
- Coincer: Decentralised Trustless Platform for Exchanging Decentralised CryptocurrenciesMichal Zima. 672-682 [doi]
- Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on SensornetDeepak Kumar Dalai, Pinaki Sarkar. 683-693 [doi]
- \mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded SystemsAli Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle. 694-709 [doi]
- A Role-Based Access Control System for Intelligent BuildingsNian Xue, Chenglong Jiang, Xin Huang, Dawei Liu. 710-720 [doi]
- Access Control Model for AWS Internet of ThingsSmriti Bhatt, Farhan Patwa, Ravi Sandhu. 721-736 [doi]
- Privacy Verification Chains for IoTNoria Foukia, David Billard, Eduardo Solana. 737-752 [doi]
- Platform for Detection of Holes in the Bogotá D.C. Road Network and Exposure of the Information in a Web EnvironmentRendon Sánchez Angel Mecías, Salcedo Parra Octavio José, Correa Sánchez Lewys. 753-760 [doi]