Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Nicolas Van Balen, Christopher T. Ball, Haining Wang |
A Behavioral Biometrics Based Approach to Online Gender Classification. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Russell W. F. Lai, Sherman S. M. Chow |
Parallel and Dynamic Structured Encryption. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yanhong He, Xianyi Zheng, Ziyuan Zhu, Gang Shi |
TZ-SSAP: Security-Sensitive Application Protection on Hardware-Assisted Isolated Environment. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mozammel Chowdhury, Junbin Gao, Rafiqul Islam 0002 |
Biometric Authentication Using Facial Recognition. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy |
A Multi-protocol Security Framework to Support Internet of Things. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tao Zhang 0014, Xiuhua Wang 0001, Sherman S. M. Chow |
Privacy-Preserving Multi-pattern Matching. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Zhengyang Qu, Guanyu Guo, Zhengyue Shao, Vaibhav Rastogi, Yan Chen 0004, Hao Chen 0003, Wangjun Hong |
AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Zheng Xiao, Cheng Wang 0001, Weili Han, Changjun Jiang |
Unique on the Road: Re-identification of Vehicular Location-Based Metadata. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jianming Fu, Yan Lin 0003, Xu Zhang 0008 |
Impact of Environment on Branch Transfer of Software. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fidel Ikundi, Rafiqul Islam 0002, Peter White |
Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating Strategy. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Zhiqiang Li, Lichao Sun 0001, Qiben Yan, Witawas Srisa-an, Zhenxiang Chen |
DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Homoliak, Martin Teknos, Maros Barabas, Petr Hanácek |
Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nathaniel Lageman, Eric D. Kilmer, Robert J. Walls, Patrick D. McDaniel |
BinDNN: Resilient Function Matching Using Deep Learning. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Lorena González-Manzano, José María de Fuentes, Kim-Kwang Raymond Choo |
ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ling Yang, Fuyang Fang, Xianhui Lu, Wen Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan |
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Juan Ai, Zhu Wang 0005, Xinping Zhou, Changhai Ou |
POSTER: A Novel Wavelet Denoising Method Based on Robust Principal Component Analysis in Side Channel Attacks. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sang-Yoon Chang, Shaoying Cai, Hwajeong Seo, Yih-Chun Hu |
Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fei Peng, Le Qin, Min Long |
POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality Analysis. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Assad Umar, Iakovos Gurulian, Keith Mayes, Konstantinos Markantonakis |
Tokenisation Blacklisting Using Linkable Group Signatures. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yacong Gu, Yao Cheng, Lingyun Ying, Yemian Lu, Qi Li 0002, Purui Su |
Exploiting Android System Services Through Bypassing Service Helpers. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hui Cui 0001, Robert H. Deng, Xuhua Ding, Yingjiu Li |
Attribute-Based Encryption with Granular Revocation. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jiangyong Shi, Yuexiang Yang |
Architecture Support for Controllable VMI on Untrusted Cloud. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yongfeng Li, Jinbin Ouyang, Shanqing Guo, Bing Mao |
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mark J. Carman, Kim-Kwang Raymond Choo |
Tinder Me Softly - How Safe Are You Really on Tinder? |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Xing Liu, Sencun Zhu, Wei Wang 0012, Jiqiang Liu |
Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yao Liu, Ming Xu 0001, Jian Xu 0001, Ning Zheng 0001, Xiaodong Lin 0001 |
SQLite Forensic Analysis Based on WAL. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Shaoyong Du, Yue Gao, Jingyu Hua, Sheng Zhong 0002 |
Secure Keyboards Against Motion Based Keystroke Inference Attack. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Damien Ligier, Sergiu Carpov, Caroline Fontaine, Renaud Sirdey |
Privacy Preserving Data Classification Using Inner Product Encryption. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jing Yang 0032, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing |
Extracting More Entropy for TRNGs Based on Coherent Sampling. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hailiang Fu, Guoqiang Bai 0001, Xingjun Wu |
A Very Compact Masked S-Box for High-Performance Implementation of SM4 Based on Composite Field. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Shigeki Goto |
Website Forensic Investigation to Identify Evidence and Impact of Compromise. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kamini (Simi) Bajaj |
A Multi-layer Model to Detect Spam Email at Client Side. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Lingchen Zhang |
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Muqing Liu, Yuanyuan Zhang 0002, Juanru Li, Junliang Shu, Dawu Gu |
Security Analysis of Vendor Customized Code in Firmware of Embedded Device. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Peizhao Hu, Siyu Zhu |
POSTER: Location Privacy Using Homomorphic Encryption. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | TungNgai Miu, Chenxu Wang, Daniel Xiapu Luo, Jinhe Wang |
Modeling User Browsing Activity for Application Layer DDoS Attack Detection. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati |
Access Control Management for Secure Cloud Storage. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nicolae Paladi, Christian Gehrmann |
TruSDN: Bootstrapping Trust in Cloud Network Infrastructure. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tianjun Wu, Yuexiang Yang |
IacCE: Extended Taint Path Guided Dynamic Analysis of Android Inter-App Data Leakage. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jianbing Ni, Kuan Zhang 0001, Xiaodong Lin 0001, Yong Yu 0002, Xuemin (Sherman) Shen |
Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Peng Chen 0034, Hao Chen 0003 |
POSTER: Security Analysis of Personal Unmanned Aerial Vehicles. |
SecureComm |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kai Cao, Yunchun Li, Hailong Yang, Jiqiang Tang, Xiaoxiang Zou |
POSTER: An Online Prefix-Preserving IP Address Anonymization Algorithm for Passive Measurement Systems. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Oliver Stecklina, Peter Langendörfer, Frank Vater, Thorsten Kranz, Gregor Leander |
Intrinsic Code Attestation by Instruction Chaining for Embedded Devices. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xiaojun Xiao, Yaping Lin, Wei Zhang 0074, Xin Yao 0002, Qi Gu |
Authenticating Top-k Results of Secure Multi-keyword Search in Cloud Computing. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chanwoo Bae, Jesung Jung, Jaehyun Nam, Seungwon Shin |
POSTER: A Collaborative Approach on Behavior-Based Android Malware Detection. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xuejie Ding, Wei-qing Huang, Meng Zhang 0020, Jianlin Zhao |
POSTER: A Security Adaptive Steganography System Applied on Digital Audio. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Max Mühlhäuser, Mathias Fischer 0001 |
Community-Based Collaborative Intrusion Detection. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yuan Zhang 0009, Min Yang 0002, Guofei Gu, Hao Chen 0003 |
FineDroid: Enforcing Permissions with System-Wide Application Execution Context. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Indrajeet Singh, Masoud Akhoondi, Mustafa Y. Arslan, Harsha V. Madhyastha, Srikanth V. Krishnamurthy |
Resource Efficient Privacy Preservation of Online Social Media Conversations. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yuejian Fang, Zilong Wen, Qingni Shen, Yahui Yang, Zhonghai Wu |
POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Craß, Gerson Joskowicz, Eva Kühn |
A Decentralized Access Control Model for Dynamic Collaboration of Autonomous Peers. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dongdong Tian, Xiaohong Li 0001, Jing Hu 0007, Guangquan Xu, Zhiyong Feng 0002 |
POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yoann Bertrand, Mireille Blay-Fornarino, Karima Boudaoud, Michel Riveill |
Generation of Transmission Control Rules Compliant with Existing Access Control Policies. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yongzheng Zhang 0002, Tao Xu, Yipeng Wang 0001, Jianliang Sun, Xiaoyu Zhang 0002 |
A Markov Random Field Approach to Automated Protocol Signature Inference. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Degang Sun, Xinping Zhou, Zhu Wang 0005, Changhai Ou, Wei-qing Huang, Juan Ai |
POSTER: Using Improved Singular Value Decomposition to Enhance Correlation Power Analysis. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | André Ebert, Chadly Marouane, Benno Rott, Martin Werner 0001 |
KeyPocket - Improving Security and Usability for Provider Independent Login Architectures with Mobile Devices. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hugo Gascon, Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck |
Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Atamli-Reineh, Andrew P. Martin |
Securing Application with Software Partitioning: A Case Study Using SGX. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jinkun Geng, Daren Ye, Ping Luo, Pin Lv |
A Novel Clustering Algorithm for Database Anomaly Detection. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vaibhav Rastogi, Zhengyang Qu, Jedidiah McClurg, Yinzhi Cao, Yan Chen 0004 |
Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xing Zhang 0002, Cancan Jin, Cong Li, Zilong Wen, Qingni Shen, Yuejian Fang, Zhonghai Wu |
Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vitaly Ford, Ambareen Siraj |
POSTER: Reliable and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dae Wook Kim, Junjie Zhang 0004 |
You Are How You Query: Deriving Behavioral Fingerprints from DNS Traffic. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mozammel Chowdhury, Junbin Gao, Rafiqul Islam 0002 |
Human Surveillance System for Security Application. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohsen Alimomeni, Reihaneh Safavi-Naini |
How to Prevent to Delegate Authentication. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chao Yang 0022, Guangliang Yang 0001, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, Guofei Gu |
Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chunqiang Hu, Xiuzhen Cheng 0001, Zhi Tian, Jiguo Yu, Kemal Akkaya, Limin Sun |
An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lin Yan, Yao Guo 0001, Xiangqun Chen |
SplitDroid: Isolated Execution of Sensitive Components for Mobile Applications. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Apala Ray, Johan Åkerberg, Mats Björkman, Mikael Gidlund |
POSTER: An Approach to Assess Security, Capacity and Reachability for Heterogeneous Industrial Networks. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yongbo Li, Fan Yao, Tian Lan, Guru Venkataramani |
POSTER: Semantics-Aware Rule Recommendation and Enforcement for Event Paths. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ashton Webster, Margaret Gratian, Ryan Eckenrod, Daven Patel, Michel Cukier |
An Improved Method for Anomaly-Based Network Scan Detection. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mozammel Chowdhury, Junbin Gao, Morshed U. Chowdhury |
Image Spam Classification Using Neural Network. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gustavo Gonzalez Granadillo, Joaquín García-Alfaro, Hervé Debar |
Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | M. Arif Khan, Rafiqul Islam 0002 |
Secrecy Rate Based User Selection Algorithms for Massive MIMO Wireless Networks. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Priyabrat Dash, Chris Perkins, Ryan M. Gerdes |
Remote Activation of Hardware Trojans via a Covert Temperature Channel. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bhavani Thuraisingham, XiaoFeng Wang 0001, Vinod Yegneswaran (eds.) |
Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yongfeng Li, Tong Shen, Xin Sun, Xuerui Pan, Bing Mao |
Detection, Classification and Characterization of Android Malware Using API Data Dependency. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Karim Emara, Wolfgang Woerndl, Johann H. Schlichter |
POSTER: Context-Adaptive User-Centric Privacy Scheme for VANET. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Khandakar Rabbi, Quazi Mamun |
An Effective t-way Test Data Generation Strategy. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jidong Xiao, Hai Huang 0002, Haining Wang |
Defeating Kernel Driver Purifier. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Juan D. Parra Rodriguez, Joachim Posegga |
Why Web Servers Should Fear Their Clients - Abusing Websockets in Browsers for DoS. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ala' F. A. Aburumman, Wei Jye Seo, Md. Rafiqul Islam 0001, Muhammad Khurram Khan, Kim-Kwang Raymond Choo |
A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lei Yang 0037, Fengjun Li |
Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yueqiang Cheng, Qing Li, Miao Yu, Xuhua Ding, Qingni Shen |
SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hong Liu, Hongmin Li 0001, Eugene Y. Vasserman |
Practicality of Using Side-Channel Analysis for Software Integrity Checking of Embedded Systems. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Song Li, Hai-Xin Duan, Zhiliang Wang, Xing Li 0001 |
Route Leaks Identification by Detecting Routing Loops. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ben Townsend, Jemal H. Abawajy |
Security Considerations for Wireless Carrier Agonistic Bio-Monitoring Systems. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jidong Xiao, Hai Huang 0002, Haining Wang |
Kernel Data Attack Is a Realistic Security Threat. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hao Sun 0004, Xiaofeng Wang 0002, Jinshu Su, Peixin Chen |
RScam: Cloud-Based Anti-Malware via Reversible Sketch. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Geng Tian, Zhiliang Wang, Xia Yin, Zimu Li, Xingang Shi, Ziyi Lu, Chao Zhou, Yang Yu, Dan Wu |
TADOOP: Mining Network Traffic Anomalies with Hadoop. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao, Wei Yang 0011 |
A Novel Web Tunnel Detection Method Based on Protocol Behaviors. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Niels Avonds, Raoul Strackx, Pieter Agten, Frank Piessens |
Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty, Christophe Rosenberger |
An e-payment Architecture Ensuring a High Level of Privacy Protection. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Miao Li, Liangsheng He, Tongjie Yang, Neng Gao, Zongbin Liu, Qinglong Zhang |
An Efficient Reconfigurable II-ONB Modular Multiplier. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Minghua Wang, Purui Su, Qi Li 0002, Lingyun Ying, Yi Yang 0040, Dengguo Feng |
Automatic Polymorphic Exploit Generation for Software Vulnerabilities. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jun Jiang, Meining Nie, Purui Su, Dengguo Feng |
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Eirini D. Karapistoli, Anastasios A. Economides |
Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xin Ruan, Chuan Yue, Haining Wang |
Unveiling Privacy Setting Breaches in Online Social Networks. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Varadharajan, Udaya Kiran Tupakula |
Integrated Security Architecture for Virtual Machines. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mehari Msgna, Konstantinos Markantonakis, Keith Mayes |
The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|