Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ting Chen 0002, Youzheng Feng, Xingwei Lin, Zihao Li 0001, Xiaosong Zhang 0001 |
DBAF: Dynamic Binary Analysis Framework and Its Applications. |
NSS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Eitschberger, Jörg Keller 0001, Simon Holmbacka |
Hardware and Software Support for Transposition of Bit Matrices in High-Speed Encryption. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Pinaki Sarkar |
Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS). |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Joona Kannisto, Jarmo Harju |
The Time Will Tell on You: Exploring Information Leaks in SSH Public Key Authentication. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lihua Wang 0001, Takuya Hayashi 0001, Yoshinori Aono, Le Trieu Phong |
A Generic yet Efficient Method for Secure Inner Product. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Al-Janabi, Peter Andras 0001 |
A Systematic Analysis of Random Forest Based Social Media Spam Classification. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ian Oliver, Silke Holtmanns, Yoan Miche, Shankar Lal, Leo Hippeläinen, Aapo Kalliola, Sowmya Ravidas |
Experiences in Trusted Cloud Computing. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Elena Ivannikova, Mikhail Zolotukhin, Timo Hämäläinen 0002 |
Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ali Abbasi 0002, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle |
\mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Tommi Meskanen, Masoud Naderpour, Valtteri Niemi |
Mind Your Right to Know: On De-anonymization Auditability in V2X Communications. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Igor Kabashkin |
Risk Modelling of Blockchain Ecosystem. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Somanath Tripathy, Praveen Kumar |
CookiesWall: Preventing Session Hijacking Attacks Using Client Side Proxy. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jing Li, Lihua Yin, Yunchuan Guo, Chao Li 0027, Fenghua Li, Lihua Chen |
A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Keita Emura |
A Generic Construction of Secure-Channel Free Searchable Encryption with Multiple Keywords. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jiayuan Zhang, Yao Yao, Xiaoqi Li 0001, Jian Xie, Gaofei Wu |
An Android Vulnerability Detection System. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Chia-Mei Chen, Gu Hsin Lai, Yen-Chih Kuo, Tan-Ho Chang |
Improving Alert Accuracy for Smart Vehicles. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hanlu Chen, Yulong Fu, Zheng Yan 0002 |
Survey on Big Data Analysis Algorithms for Network Security Measurement. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Amirhossein Gharib, Ali A. Ghorbani 0001 |
DNA-Droid: A Real-Time Android Ransomware Detection Framework. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yun Chen 0004, Kun Lv, Changzhen Hu |
Optimal Attack Path Generation Based on Supervised Kohonen Neural Network. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yajie Dong, Zhenyan Liu, Yida Yan, Yong Wang 0010, Tu Peng, Ji Zhang |
Machine Learning for Analyzing Malware. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad M. K. Nasser, Di Ma, Sam Lauzon |
Exploiting AUTOSAR Safety Mechanisms to Launch Security Attacks. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hao Zhang, Kun Lv, Changzhen Hu |
An Automatic Vulnerabilities Classification Method Based on Their Relevance. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lulu Liang, Kai Zheng 0018, Qiankun Sheng, Wei Wang 0042, Rong Fu, Xin Huang 0005 |
A Denial of Service Attack Method for IoT System in Photovoltaic Energy System. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Irina Mihai, Catalin Adrian Leordeanu, Alecsandru Patrascu |
Covert Channels Implementation and Detection in Virtual Environments. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rui Ma 0004, Tianbao Zhu, Changzhen Hu, Chun Shan, Xiaolin Zhao |
SulleyEX: A Fuzzer for Stateful Network Protocol. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Donghai Tian, Dingjun Qi, Li Zhan, Yuhang Yin, Changzhen Hu, Jingfeng Xue |
A Practical Method to Confine Sensitive API Invocations on Commodity Hardware. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rendon Sánchez Angel Mecías, Octavio José Salcedo Parra, Correa Sánchez Lewys |
Platform for Detection of Holes in the Bogotá D.C. Road Network and Exposure of the Information in a Web Environment. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lauri Isotalo |
5G Slicing as a Tool to Test User Equipment Against Advanced Persistent Threats. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Elena Reshetova, Filippo Bonazzi, N. Asokan |
Randomization Can't Stop BPF JIT Spray. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Saeed Shafieian, Daniel Smith, Mohammad Zulkernine |
Detecting DNS Tunneling Using Ensemble Learning. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zheng Yan 0002, Refik Molva, Wojciech Mazurczyk, Raimo Kantola (eds.) |
Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Markku Vajaranta, Joona Kannisto, Jarmo Harju |
IPsec and IKE as Functions in SDN Controlled Network. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Thomas W. Pieber, Thomas Ulz, Christian Steger, Rainer Matischek |
Hardware Secured, Password-based Authentication for Smart Sensors for the Industrial Internet of Things. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Chensi Wu, Yuqing Zhang 0001, Ying Dong |
Application Research on Network Attacks and Defenses with Zachman Framework. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jialu Hao, Jian Liu 0024, Hong Rong, Huimei Wang, Ming Xian |
OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lijun Jiang, Weizhi Meng 0001, Yu Wang 0017, Chunhua Su, Jin Li 0002 |
Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Naoki Nishikawa, Hideharu Amano, Keisuke Iwai |
Implementation of Bitsliced AES Encryption on CUDA-Enabled GPU. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nian Xue, Chenglong Jiang, Xin Huang 0005, Dawei Liu 0001 |
A Role-Based Access Control System for Intelligent Buildings. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Deepak Kumar Dalai, Pinaki Sarkar |
Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Noria Foukia, David Billard, Eduardo Solana |
Privacy Verification Chains for IoT. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mohsin Khan, Valtteri Niemi |
Concealing IMSI in 5G Network Using Identity Based Encryption. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fannv He, Yuqing Zhang 0001, Donghang Liu, Ying Dong, Caiyun Liu, Chensi Wu |
Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent Analysis. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jayaprakash Kar |
Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sara Ramezanian, Tommi Meskanen, Masoud Naderpour, Valtteri Niemi |
Private Membership Test Protocol with Low Communication Complexity. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Tahmina Ahmed, Ravi S. Sandhu |
Safety of ABAC _\alpha Is Decidable. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Dang Nguyen, Dat Tran 0001, Wanli Ma, Khoa Nguyen 0004 |
EEG-Based Random Number Generators. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Deepak Kumar Dalai, Dibyendu Roy 0001 |
A State Recovery Attack on ACORN-v1 and ACORN-v2. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Michal Zima |
Coincer: Decentralised Trustless Platform for Exchanging Decentralised Cryptocurrencies. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rui Ma 0004, Siyu Chen, Ke Ma, Changzhen Hu, Xiajing Wang |
Defenses Against Wormhole Attacks in Wireless Sensor Networks. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Leyou Zhang, Qing Wu 0005 |
Adaptively Secure Hierarchical Identity-Based Encryption over Lattice. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Huiting Tan, Chaojing Tang, Chen Zhang, Shaolei Wang |
Area-Dividing Route Mutation in Moving Target Defense Based on SDN. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yukun Zheng, Kun Lv, Changzhen Hu |
A Quantitative Method for Evaluating Network Security Based on Attack Graph. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Smriti Bhatt, Farhan Patwa, Ravi S. Sandhu |
Access Control Model for AWS Internet of Things. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Leo Hippelainen, Ian Oliver, Shankar Lal |
Towards Dependably Detecting Geolocation of Cloud Servers. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala |
A Formal Approach for Network Security Policy Relevancy Checking. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Juha Nurmi, Mikko S. Niemelä |
Tor De-anonymisation Techniques. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Le Trieu Phong |
Privacy-Preserving Stochastic Gradient Descent with Multiple Distributed Trainers. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Chun Shan, Shiyou Sun, Jingfeng Xue, Changzhen Hu, Hongjin Zhu |
A Detecting Method of Array Bounds Defects Based on Symbolic Execution. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Silke Holtmanns, Yoan Miche, Ian Oliver |
Subscriber Profile Extraction and Modification via Diameter Interconnection. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Donghang Liu, Lihua Dong, Shaoqing Lv, Ying Dong, Fannv He, Chensi Wu, Yuqing Zhang 0001, Hua Ma |
A Novel Approach to Network Security Situation Assessment Based on Attack Confidence. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Saia |
A Discrete Wavelet Transform Approach to Fraud Detection. |
NSS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wenjuan Li 0001, Weizhi Meng 0001, Lam-for Kwok, Horace Ho-Shing Ip |
PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Chang-Shiun Liu, Li Xu 0002, Limei Lin, Min-Chi Tseng, Shih-Ya Lin, Hung-Min Sun |
Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Stefanos Gritzalis |
Realtime DDoS Detection in SIP Ecosystems: Machine Learning Tools of the Trade. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yosuke Ishikuro, Kazumasa Omote |
Privacy-Preserving Profile Matching Protocol Considering Conditions. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Wei-Ting Lu, Wei Wu, Shih-Ya Lin, Min-Chi Tseng, Hung-Min Sun |
A System of Shareable Keyword Search on Encrypted Data. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fei Xu, Pinxin Liu, Jianfeng Yang, Jing Xu |
The Design and Implementation of Multi-dimensional Bloom Filter Storage Matrix. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ishai Rosenberg, Ehud Gudes |
Evading System-Calls Based Intrusion Detection Systems. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tomasz Hyla, Jerzy Pejas |
Secure Outsourced Bilinear Pairings Computation for Mobile Devices. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan |
An Attribute-Based Protection Model for JSON Documents. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Bailin Xie, Yu Wang 0017, Chao Chen 0015, Yang Xiang 0001 |
Gatekeeping Behavior Analysis for Information Credibility Assessment on Weibo. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Shashank Gupta 0002, Brij Bhooshan Gupta |
An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from OSN in Mobile Cloud Platforms. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kewei Lv, Wenjie Qin, Ke Wang |
Improved Security Proof for Modular Exponentiation Bits. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Qiumao Ma, Wensheng Zhang 0001, Jinsheng Zhang |
DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Gang Sheng, Chunming Tang 0003, Wei Gao 0007, Ying Yin |
MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Maanak Gupta, Ravi S. Sandhu |
The \mathrm GURA_G GURA G Administrative Model for User and Group Attribute Assignment. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Anisur Rahman, Yue Xu 0001, Kenneth Radke, Ernest Foo |
Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jinshuo Liu, Yabo Xu, Juan Deng, Lina Wang, Lanxin Zhang |
Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen 0001, Miroslaw Kutylowski |
Multi-device Anonymous Authentication. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Asma Alshehri, Ravi S. Sandhu |
On the Relationship Between Finite Domain ABAM and PreUCON \mathrm _A A. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu |
While Mobile Encounters with Clouds. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Raylin Tso |
Two-in-One Oblivious Signatures Secure in the Random Oracle Model. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jia-Ning Luo, Ming-Hour Yang, Cho-Luen Tsai |
A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Chao Lin, Fei Zhu, Wei Wu 0001, Kaitai Liang, Kim-Kwang Raymond Choo |
A New Transitive Signature Scheme. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kai He, Jian Weng 0001, Joseph K. Liu, Wanlei Zhou 0001, Jia-Nan Liu |
Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fangming Zhao, Takashi Nishide |
Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hiroaki Anada, Sushmita Ruj, Kouichi Sakurai |
Expressive Rating Scheme by Signatures with Predications on Ratees. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nikolai Hampton, Zubair A. Baig |
Timestamp Analysis for Quality Validation of Network Forensic Data. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Min Hsuan Cheng, Reza Sedaghat, Prathap Siddavaatam |
A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Saiful Islam Mamun, Mohammad Ahmad Rathore, Arash Habibi Lashkari, Natalia Stakhanova, Ali A. Ghorbani 0001 |
Detecting Malicious URLs Using Lexical Analysis. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yi Zhang 0044, Liuhua Chen, Haiying Shen, Xiaohui Cheng |
An Energy-Efficient Task Scheduling Heuristic Algorithm Without Virtual Machine Migration in Real-Time Cloud Environments. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yen-Lung Lai, Zhe Jin, Bok-Min Goi, Tong-Yuen Chai, Wun-She Yap |
Iris Cancellable Template Generation Based on Indexing-First-One Hashing. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Qianqian Yang 0003, Lei Hu, Siwei Sun, Ling Song 0001 |
Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung (eds.) |
Network and System Security - 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Toshihiro Yamauchi, Yuta Ikegami |
HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sherman S. M. Chow, Russell W. F. Lai, Xiuhua Wang 0001, Yongjun Zhao 0001 |
Privacy Preserving Credit Systems. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tingting Wang, Man Ho Au, Wei Wu 0001 |
An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords. |
NSS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes |
Let's Get Mobile: Secure FOTA for Automotive System. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez |
Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hang Cai, Krishna K. Venkatasubramanian |
Detecting Malicious Temporal Alterations of ECG Signals in Body Sensor Networks. |
NSS |
2015 |
DBLP DOI BibTeX RDF |
|