The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CNS"( http://dblp.L3S.de/Venues/CNS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cns

Publication years (Num. hits)
2013 (86) 2014 (79) 2015 (128) 2016 (102) 2017 (96) 2018 (86) 2019 (63) 2020 (79) 2021 (36) 2022 (62) 2023 (56)
Publication types (Num. hits)
inproceedings(862) proceedings(11)
Venues (Conferences, Journals, ...)
CNS(873)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 873 publication records. Showing 873 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Zhigang Chen 0004, Xin Hu 0001, Xiaoen Ju, Kang G. Shin LISA: Location information ScrAmbler for privacy protection on smartphones. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yufeng Wang 0007, Chiu C. Tan 0001 Looking at the overheads of transmitting encrypted data to the cloud. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aditi Gupta 0002, Michael S. Kirkpatrick, Elisa Bertino A secure architecture design based on application isolation, code minimization and randomization. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wei-Min Yao, Sonia Fahmy, Jiahong Zhu EasyScale: Easy mapping for large-scale network security experiments. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sushil Jajodia, Wenjing Lou, Wade Trappe Welcome message. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yue Tong, Jinyuan Sun, Sherman S. M. Chow, Pan Li 0001 Towards auditable cloud-assisted access of encrypted health data. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Robert Koch 0002, Mario Golling, Gabi Dreo Rodosek Attracting sophisticated attacks to secure systems: A new honeypot architecture. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xiongwei Xie, Weichao Wang Rootkit detection on virtual machines through deep information extraction at hypervisor-level. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kekai Hu, Harikrishnan Chandrikakutty, Russell Tessier, Tilman Wolf Scalable hardware monitors to protect network processors from data plane attacks. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ziming Zhao 0001, Gail-Joon Ahn Using instruction sequence abstraction for shellcode detection and attribution. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hongbo Liu 0002, Yingying Chen 0001, Mooi Choo Chuah, Jie Yang 0003 Towards self-healing smart grid via intelligent local controller switching under jamming. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Amir Herzberg, Haya Schulmann DNSSEC: Security and availability challenges. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Linke Guo, Chi Zhang 0001, Yuguang Fang Privacy-preserving revocable content sharing in geosocial networks. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Haitao Du, Shanchieh Jay Yang Sequential modeling for obfuscated network attack action sequences. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jérôme François, Radu State, Thomas Engel 0001 Aggregated representations and metrics for scalable flow analysis. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yuanpeng Xie, Jinsong Zhang, Ge Fu, Hong Wen 0001, Qiyi Han, Xiping Zhu, Yixin Jiang, Xiaobin Guo The security issue of WSNs based on cloud computing. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zhenlong Yuan, Yibo Xue, Yingfei Dong Harvesting unique characteristics in packet sequences for effective application classification. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ahmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn ADAM: Automated detection and attribution of malicious webpages. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zheng Yan 0002, Mingjun Wang, Valtteri Niemi, Raimo Kantola Secure pervasive social networking based on multi-dimensional trust levels. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu A framework for risk-aware role based access control. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Atighetchi, Nathaniel Soule, Partha P. Pal, Joseph P. Loyall, Asher Sinclair, Robert Grant Safe configuration of TLS connections. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yixin Jiang, Xiaobin Guo, Chao Li, Hong Wen 0001, Cai Lei, Zhang Rui An efficient and secure search database scheme for cloud computing in smart grid. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kriangkrai Limthong Performance of interval-based features for anomaly detection in network traffic. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dong-Hoon Shin, Jinkyu Koo, Lei Yang 0001, Xiaojun Lin 0001, Saurabh Bagchi, Junshan Zhang Low-complexity secure protocols to defend cyber-physical systems against network isolation attacks. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sriram Sankaran, Ramalingam Sridhar User-adaptive energy-aware security for mobile devices. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov Secure hierarchical Virtual Private LAN Services for provider provisioned networks. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Boyang Wang, Ming Li 0003, Sherman S. M. Chow, Hui Li 0006 Computing encrypted cloud data efficiently under multiple keys. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Peter Mell, Richard E. Harang Limitations to threshold random walk scan detection and mitigating enhancements. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Liyun Li, Suhas Mathur, Baris Coskun Gangs of the internet: Towards automatic discovery of peer-to-peer communities. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yang Liu 0012, Wenji Chen, Yong Guan Identifying high-cardinality hosts from network-wide traffic measurements. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Radia J. Perlman, Charlie Kaufman Byzantine robustness, hierarchy, and scalability. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wei Peng 0007, Feng Li 0001, Keesook J. Han, Xukai Zou, Jie Wu 0001 T-dominance: Prioritized defense deployment for BYOD security. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jason Gustafson, Jun Li 0001 Leveraging the crowds to disrupt phishing. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Osman Kiraz, Albert Levi Maintaining trajectory privacy in mobile wireless sensor networks. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Kun Sun 0001 A moving target defense mechanism for MANETs based on identity virtualization. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Qi Duan, Ehab Al-Shaer, Jafar Haadi Jafarian Efficient Random Route Mutation considering flow and network constraints. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wei Yu 0002, Guobin Xu, Zhijiang Chen, Paul Moulema A cloud computing based architecture for cyber security situation awareness. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Youngjune Gwon, Siamak Dastangoo, Carl Fossa, H. T. Kung 0001 Competing Mobile Network Game: Embracing antijamming and jamming strategies with reinforcement learning. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini, Pengwei Wang 0006 Efficient codes for Limited View adversarial channels. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1 IEEE Conference on Communications and Network Security, CNS 2013, National Harbor, MD, USA, October 14-16, 2013 Search on Bibsonomy CNS The full citation details ... 2013 DBLP  BibTeX  RDF
1Xiaojing Liao, A. Selcuk Uluagac, Raheem A. Beyah S-Match: An efficient privacy-preserving profile matching scheme. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Huijun Xiong, Qingji Zheng, Xinwen Zhang, Danfeng Yao CloudSafe: Securing data processing within vulnerable virtualization environments in the cloud. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Robert Koch 0002, Mario Golling, Gabi Dreo Rodosek An architecture for supervising COTS products. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aziz Mohaisen, Omar Alrawi, Andrew G. West, Allison Mankin Babble: Identifying malware by its dialects. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hicham El Khoury, Romain Laborde, François Barrère, Abdelmalek Benzekri, Maroun Chamoun A specification method for analyzing fine grained network security mechanism configurations. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammed Noraden Alsaleh, Saeed Al-Haj, Ehab Al-Shaer Objective metrics for firewall security: A holistic view. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Amirali Sanatinia, Sashank Narain, Guevara Noubir Wireless spreading of WiFi APs infections using WPS flaws: An epidemiological and experimental study. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marcos Portnoi, Chien-Chung Shen Location-aware sign-on and key exchange using attribute-based encryption and Bluetooth beacons. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christian S. Collberg, Aaron Gibson, Sam Martin, Nitin Shinde, Amir Herzberg, Haya Schulmann Provenance of exposure: Identifying sources of leaked documents. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Amir Herzberg, Haya Schulmann Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shun-Wen Hsiao, Yi-Ning Chen, Yeali S. Sun, Meng Chang Chen A cooperative botnet profiling and detection in virtualized environment. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christian Doerr Challenge tracing and mitigation under partial information and uncertainty. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hasen Nicanfar, Javad Hajipour, Farshid Agharebparast, Peyman TalebiFard, Victor C. M. Leung Privacy-preserving handover mechanism in 4G. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marcos Portnoi, Chien-Chung Shen Secure Zones: An Attribute-Based Encryption advisory system for safe firearms. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ray-Guang Cheng, Po-Yao Tsai, Ping-Chen Lin, Chia-Liang Lian, Tse-Han Liu, Hsien-Cheng Chou, Shiao-Li Tsao, Shanchieh Jay Yang Design and implementation of a Skype Protocol Analyzer. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Olgierd Pieczul, Simon N. Foley Discovering emergent norms in security logs. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jun Zou 0005, Arash Einolghozati, Faramarz Fekri Privacy-preserving item-based Collaborative Filtering using semi-distributed Belief Propagation. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christian Callegari, Alessandro Casella, Stefano Giordano, Michele Pagano, Teresa Pepe Sketch-based multidimensional IDS: A new approach for network anomaly detection. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Ehab Al-Shaer A game-theoretic approach for deceiving Remote Operating System Fingerprinting. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yunus Sarikaya, Özgür Erçetin, Özgür Gürbüz Dynamic control for cooperative jamming with a non-altruistic node. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mansurul Bhuiyan, Aziz Mohaisen, Yannis Labrou, Mohammad Al Hasan Characterization of the dynamics and interactions of domain names and name server. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kyle Guan, Peter J. Winzer, Emina Soljanin, Antonia M. Tulino On the secrecy capacity of the space-division multiplexed fiber optical communication systems. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Stephen Moskal, Derek Kreider, Lydia Hays, Ben Wheeler, Shanchieh Jay Yang, Michael E. Kuhl Simulating attack behaviors in enterprise networks. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Huian Li, Yan Sui, Wei Peng 0007, Xukai Zou, Feng Li 0001 A viewable e-voting scheme for environments with conflict of interest. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Qiyi Han, Lin Yu, Rui Zhang, Hong Wen 0001, Yuanpeng Xie, Xiping Zhu, Yixin Jiang, Xiaobin Guo A P2P recommended trust nodes selection algorithm based on topological potential. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Maurizio Talamo, Franco Arcieri, Christian H. Schunck, Andrea Callia D'Iddio Providing context-based security for inter-organizational electronic business processes. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Boyang Wang, Baochun Li, Hui Li 0006, Fenghua Li Certificateless public auditing for data integrity in the cloud. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hongyang Li, György Dán, Klara Nahrstedt FADEC: Fast authentication for dynamic electric vehicle charging. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Pascal Urien Cloud of Secure Elements perspectives for mobile and cloud applications security. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Juan A. Elices, Fernando Pérez-González Locating Tor hidden services through an interval-based traffic-correlation attack. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jiawei Yuan, Shucheng Yu Flexible and publicly verifiable aggregation query for outsourced databases in cloud. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jiawei Yuan, Shucheng Yu Secure and constant cost public cloud storage auditing with deduplication. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gang Xu, George T. Amariucai, Yong Guan A lightweight argument system with efficient verifier. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #873 of 873 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license