Gold Patron
Silver Patron
|
|
- Fragmentation Considered Poisonous, or: One-Domain-to-Rule-them-All.ORG
Amir Herzberg (Bar-Ilan University, Israel); Haya Shulman (Bar Ilan University, Israel)
- EasyScale: Easy Mapping for Large-Scale Network Security Experiments
Wei-Min Yao (Purdue University, USA); Sonia Fahmy (Purdue University, USA); Jiahong Zhu (Purdue, USA)
- Scalable Hardware Monitors to Protect Network Processors from Data Plane Attacks
Kekai Hu (University of Massachusetts Amherst, USA); Harikrishnan Chandrikakutty (University of Massachusetts, USA); Russell Tessier (University of Massachusetts, USA); Tilman Wolf (University of Massachusetts, USA)
- Using Instruction Sequence Abstraction for Shellcode Detection and Attribution
Ziming Zhao (Arizona State University, USA); Gail-Joon Ahn (Arizona State University, USA)
- On the Impact of Social Botnets for Spam Distribution and Digital-influence Manipulation
Jinxue Zhang (Arizona State University, USA); Rui Zhang (University of Hawaii, USA); Yanchao Zhang (Arizona State University, USA); Guanhua Yan (Los Alamos National Laboratory, USA)
- Certificateless Public Auditing for Data Integrity in the Cloud
Boyang Wang (Xidian University, P.R. China); Baochun Li (University of Toronto, Canada); Hui Li (Xidian University, P.R. China); Fenghua Li (Xidian University, P.R. China)
- Energy-Efficient, Secure Group Key Agreement for Ad Hoc Networks
Thomas R Halford (TrellisWare Technologies, Inc., USA); Thomas Courtade (Stanford University, USA); Keith M Chugg (University of Southern California, USA)
- Limitations to Threshold Random Walk Scan Detection and Mitigating Enhancements
Peter Mell (National Institute of Standards and Technology, USA); Richard Harang (ICF International, USA)
- Privacy-Preserving Item-Based Collaborative Filtering Using Semi-Distributed Belief Propagation
Jun Zou (Georgia Institute of Technology, USA); Arash Einolghozati (Georgia Tech, USA); Faramarz Fekri (Georgia Institute of Technology, USA)
- Exponential Secrecy Against Unbounded Adversary using Joint Encryption and Privacy Amplification
Yahya Khiabani (Louisiana State University, USA); Shuangqing Wei (Louisiana State University, USA)
- Low-Complexity Secure Protocols to Defend Cyber-Physical Systems Against Network Isolation Attacks
Dong-Hoon Shin (Arizona State University, USA); Jinkyu Koo (Purdue University, USA); Lei Yang (Arizona State University, USA); Xiaojun Lin (Purdue University, USA); Saurabh Bagchi (Purdue University, USA); Junshan Zhang (Arizona State University, USA)
- Secure and Constant Cost Public Cloud Storage Auditing with Deduplication
Jiawei Yuan (University of Arkansas at Little Rock, USA); Shucheng Yu (University of Arkansas at Little Rock, USA)
- T -dominance: Prioritized Defense Deployment for BYOD Security
Wei Peng (Indiana University-Purdue University Indianapolis, USA); Feng Li (Indiana University-Purdue University Indianapolis, USA); Keesook J Han (Air Force Research Laboratory, USA); Xukai Zou (School of Science, Purdue University-Indianapolis, USA); Jie Wu (Temple University, USA)
- A Cooperative Botnet Profiling and Detection in Virtualized Environment
Shun-Wen Hsiao (Academia Sinica, Taiwan); Yi-Ning Chen (National Taiwan University, Taiwan); Yeali S. Sun (National Taiwan University, Taiwan); Meng Chang Chen (Academia Sinica, Taiwan)
- Secure Pervasive Social Networking based on Multi-Dimensional Trust Levels
Zheng Yan (Xidian University, P.R. China); Mingjun Wang (Xidian University, P.R. China); Valtteri Niemi (University of Turku, Finland); Raimo Kantola (Aalto University, Finland)
- A Vulnerability Study of Geographic Routing in Underwater Acoustic Networks
Michael Zuba (University of Connecticut, USA); Michael Fagan (University of Connecticut, USA); Jun-Hong Cui (University of Connecticut, USA); Zhijie Shi (University of Connecticut, USA)
- A Moving Target Defense Mechanism for MANETs Based on Identity Virtualization
Massimiliano Albanese (George Mason University, USA); Alessandra De Benedictis (University of Naples Federico II, Italy); Sushil Jajodia (George Mason University, USA); Kun Sun (George Mason University, USA)
- Privacy-preserving Revocable Content Sharing in Geosocial Networks
Linke Guo (University of Florida, USA); Chi Zhang (University of Science of Technology of China, USA); Yuguang Fang (University of Florida, USA)
- LISA: Location Information ScrAmbler for Privacy Protection on Smartphones
Zhigang Chen (University of Michigan, USA); Xin Hu (IBM Research, USA); Xiaoen Ju (University of Michigan, Ann Arbor, USA); Kang G. Shin (University of Michigan, USA)
- Dynamic Adaptive Anti-Jamming via Controlled Mobility
Xiaofan He (North Carolina State University, USA); Huaiyu Dai (NC State University, USA); Peng Ning (North Carolina State University, USA)
- NOMAD: Towards Non-Intrusive Moving-Target Defense against Web Bots
Shardul Vikram (Texas A&M University, USA); Chao Yang (Texas A&M University, USA); Guofei Gu (Texas A&M University, USA)
- Secure Hierarchical Virtual Private LAN Services for Provider Provisioned Networks
Madhusanka Liyanage (University of Oulu, Finland); Mika Ylianttila (University of Oulu, Finland); Andrei Gurtov (University of Oulu, Finland)
- Gangs of the Internet: Towards Automatic Discovery of Peer-to-Peer Communities
Liyun Li (Polytechnic Institute of NYU, USA); Suhas Mathur (AT&T Labs, USA); Baris Coskun (AT&T Labs, Security Research Center, USA)
- On the Secrecy Capacity of the Space-Division Multiplexed Fiber Optical Communication Systems
Kyle C Guan (Bell Labs, Alcatel-Lucent, USA); Peter Winzer (Lucent Technologies, USA); Emina Soljanin (Bell Labs, Alcatel - Lucent, USA); Antonia Tulino (Bell Labs, USA)
- PHY-Layer Authentication by Introducing Controlled Inter Symbol Interference
Vireshwar Kumar (Virginia Polytechnic Institute and State University, USA); Jung-Min Park (Virginia Polytechnic Institute and State University, USA); T. Charles Clancy (Virginia Tech, USA); Kaigui Bian (Peking University, P.R. China)
- Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming
Hongbo Liu (Stevens Institute of Technology, USA); Yingying Chen (Stevens Institute of Technology, USA); Mooi Choo Chuah (Lehigh University, USA); Jie Yang (Oakland University, USA)
- Efficient Codes for Limited View Adversarial Channels
Reihaneh Safavi-Naini (University of Calgary, Canada); Pengwei Wang (University of Calgary, Canada)
- Byzantine Robustness, Hierarchy, and Scalability
Radia Perlman (Intel Laboratories, USA); Charlie Kaufman (Microsoft, USA)
- Secure Cooperative Spectrum Sensing in Cognitive Radio Networks Using Interference Signatures
Seunghyun Choi (University of Michigan, USA); Kang G. Shin (University of Michigan, USA)
- A Viewable E-voting Scheme for Environments with Conflict of Interest
Huian Li (Purdue University Indianapolis, USA); Yan Sui (Purdue University Indianapolis, USA); Wei Peng (Indiana University-Purdue University Indianapolis, USA); Xukai Zou (School of Science, Purdue University-Indianapolis, USA); Feng Li (Indiana University-Purdue University Indianapolis, USA)
- Harvesting Unique Characteristics in Packet Sequences for Effective Application Classification
Zhenlong Yuan (Tsinghua University, P.R. China); Yibo Xue (Tsinghua university, P.R. China); Yingfei Dong (University of Hawaii, USA)
- A Game-Theoretic Approach for Defending Remote Operating System Fingerprinting
Mohammad Ashiqur Rahman (University of North Carolina at Charlotte, USA); Mohammad Hossein Manshaei (EPFL, Switzerland); Ehab Al-Shaer (University of North Carolina Charlotte, USA)
- Sketch-based Multidimensional IDS: a New Approach for Network Anomaly Detection
Christian Callegari (University of Pisa, Italy); Alessandro Casella (University of Pisa, Italy); Stefano Giordano (University of Pisa, Italy); Michele Pagano (University of Pisa, Italy); Teresa Pepe (University of Pisa, Italy)
- Competing Mobile Network Game: Embracing Antijamming and Jamming Strategies
Youngjune L Gwon (Harvard University, USA); Siamak Dastangoo (MIT Lincoln Lab, USA); Carl E. Fossa (MIT Lincoln Laboratory, USA); Ht Kung (Harvard University, USA)
- A Lightweight Argument System with Efficient Verifier
Gang Xu (Iowa State University, USA); George T Amariucai (Iowa State University, USA); Yong Guan (Iowa State University, USA)
- Identifying High-Cardinality Hosts from Network-wide Traffic Measurements
Yang Liu (Iowa State University, USA); Wenji Chen (Iowa State University, USA); Yong Guan (Iowa State University, USA)
- CloudSafe: Securing Data Processing within Vulnerable Virtualization Environment in Cloud
Huijun Xiong (Virginia Tech, USA); Qingji Zheng (University of Texas at San Antonio, USA); Xinwen Zhang (Huawei, USA); Danfeng Yao (Virginia Tech, USA)
- Efficient Random Route Mutation Considering Flow and Network Constraints
Qi Duan (University of North Carolina at Charlotte, USA); Ehab Al-Shaer (University of North Carolina Charlotte, USA); Jafar Haadi Jafarian (CyberDNA, UNC Charlotte, USA)
- A Passive Technique for Fingerprinting Wireless Devices with Wired-side Observations
Selcuk Uluagac (Georgia Institute of Technology, USA); Sakthi Vignesh Radhakrishnan (Georgia Institute of Technology, USA); Cherita L Corbett (Johns Hopkins University Applied Physics Lab, USA); Antony Baca (JHUAPL, USA); Raheem Beyah (Georgia Institute of Technology, USA)
- Leveraging the Crowds to Disrupt Phishing
Jason Gustafson (University of Oregon, USA); Jun Li (University of Oregon, USA)
|
|
|