掌桥科研
一站式科研服务平台
科技查新
收录引用
专题文献检索
外文数据库(机构版)
更多产品
首页
成为会员
我要充值
退出
我的积分:
中文会员
开通
中文文献批量获取
外文会员
开通
外文文献批量获取
我的订单
会员中心
我的包量
我的余额
登录/注册
文献导航
中文期刊
>
中文会议
>
中文学位
>
中国专利
>
外文期刊
>
外文会议
>
外文学位
>
外国专利
>
外文OA文献
>
外文科技报告
>
中文图书
>
外文图书
>
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
美国国防部AD报告
美国能源部DE报告
美国航空航天局NASA报告
美国商务部PB报告
外军国防科技报告
美国国防部
美国参联会主席指示
美国海军
美国空军
美国陆军
美国海军陆战队
美国国防技术信息中心(DTIC)
美军标
美国航空航天局(NASA)
战略与国际研究中心
美国国土安全数字图书馆
美国科学研究出版社
兰德公司
美国政府问责局
香港科技大学图书馆
美国海军研究生院图书馆
OALIB数据库
在线学术档案数据库
数字空间系统
剑桥大学机构知识库
欧洲核子研究中心机构库
美国密西根大学论文库
美国政府出版局(GPO)
加利福尼亚大学数字图书馆
美国国家学术出版社
美国国防大学出版社
美国能源部文献库
美国国防高级研究计划局
美国陆军协会
美国陆军研究实验室
英国空军
美国国家科学基金会
美国战略与国际研究中心-导弹威胁网
美国科学与国际安全研究所
法国国际关系战略研究院
法国国际关系研究所
国际宇航联合会
美国防务日报
国会研究处
美国海运司令部
北约
盟军快速反应部队
北约浅水行动卓越中心
北约盟军地面部队司令部
北约通信信息局
北约稳定政策卓越中心
美国国会研究服务处
美国国防预算办公室
美国陆军技术手册
一般OA
科技期刊论文
科技会议论文
图书
科技报告
科技专著
标准
其它
美国卫生研究院文献
分子生物学
神经科学
药学
外科
临床神经病学
肿瘤学
细胞生物学
遗传学
公共卫生&环境&职业病
应用微生物学
全科医学
免疫学
动物学
精神病学
兽医学
心血管
放射&核医学&医学影像学
儿科
医学进展
微生物学
护理学
生物学
牙科&口腔外科
毒理学
生理学
医院管理
妇产科学
病理学
生化技术
胃肠&肝脏病学
运动科学
心理学
营养学
血液学
泌尿科学&肾病学
生物医学工程
感染病
生物物理学
矫形
外周血管病
药物化学
皮肤病学
康复学
眼科学
行为科学
呼吸学
进化生物学
老年医学
耳鼻喉科学
发育生物学
寄生虫学
病毒学
医学实验室检查技术
生殖生物学
风湿病学
麻醉学
危重病护理
生物材料
移植
医学情报
其他学科
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
主题
主题
题名
作者
关键词
摘要
高级搜索 >
外文期刊
外文会议
外文学位
外国专利
外文图书
外文OA文献
中文期刊
中文会议
中文学位
中国专利
中文图书
外文科技报告
清除
历史搜索
清空历史
首页
>
外文会议
>
IEEE Conference on Communications and Network Security
IEEE Conference on Communications and Network Security
召开年:
2014
召开地:
San Francisco, CA(US)
出版时间:
-
会议文集:
-
会议论文
热门论文
全部论文
全选(
0
)
清除
导出
1.
Dynamic Proofs of Retrievability with improved worst case overhead
机译:
具有改进的最坏情况下的可检索性的动态证明
作者:
Xiaoqi Yu
;
Nairen Cao
;
Jun Zhang
;
Siu-Ming Yiu
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
Servers;
Databases;
Security;
Protocols;
Binary trees;
Bandwidth;
Conferences;
2.
Secure distributed estimation of linear systems
机译:
安全分布式估计线性系统
作者:
Moritz Wiese
;
Tobias J. Oechtering
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
Security;
Estimation error;
Reliability;
Conferences;
Trajectory;
Communication networks;
3.
Inducing data loss in Zigbee networks via join/association handshake spoofing
机译:
通过加入/关联握手欺骗诱导ZigBee网络中的数据丢失
作者:
Spencer Michaels
;
Kemal Akkaya
;
A. Selcuk Uluagac
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
ZigBee;
Cryptography;
Computer crime;
Authentication;
Conferences;
Protocols;
4.
On secure communication over the Z-Channel
机译:
在Z频道上的安全通信
作者:
Abdallah Fayed
;
Tamer Khattab
;
Lifeng Lai
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
Decoding;
Conferences;
Communication system security;
Artificial neural networks;
Security;
Communication networks;
Wireless communication;
5.
Covert bits through queues
机译:
通过队列隐藏起来
作者:
Pritam Mukherjee
;
Sennur Ulukus
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
Timing;
Conferences;
Queueing analysis;
Memoryless systems;
Security;
Receivers;
Manganese;
6.
Authenticated side channel via physical layer fingerprinting
机译:
通过物理层指纹识别认证的侧通道
作者:
Paul L. Yu
;
Jake B. Perazzone
;
Brian M. Sadler
;
Rick S. Blum
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
Receivers;
Authentication;
Random variables;
Transmitters;
Conferences;
Physical layer;
7.
TwinCloud: Secure cloud sharing without explicit key management
机译:
TwinCloud:无明确密钥管理的安全云共享
作者:
Kemal Bicakci
;
Davut Deniz Yavuz
;
Sezin Gurkan
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
Cloud computing;
Encryption;
Google;
Servers;
Authentication;
8.
Multiple key generation with restricted public discussion structure
机译:
具有限制公共讨论结构的多个关键一代
作者:
Wenwen Tu
;
Mario Goldenbaum
;
Lifeng Lai
;
H. Vincent Poor
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
Security;
Indexes;
9.
A correlation-based subspace analysis for data confidentiality and classification as utility in CPS
机译:
基于相关的子空间分析,用于数据机密性和分类作为CPS的效用
作者:
Shan Suthaharan
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
Correlation;
Iris;
Data privacy;
Data models;
Security;
Interference;
Conferences;
10.
Detection of false data injection attacks in smart grid under colored Gaussian noise
机译:
智能电网下彩色高斯噪声下的假数据注射攻击检测
作者:
Bo Tang
;
Jun Yan
;
Steven Kay
;
Haibo He
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
State estimation;
Gaussian noise;
Detectors;
Noise measurement;
Power measurement;
Smart grids;
11.
SignatureMiner: A Fast Anti-Virus Signature Intelligence Tool
机译:
Signatureminer:一个快速的防病毒签名智能工具
作者:
Ignacio Martín
;
José Alberto Hernández
;
Sergio de los Santos
会议名称:
《IEEE Conference on Communications and Network Security》
|
2018年
关键词:
Malware;
Security;
Labeling;
Tools;
Conferences;
Engines;
Data mining;
12.
Secret Dispersion: Secure Data Delivery in Cyber Physical System
机译:
秘密色散:安全数据交付在网络物理系统中
作者:
Rui Hu
;
Yanmin Gong
会议名称:
《IEEE Conference on Communications and Network Security》
|
2018年
关键词:
Routing;
Conferences;
Eavesdropping;
Cryptography;
Linear programming;
Communication networks;
13.
DOPA: Detecting Open Ports in Android OS
机译:
DOPA:检测Android OS中的打开端口
作者:
Ali Alshehri
;
Hani Alshahrani
;
Abdulrahman Alzahrani
;
Raed Alharthi
;
Huirong Fu
;
Anyi Liu
;
Ye Zhu
会议名称:
《IEEE Conference on Communications and Network Security》
|
2018年
关键词:
Smart phones;
Androids;
Humanoid robots;
Security;
Tools;
IP networks;
Conferences;
14.
Support Vector Machine Detection of Data Framing Attack in Smart Grid
机译:
支持矢量机器检测智能电网中的数据框架攻击
作者:
Wang Jiao
;
Victor O. K. Li
会议名称:
《IEEE Conference on Communications and Network Security》
|
2018年
关键词:
Meters;
Transmission line measurements;
Support vector machines;
State estimation;
Power measurement;
Smart grids;
Security;
15.
Integrity of Integrated Navigation Systems
机译:
集成导航系统的完整性
作者:
Mass Soldal Lund
;
J?rgen Emil Gulland
;
Odd Sveinung Hareide
;
?yvind J?sok
;
Karl Olav Carlsson Weum
会议名称:
《IEEE Conference on Communications and Network Security》
|
2018年
关键词:
Navigation;
Workstations;
Software;
Radar;
Marine vehicles;
Internet;
Bridges;
16.
An Approach for Predicting the Popularity of Online Security News Articles
机译:
一种预测在线安全新闻文章的普及的方法
作者:
Junli Kong
;
Baocang Wang
;
Caiyun Liu
;
Gaofei Wu
会议名称:
《IEEE Conference on Communications and Network Security》
|
2018年
关键词:
Feature extraction;
Security;
Logic gates;
Metadata;
Social network services;
Predictive models;
Organizations;
17.
Spoofing Attack Detection in Mm-Wave and Massive MIMO 5G Communication
机译:
MM波欺骗攻击检测和大规模的MIMO 5G通信
作者:
Ning Wang
;
Jie Tang
;
Kai Zeng
会议名称:
《IEEE Conference on Communications and Network Security》
|
2019年
18.
Secret Key and Private Key Capacities Over an Unauthenticated Public Channel
机译:
在未经身份验证的公共频道上秘密关键和私钥容量
作者:
Wenwen Tu
;
Lifeng Lai
会议名称:
《IEEE Conference on Communications and Network Security》
|
2019年
关键词:
Public discussion;
private key;
simulatability condition;
secret key;
unauthenticated channel;
19.
Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks
机译:
基于CNN的恶意软件家庭分类方法对各种对抗攻击的鲁棒性分析
作者:
Seok-Hwan Choi
;
Jin-Myeong Shin
;
Peng Liu
;
Yoon-Ho Choi
会议名称:
《IEEE Conference on Communications and Network Security》
|
2019年
关键词:
convolutional neural nets;
image classification;
image colour analysis;
invasive software;
20.
Preserving Location Privacy in Cyber-Physical Systems
机译:
在网络物理系统中保留位置隐私
作者:
Ismail Butun
;
Patrik ?sterberg
;
Mikael Gidlund
会议名称:
《IEEE Conference on Communications and Network Security》
|
2019年
关键词:
cyber-physical systems;
data privacy;
Internet of Things;
location based services;
mobile computing;
21.
Analyzing deviant behaviors on social media using cyber forensics-based methodologies
机译:
基于Cyber取证的方法分析社交媒体的偏差行为
作者:
Brandon Dalton
;
Nitin Agarwal
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
Blogs;
Social network services;
Forensics;
IP networks;
Terrorism;
Geology;
22.
SBPA: Social behavior based cross Social Network phishing attacks
机译:
SBPA:基于社会行为的交叉社交网络网络钓鱼攻击
作者:
Yifan Tian
;
Jiawei Yuan
;
Shucheng Yu
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
Couplings;
LinkedIn;
Facebook;
Twitter;
Electronic mail;
Privacy;
23.
WHAP: Web-hacking profiling using Case-Based Reasoning
机译:
whatsapp:使用基于案例的推理的网络 - 黑客分析
作者:
Mee Lan Han
;
Hee Chan Han
;
Ah Reum Kang
;
Byung Il Kwak
;
Aziz Mohaisen
;
Huy Kang Kim
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
Computer crime;
Cognition;
Computer hacking;
Encoding;
Entertainment industry;
IP networks;
24.
Towards sequencing malicious system calls
机译:
朝着测序恶意系统调用
作者:
Pooria Madani
;
Natalija Vlajic
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
Malware;
Conferences;
Computers;
Data mining;
Bioinformatics;
Security;
25.
Detecting and thwarting hardware trojan attacks in cyber-physical systems
机译:
检测和挫败网络物理系统中的硬件特洛伊木马攻击
作者:
Vivek Venugopalan
;
Cameron D. Patterson
;
Devu Manikantan Shila
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
Security;
IP networks;
Hardware;
Trojan horses;
Measurement;
Field programmable gate arrays;
26.
Attacking supercomputers through targeted alteration of environmental control: A data driven case study
机译:
通过有针对性的环境控制改变攻击超级计算机:数据驱动案例研究
作者:
Keywhan Chung
;
Valerio Formicola
;
Zbigniew T. Kalbarczyk
;
Ravishankar K. Iyer
;
Alexander Withers
;
Adam J. Slagell
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
Cooling;
Valves;
Temperature measurement;
Security;
Water resources;
Supercomputers;
Conferences;
27.
GPS spoofing attack characterization and detection in smart grids
机译:
智能电网的GPS欺骗攻击特征和检测
作者:
Parth Pradhan
;
Kyatsandra Nagananda
;
Parv Venkitasubramaniam
;
Shalinee Kishore
;
Rick S. Blum
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
Phasor measurement units;
Global Positioning System;
Covariance matrices;
Security;
Power system dynamics;
Time measurement;
Generators;
28.
Strong secrecy on a class of Degraded Broadcast Channels using polar codes
机译:
使用极性代码的一类退化广播渠道的强秘密
作者:
Jaume del Olmo
;
Javier Rodríguez Fonollosa
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
Encoding;
Receivers;
Decoding;
Transforms;
Conferences;
Markov processes;
Random variables;
29.
CryptoImg: Privacy preserving processing over encrypted images
机译:
cryptoimg:通过加密图像保留处理
作者:
M. Tarek Ibn Ziad
;
Amr Alanwar
;
Moustafa Alzantot
;
Mani Srivastava
会议名称:
《IEEE Conference on Communications and Network Security》
|
2016年
关键词:
Cryptography;
Servers;
Privacy;
Image edge detection;
Cloud computing;
30.
An ISO/IEC 15408-2 Compliant Security Auditing System with Blockchain Technology
机译:
具有区块链技术的ISO / IEC 15408-2兼容的安全审计系统
作者:
Shi-Cho Cha
;
Kuo-Hui Yeh
会议名称:
《IEEE Conference on Communications and Network Security》
|
2018年
关键词:
ISO Standards;
IEC Standards;
Robustness;
Memory;
Internet of Things;
31.
CNS 2018 Committees
机译:
CNS 2018委员会
会议名称:
《IEEE Conference on Communications and Network Security》
|
2018年
32.
Fine-grained Android Malware Detection based on Deep Learning
机译:
基于深度学习的精细粒度的Android恶意软件检测
作者:
Dongfang Li
;
Zhaoguo Wang
;
Yibo Xue
会议名称:
《IEEE Conference on Communications and Network Security》
|
2018年
关键词:
Malware;
Biological neural networks;
Androids;
Humanoid robots;
Security;
Smart phones;
Neurons;
33.
T-PAAD: Trajectory Privacy Attack on Autonomous Driving
机译:
T-Paad:自动驾驶的轨迹隐私攻击
作者:
Abdelnasser Banihani
;
Abdulrahman Alzahrani
;
Raed Alharthi
;
Huirong Fu
;
George P. Corser
会议名称:
《IEEE Conference on Communications and Network Security》
|
2018年
关键词:
Trajectory;
Privacy;
Autonomous vehicles;
Correlation;
Servers;
Security;
34.
Fighting Fake News Propagation with Blockchains
机译:
用块状挥动假新闻传播
作者:
Muhammad Saad
;
Ashar Ahmad
;
Aziz Mohaisen
会议名称:
《IEEE Conference on Communications and Network Security》
|
2019年
关键词:
cryptocurrencies;
distributed databases;
Internet;
social networking (online);
35.
Privacy and Linkability of Mining in Zcash
机译:
采矿在Zcash中的隐私和胶结性
作者:
Alex Biryukov
;
Daniel Feher
会议名称:
《IEEE Conference on Communications and Network Security》
|
2019年
关键词:
blockchain;
cryptocurrency;
privacy;
linkability;
Zcash;
mining;
36.
CNS 2018 Welcome Page
机译:
CNS 2018欢迎页面
会议名称:
《IEEE Conference on Communications and Network Security》
|
2018年
37.
A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network
机译:
黑洞攻击移动adhoc网络的研究与仿真研究
作者:
Guoquan Li
;
Zheng Yan
;
Yulong Fu
会议名称:
《IEEE Conference on Communications and Network Security》
|
2018年
关键词:
Routing protocols;
Mobile ad hoc networks;
Security;
Routing;
Throughput;
Loss measurement;
38.
CNS 2018 Sponsors
机译:
CNS 2018 赞助商
会议名称:
《IEEE Conference on Communications and Network Security》
|
2018年
39.
Location privacy for a quality of access to mobile Internet monitoring system
机译:
位置隐私,以获得移动互联网监控系统的质量
作者:
Font Giselle
;
Bustos Javier
;
Blasco Sebastian
;
Hevia Alejandro
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
Internet;
authorisation;
cryptography;
data privacy;
mobile radio;
smart phones;
telecommunication security;
Adkintun mobile;
decryption;
homomorphic encryption;
location privacy;
mobile Internet monitoring system;
smart-phones;
Antennas;
Computational modeling;
Encryption;
Libraries;
Mobile communication;
Privacy;
40.
Approaches for vehicle cyber security
机译:
车辆网络安全方法
作者:
Onishi Hiro
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
road vehicles;
security of data;
smart phones;
smart phone;
vehicle cyber risks;
vehicle cyber security;
Computer security;
Guidelines;
Safety;
Smart phones;
Software;
Vehicles;
connectivity between vehicle and smart phone;
vehicle cyber risk analysis;
vehicle cyber security;
41.
Physical Layer Assist Mutual Authentication scheme for smart meter system
机译:
物理层辅助智能仪表系统的相互认证方案
作者:
Ting Ma
;
Yixin Jiang
;
Hong Wen
;
Bin Wu
;
Xiaobin Guo
;
Zhen Chen
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
message authentication;
power system security;
public key cryptography;
smart meters;
smart power grids;
PKI PLAMA scheme;
mutual message authentication scheme;
physical layer assist mutual authentication scheme;
public key infrastructure;
smart grid;
two-way communication smart meter system;
Authentication;
Channel estimation;
Message authentication;
Physical layer;
Receivers;
Smart grids;
Smart meters;
Mutual Authentication;
Physical Layer;
Smart Meter;
42.
Demonstrated LLC-layer attack and defense strategies for wireless communication systems
机译:
显示无线通信系统的LLC层攻击和防御策略
作者:
Hitefield S.
;
Nguyen Victor
;
Carlson C.
;
OShea T.
;
Clancy T.
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
Linux;
OFDM modulation;
modems;
open systems;
operating system kernels;
protocols;
radio networks;
signal processing;
software radio;
telecommunication security;
GNU radio tunnel;
LLC-layer attack;
Linux kernel network stack;
OFDM;
OSI stack;
buffer overflow attack;
communication system protection;
continuous wave;
duplex modem implementation;
link layer framing protocol;
malicious activity detection;
physical layer;
signal processing code implemention;
universal software radio peripheral;
wireless communication system;
OFDM;
Payloads;
Protocols;
Receivers;
Security;
Software;
Wireless communication;
43.
Exploiting altruism in social networks for friend-to-friend malware detection
机译:
在社交网络中利用利他主义,为朋友到朋友的恶意软件检测
作者:
Probst Matthew J.
;
Jun Cheol Park
;
Kasera Sneha Kumar
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
invasive software;
social networking (online);
SocialScan;
f2f malware scanning services;
friend-to-friend malware detection;
social network altruism;
Conferences;
Cultural differences;
Malware;
Peer-to-peer computing;
Privacy;
Social network services;
44.
Mitigating Eclipse attacks in Peer-To-Peer networks
机译:
缓解点对点网络中的Eclipse攻击
作者:
Germanus Daniel
;
Roos Stefanie
;
Strufe Thorsten
;
Suri Neeraj
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
fault tolerance;
peer-to-peer computing;
protocols;
security of data;
table lookup;
Eclipse attacks mitigation;
P2P protocols usage;
denial of service attacks;
deterministic lookup;
eclipse benign peers;
generic susceptibility;
inherent fault tolerance;
large-scale decentralized coordination;
lookup mechanism;
lookup success;
malicious peers;
peer-to-peer networks;
predictability;
randomized decisions;
security threats;
structured P2P protocols;
topology-aware localized Eclipse attacks;
Communication networks;
Payloads;
Peer-to-peer computing;
Protocols;
Routing;
Search problems;
Security;
Distributed Hash Table;
Localized Eclipse Attack;
Mitigation;
Peer-to-Peer Protocol;
Security;
45.
Bandwidth scanning involving a Bayesian approach to adapting the belief of an adversary's presence
机译:
带宽扫描涉及贝叶斯方向来调整对抗对手的存在
作者:
Garnaev Andrey
;
Trappe Wade
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
Bayes methods;
game theory;
object detection;
radio spectrum management;
telecommunication security;
Bayesian approach;
anomalous signals;
anomaly detection procedure;
bandwidth scanning algorithm design;
equilibrium strategy;
game theoretical model;
malicious adversary presence belief;
malicious threat presence detection;
single scan;
spectrum scanning system engineer;
spectrum sharing system security;
Bandwidth;
Bayes methods;
Communication networks;
Conferences;
Games;
Security;
Silicon;
46.
Reroute on loop in anonymous peer-to-peer content sharing networks
机译:
REROUTE在匿名点对点内容共享网络中的循环
作者:
Guanyu Tian
;
Zhenhai Duan
;
Baumeister Todd
;
Yingfei Dong
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
peer-to-peer computing;
small-world networks;
telecommunication network routing;
telecommunication network topology;
Freenet;
GNUnet;
Thynix simulator;
anonymous peer-to-peer content sharing networks;
apCSNs;
average routing path lengths;
message forwarding information;
network topologies;
random topologies;
reroute-on-loop;
routing loop detection;
routing loop handling;
small-world topologies;
user anonymity;
Communication networks;
Conferences;
Network topology;
Peer-to-peer computing;
Routing;
Routing protocols;
Security;
47.
Integrity for distributed queries
机译:
分布式查询的完整性
作者:
De Capitani di Vimercati Sabrina
;
Foresti Sara
;
Jajodia Sushil
;
Livraga Giovanni
;
Paraboschi Stefano
;
Samarati Pierangela
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
cloud computing;
parallel programming;
query processing;
trusted computing;
MapReduce scenario;
computational cloud;
data confidentiality;
distributed query integrity;
join queries;
Communication networks;
Conferences;
Distribution strategy;
Encryption;
Servers;
Cloud;
Distributed queries;
Integrity;
MapReduce;
48.
The drunk motorcyclist protocol for anonymous communication
机译:
醉酒的托运单车司机协议匿名通信
作者:
Young Adam L.
;
Yung Moti
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
Internet;
computer network security;
cryptographic protocols;
electronic messaging;
motorcycles;
telecommunication traffic;
DDH;
DM protocol;
Decision Diffie-Hellman;
Internet privacy;
Taxis protocol;
anonymous communication protocol;
ciphertext;
complete graph;
cryptosystem;
drunk motorcyclist protocol;
expander graph;
fault tolerance properties;
key privacy;
provably secure connectionless anonymous messaging protocol;
reduced-seat bus protocol cryptanalyzation;
time-to-live values;
traffic concealment pattern;
Encryption;
Generators;
Protocols;
Public key;
Receivers;
49.
NEAT: A NEighbor AssisTed spectrum decision protocol for resilience against PUEA
机译:
整洁:邻居辅助频谱决策协议,用于对PUEA的弹性
作者:
Zituo Jin
;
Morgan J.P.
;
Anand Sruthy
;
Subbalakshmi K.P.
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
cognitive radio;
probability;
protocols;
radio spectrum management;
telecommunication security;
Byzantine attacks;
DSA networks;
NEAT;
PUEA;
SUs;
centralized controller;
centralized protocol;
cognitive radio;
denial-of-service attack;
distributed spectrum decision protocol;
dynamic spectrum access networks;
legitimate secondary users;
neighbor assisted spectrum decision protocol;
primary transmitter;
primary user emulation attacks;
probability;
Conferences;
Protocols;
Radio transmitters;
Security;
Sensors;
TV;
Byzantine attack;
Dynamic spectrum access;
primary user emulation;
spectrum decision protocol;
50.
A tunable proof of ownership scheme for deduplication using Bloom filters
机译:
使用绽放过滤器的重复数据删除的可调节所有权方案证明
作者:
Blasco J.
;
Di Pietro Roberto
;
Orfila Alejandro
;
Sorniotti A.
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
data structures;
security of data;
theorem proving;
bloom filters;
consumer-grade storage services;
deduplication;
malicious user;
security weaknesses;
thorough security analysis;
tunable proof of ownership scheme;
Bandwidth;
Cloud computing;
Indexes;
Memory management;
Proposals;
Security;
Servers;
51.
LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks
机译:
Lapwin:位置辅助保护Wi-Fi网络中的用户隐私的探讨
作者:
Yu Seung Kim
;
Yuan Tian
;
Nguyen Le T.
;
Tague Patrick
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
computer network security;
data protection;
wireless LAN;
APs;
LAPWiN;
Wi-Fi access points;
Wi-Fi clients;
eavesdropper;
location-aided Wi-Fi probing mechanisms;
network connection time;
network manager;
performance evaluation;
privacy risk reduction;
user privacy protection;
Context;
IEEE 802.11 Standards;
Privacy;
Probes;
Security;
Testing;
Wireless communication;
52.
Two-tier data-driven intrusion detection for automatic generation control in smart grid
机译:
智能电网中自动生成控制的双层数据驱动入侵检测
作者:
Ali Muhammad Qasim
;
Yousefian Reza
;
Al-Shaer Ehab
;
Kamalasadan Sukumar
;
Quanyan Zhu
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
power engineering computing;
power system control;
security of data;
smart power grids;
ACE;
AGC;
Markov models;
area control error;
automatic generation control;
data-driven two-tier intrusion detection system;
legacy energy infrastructures;
short-term adaptive predictor;
smart grid;
Automatic generation control;
Correlation;
Intrusion detection;
Markov processes;
Mathematical model;
Prediction algorithms;
Smart grids;
53.
Self-healing wireless networks under insider jamming attacks
机译:
Insider干扰攻击下的自我修复无线网络
作者:
Longquan Li
;
Sencun Zhu
;
Torrieri Don
;
Jajodia Sushil
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
data communication;
jamming;
protocols;
radio networks;
telecommunication security;
GNURadio;
USRP device;
data communication;
jammer identification;
jammer isolation;
jammer localization;
jamming attack;
key management;
protocol;
self-healing wireless network;
Jamming;
Protocols;
Relays;
Reliability;
Security;
Switches;
Wireless networks;
Insider Jamming Attacks;
Jammer Identification;
Node Revocation;
Self-healing;
Wireless Networks;
54.
Accurate rogue access point localization leveraging fine-grained channel information
机译:
准确的流氓接入点定位利用细粒度的渠道信息
作者:
Xiuyuan Zheng
;
Chen Wang
;
Yingying Chen
;
Jie Yang
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
directive antennas;
wireless LAN;
RSS;
WLAN;
Wi-Fi devices;
channel state information;
directional antenna;
fine-grained channel information;
position estimation;
received signal strength;
rogue access point localization;
shadowing effects;
wireless sniffers;
Communication system security;
Correlation;
Delay effects;
Estimation;
IEEE 802.11 Standards;
Time-domain analysis;
Wireless communication;
55.
Uncooperative localization improves attack performance in Underwater Acoustic Networks
机译:
不合作的本地化提高了水下声学网络中的攻击性能
作者:
Xiaoyan Lu
;
Zuba Michael
;
Jun-Hong Cui
;
Zhijie Shi
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
autonomous underwater vehicles;
routing protocols;
telecommunication network topology;
telecommunication security;
underwater acoustic communication;
AUVs;
Aqua-Sim approach;
UANs;
attack performance;
autonomous underwater vehicles;
broadcast pattern monitoring;
geographic information;
geographic routing protocols;
jamming;
mobile attacker;
network topology;
security attacks;
uncooperative localization;
underwater acoustic networks;
Artificial neural networks;
Irrigation;
Logic gates;
Mobile communication;
Monitoring;
Localization;
Network Discovery;
Security;
Underwater Acoustic Networks;
56.
An evasion and counter-evasion study in malicious websites detection
机译:
恶意网站检测中的逃避和反逃避研究
作者:
Li Xu
;
Zhenxin Zhan
;
Shouhuai Xu
;
Keying Ye
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
Web sites;
decision trees;
learning (artificial intelligence);
security of data;
Web site classification;
adaptive attacker;
counter-evasion defense mechanism;
counter-evasion interactions;
counter-evasion study;
cyber attack;
cyber defense task;
decision tree;
machine learning;
malicious Web site detection;
malicious Web sites detection;
Adaptation models;
Feature extraction;
Machine learning algorithms;
Security;
Semantics;
Training;
Vectors;
Malicious websites;
adaptive attacks;
dynamic analysis;
evasion;
proactive training;
static analysis;
57.
Multi-trapdoor hash functions and their applications in network security
机译:
多陷阱哈希函数及其在网络安全中的应用
作者:
Chandrasekhar S.
;
Singhal Manav
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
authorisation;
computer network security;
cryptography;
digital signatures;
aggregate signatures;
conventional trapdoor hash functions;
discrete log-based instantiation;
key exposure free trapdoor hash function;
multiple participants;
multiple sanitizers;
multiple trapdoors;
multitrapdoor hash functions;
multitrapdoor hashing scheme;
network security;
potential applications;
sanitizable signatures;
security schemes;
Aggregates;
Authentication;
Communication networks;
Conferences;
Cryptography;
Resistance;
Trapdoor hash functions;
aggregate signatures;
key-exposure free;
sanitizable signatures;
58.
Location spoofing attack and its countermeasures in database-driven cognitive radio networks
机译:
数据库驱动认知无线电网络中的位置欺骗攻击及其对策
作者:
Kexiong Zeng
;
Ramesh Sreeraksha Kondaji
;
Yaling Yang
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
Global Positioning System;
cellular radio;
cognitive radio;
computer network security;
radio networks;
wireless LAN;
GPS localization system;
GPS spoofing attack detection;
IEEE 802.11 packet;
SU;
TV band;
database-driven CRN;
database-driven cognitive radio network;
location spoofing attack countermeasure;
secondary user;
small cell network;
white space network;
Frequency modulation;
Global Positioning System;
IEEE 802.11 Standards;
Interference;
Receivers;
Security;
TV;
59.
Towards effective feature selection in machine learning-based botnet detection approaches
机译:
基于机器学习的僵尸网络检测方法的有效特征选择
作者:
Beigi Elaheh Biglar
;
Jazi Hossein Hadian
;
Stakhanova Natalia
;
Ghorbani Ali /A/.
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
invasive software;
learning (artificial intelligence);
botnet detection;
botnet traffic;
cyber security threat;
feature selection;
flow-based feature;
machine learning;
Accuracy;
Feature extraction;
IP networks;
Peer-to-peer computing;
Ports (Computers);
Protocols;
Security;
60.
Modelling IP darkspace traffic by means of clustering techniques
机译:
通过聚类技术建模IP Darkspace流量
作者:
Iglesias Felix
;
Zseby Tanja
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
IP networks;
computer network security;
pattern clustering;
IP darkspace addresses;
IP darkspace sources;
attack preparation activities;
clustering techniques;
darkspace traffic;
Algorithm design and analysis;
Clustering algorithms;
Feature extraction;
IP networks;
Ports (Computers);
Security;
Vectors;
61.
TouchIn: Sightless two-factor authentication on multi-touch mobile devices
机译:
TouchIn:多触摸移动设备上的无视距双因素身份验证
作者:
Jingchao Sun
;
Rui Zhang
;
Jinxue Zhang
;
Yanchao Zhang
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
mobile handsets;
telecommunication security;
Android devices;
TouchIn;
geometric properties;
mobile authentication techniques;
multitouch mobile devices;
physiological characteristics;
shoulder-surfing;
sightless two-factor authentication;
smudge attacks;
two-factor authentication system;
Authentication;
Feature extraction;
Geometry;
Mobile communication;
Mobile handsets;
Shape;
62.
Analyzing the dangers posed by Chrome extensions
机译:
分析Chrome延伸构成的危险
作者:
Bauer Lujo
;
Shaoying Cai
;
Limin Jia
;
Passaro Timothy
;
Yuan Tian
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
Web sites;
application program interfaces;
online front-ends;
security of data;
API;
Chrome extension;
Web browsers;
Web sites;
Web-based services;
danger analysis;
local file system;
low-level information;
network requests;
third-party add-ons;
Browsers;
Communication networks;
Conferences;
History;
Security;
Web pages;
63.
NRE: Suppress Selective Forwarding attacks in Wireless Sensor Networks
机译:
NRE:抑制无线传感器网络中的选择性转发攻击
作者:
Biru Cui
;
Yang Shanchieh Jay
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
telecommunication network reliability;
telecommunication network routing;
telecommunication security;
wireless sensor networks;
DDR;
NRE;
PageRank algorithm;
SF attacks;
WSN;
analytical model;
baseline collection tree protocol;
data delivery ratio;
data transmission integrity;
link quality;
node forwarding behavior;
parent node reliability estimation;
reactive routing scheme;
selective forwarding attack suppression;
volatile wireless environment;
wireless sensor networks;
Communication system security;
Protocols;
Reliability;
Routing;
Sensors;
Wireless communication;
Wireless sensor networks;
64.
Chatter: Classifying malware families using system event ordering
机译:
Chatter:使用System Event Ording对恶意软件系列进行分类
作者:
Mohaisen Aziz
;
West Andrew G.
;
Mankin Allison
;
Alrawi Omar
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
document handling;
invasive software;
pattern classification;
Chatter;
classifier predicting malware family;
file system;
fine granularity data points;
heuristics;
high level system events;
malware authors;
malware families classification;
malware identification;
n-gram document classification;
network events;
proof-of-concept evaluation;
registry interaction;
runtime execution artifacts;
security domain;
system event ordering;
Accuracy;
Decision trees;
Feature extraction;
Machine learning algorithms;
Malware;
Support vector machines;
65.
Enabling Trusted Data-intensive execution in cloud computing
机译:
在云计算中启用可信数据密集型执行
作者:
Ning Zhang
;
Wenjing Lou
;
Xuxian Jiang
;
Hou Y.T.
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
computer architecture;
cryptography;
data privacy;
firmware;
outsourcing;
IOMMU configuration lock;
TUDEC environment;
arbitrary data computations;
cloud computing;
cloud server;
cryptographic;
data privacy;
data security;
firmware;
interrupt rerouting;
secure computation outsourcing;
software-based attacks;
system architecture;
trusted data-intensive execution environment;
Hardware;
Registers;
Security;
Servers;
Virtual machine monitors;
Virtual machining;
Virtualization;
66.
Radio frequency fingerprinting and its challenges
机译:
射频指纹及其挑战
作者:
Rehman Saif Ur
;
Sowerby Kevin W.
;
Alam Shahinur
;
Ardekani Iman
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
data privacy;
radio networks;
telecommunication security;
RF fingerprinting;
biological fingerprint;
bit-level algorithmic approaches;
channel impairment effect;
low-cost portable mobile devices;
radio frequency fingerprinting;
wireless communication privacy;
wireless communication security;
wireless device;
Fading;
Performance evaluation;
Radio frequency;
Radio transmitters;
Receivers;
Wireless communication;
Physical Layer Security;
Radio Fingerprinting;
Radiometric signature;
USRP;
67.
Detecting anomalies in DNS protocol traces via Passive Testing and Process Mining
机译:
通过被动测试和过程挖掘检测DNS协议迹线中的异常
作者:
Saint-Pierre Cecilia
;
Cifuentes Francisco
;
Bustos-Jimenez Javier
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
Internet;
computer network security;
conformance testing;
data mining;
protocols;
DNS operation traces;
DNS protocol;
DNS traces;
RFC 1035;
anomaly detection;
conformance testing;
enterprise workflow analysis;
formal definition;
mail bonnet attack;
passive testing;
process mining;
software conformance checking;
structured activity;
Business;
Data mining;
Electronic mail;
Internet;
Protocols;
Servers;
Testing;
68.
P2P networks monitoring based on the social network analysis and the topological potential
机译:
基于社会网络分析和拓扑潜力的P2P网络监控
作者:
Mengyin Ren
;
Yixin Jiang
;
Xiaobin Guo
;
Qiyi Han
;
Hong Wen
;
Bin Wu
;
Zhen Chen
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
monitoring;
peer-to-peer computing;
security of data;
social networking (online);
P2P networks monitoring;
network structure;
peer-to-peer networks;
social network analysis;
topological potential;
Communities;
Entropy;
Monitoring;
Network topology;
Peer-to-peer computing;
Social network services;
Topology;
Community Dividing;
P2P;
Social network analysis;
Topological potential;
69.
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication
机译:
对多道路探测的无处不在的支持:防止人在互联网通信中攻击中的攻击
作者:
Braun Johannes
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
Internet;
digital signatures;
public key cryptography;
ubiquitous computing;
CA;
Internet communication;
MitM;
Web PKI;
Web public key infrastructure;
Web server authentication;
certification authorities;
digital certificates;
man in the middle attacks;
multipath probing;
ubiquitous support;
Browsers;
Privacy;
Public key;
Web servers;
70.
Measuring smart jammer strategy efficacy over the air
机译:
在空中测量智能干扰策略效率
作者:
Carlson C.
;
Nguyen Victor
;
Hitefield S.
;
OShea T.
;
Clancy T.
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
information theory;
jamming;
protocols;
software radio;
GNU Radio;
MAC layer;
PHY layer;
USRP;
Universal Software Radio Peripheral;
information theoretic communications;
jamming waveforms;
smart jammer strategy;
wireless communications protocols;
Conferences;
Jamming;
OFDM;
Phase shift keying;
Receivers;
Security;
Synchronization;
71.
Trust-based data fusion mechanism design in cognitive radio networks
机译:
认知无线电网络中基于信任的数据融合机制设计
作者:
Ji Wang
;
Ing-Ray Chen
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
cognitive radio;
cooperative communication;
game theory;
radio spectrum management;
sensor fusion;
telecommunication security;
PU;
cognitive radio network;
cooperative spectrum sensing;
fake detection parameter;
first-hand sensing;
malicious SU attack;
primary user;
second-hand sensing;
secondary user;
static game model;
trust-based data aggregation scheme;
trust-based data fusion mechanism;
Availability;
Cognitive radio;
Conferences;
Data integration;
Games;
Security;
Sensors;
Cognitive radio networks;
cooperative spectrum sensing;
mechanism design;
reputation;
security;
trust;
72.
Moving-target defense mechanisms against source-selective jamming attacks in tactical cognitive radio MANETs
机译:
移动目标防御机制反对战术认知无线电船员的源选择性干扰攻击
作者:
Marttinen Aleksi
;
Wyglinski Alexander M.
;
Jantti Riku
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
cognitive radio;
computer network security;
interference suppression;
jamming;
military communication;
mobile ad hoc networks;
probability;
telecommunication network reliability;
address manipulation;
flipped address mechanism;
moving target defense mechanism;
parameter selection;
probability;
random address assignment;
reliable communication;
seamless communication;
secure communication;
source MAC address;
source selective jammer block transmission;
source selective jamming attack combation;
tactical cognitive radio MANET;
Ad hoc networks;
Communication system security;
Delays;
Jamming;
Mobile computing;
Wireless communication;
73.
JADE: Jamming-averse routing on cognitive radio mesh networks
机译:
玉:在认知无线电网网络上的干扰厌恶路由
作者:
Yu Seung Kim
;
DeBruhl Bruce
;
Tague Patrick
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
cognitive radio;
decoding;
interference suppression;
jamming;
probability;
radio links;
radio spectrum management;
telecommunication network reliability;
telecommunication network routing;
telecommunication security;
wireless mesh networks;
CR;
JAD escorted;
JADE routing;
SINR detection;
SINR estimation;
cognitive radio mesh network;
energy expenditure reduction;
jamming resilient routing;
jamming-averse routing;
malicious player;
packet decoding;
path discovery probability;
path length;
radio chipset;
reactive jamming mitigation;
route discovery failure rate;
routing path discovery performance improvement;
signal-to-noise-interference ratio;
wireless link;
wireless network;
wireless spectrum sensing;
Interference;
Jamming;
Mesh networks;
Routing;
Routing protocols;
Signal to noise ratio;
Wireless communication;
74.
The Greenhouse Effect Attack
机译:
温室效应攻击
作者:
Marchetta Pietro
;
Persico Valerio
;
Pescape Antonio
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
computer network security;
DoS attack;
ICMP echo request packet;
ICMP flooding attack;
denial-of-service;
greenhouse effect attack;
Bandwidth;
Computer crime;
Greenhouse effect;
IP networks;
Internet;
Payloads;
Ports (Computers);
75.
Physical integrity check in wireless relay networks
机译:
无线中继网络的物理完整性检查
作者:
Sang Wu Kim
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
radio networks;
relay networks (telecommunication);
signal detection;
statistical testing;
computational complexity;
cryptographic technique;
data modification;
false data injection;
likelihood ratio test theory;
physical integrity check;
physical-layer signal;
physical-layer technique;
protocol overhead;
wireless relay networks;
Cryptography;
Fading;
Floors;
Relays;
Signal to noise ratio;
Vectors;
Wires;
76.
A MIMO cross-layer precoding security communication system
机译:
MIMO跨层预编码安全通信系统
作者:
Jie Tang
;
Huan Huan Song
;
Fei Pan
;
Hong Wen
;
Bin Wu
;
Yixin Jiang
;
Xiaobin Guo
;
Zhen Chen
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
MIMO communication;
cryptography;
precoding;
telecommunication security;
CSI;
MIMO cross-layer precoding secure communications;
MIMO cross-layer precoding security communication system;
eavesdropper's channel;
higher layer cryptography;
physical layer security system;
upper layer;
Bit error rate;
Educational institutions;
MIMO;
Modulation;
Physical layer;
Security;
MIMO;
physical layer security cross-layer security;
precoding;
random array;
77.
A multi-factor re-authentication framework with user privacy
机译:
具有用户隐私的多因素重新认证框架
作者:
Uluagac /A/. Selcuk
;
Wenyi Liu
;
Beyah Raheem
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
authorisation;
cryptography;
data privacy;
MFA system;
authentication factor;
knowledge factor;
possession factor;
privacy-preserving multifactor re-authentication framework;
ubiquitous computing system;
user privacy;
Authentication;
Cloud computing;
Educational institutions;
Encryption;
Privacy;
Servers;
Usability;
Fully Homomorphic Encryption;
Fuzzy Hashing;
Privacy-Preserving Reauthentication;
Re-authentication in Cloud;
78.
Application-layer DDoS in dynamic Web-domains: Building defenses against next-generation attack behavior
机译:
动态Web域中的应用层DDOS:对下一代攻击行为的建立防御
作者:
Stevanovic Dusan
;
Vlajic Natalija
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
computer network security;
data mining;
next generation networks;
application-layer DDoS attack protection;
application-layer DDoS defense;
concept drift;
data mining theory;
data streams;
dynamic Web-domains;
next-generation antiDDoS system;
next-generation attack behavior;
next-generation bot behavior;
static Web-domains;
Computer crime;
Data mining;
Data models;
IP networks;
Next generation networking;
Organizations;
Real-time systems;
application-layer DDoS;
data streams with concept drift;
dynamic web domain;
intrusion detection and defense;
79.
Practical and secure Machine-to-Machine data collection protocol in Smart Grid
机译:
智能电网中的实用和安全的机器到机器数据收集协议
作者:
Uludag Suleyman
;
King-Shan Lui
;
Wenyu Ren
;
Nahrstedt Klara
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
power system measurement;
protocols;
smart power grids;
Raspberry Pi devices;
hierarchical architecture;
machine-to-machine data collection protocol;
resource-constrained measurement device;
scalable M2M data collection protocol;
smart grid;
DH-HEMTs;
Data collection;
Encryption;
Protocols;
Public key;
80.
Parity modifications and stopping sets in high-rate codes for physical-layer security
机译:
物理层安全性的高速码中的奇偶校验修改和停止集
作者:
Harrison Willie K.
;
Boyce Parker
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
maximum likelihood decoding;
message passing;
parity check codes;
security of data;
Tanner graph;
attack algorithm;
binary erasure wiretap channel;
high-rate codes;
linear physical-layer security code;
maximum-likelihood attack;
message-passing attack;
parity modifications;
parity-check matrix;
secrecy capacity;
security enhancements;
security metrics;
small blocklength LDPC codes;
stopping sets;
Bit error rate;
Communication networks;
Decoding;
Encoding;
Measurement;
Parity check codes;
Security;
81.
Identity-based protocol design patterns for machine-to-machine secure channels
机译:
基于Identity的协议设计模式,用于机器到机器安全通道
作者:
Corella Francisco
;
Lewison Karen P.
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
cryptographic protocols;
private key cryptography;
M2M communication;
application data traffic;
authentication;
human-to-machine communication;
identity-based encryption;
identity-based protocol design pattern;
machine-to-machine secure channel;
private key;
symmetric keys;
Authentication;
Encryption;
Protocols;
Public key;
Servers;
82.
Relay-based secret key generation in LTE-A
机译:
LTE-A中基于中继的秘密密钥生成
作者:
Kan Chen
;
Natarajan Balasubramaniam
;
Shattil Steve
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
Long Term Evolution;
MIMO communication;
antenna arrays;
public key cryptography;
relay networks (telecommunication);
telecommunication security;
LTE-A network throughput;
LTE-A standard;
Long Term Evolution Advanced standard;
PHY-layer security scheme;
RNs;
SKG scheme;
SKGR;
VAA;
co-op MIMO techniques;
cooperative multiple input multiple output techniques;
information theory;
physical layer security scheme;
relay nodes;
relay-based secret key generation scheme;
secret key generation rate;
virtual antenna arrays;
Antennas;
Channel estimation;
Communication system security;
Gaussian noise;
MIMO;
Security;
Wireless communication;
83.
Secure distributed spectrum sensing in cognitive radio networks using multi-armed bandits
机译:
使用多武装匪徒的认知无线电网络中的安全分布式频谱感应
作者:
Sodagari Shabnam
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
Bayes methods;
cognitive radio;
probability;
radio spectrum management;
random processes;
signal detection;
telecommunication security;
Bayesian methods;
binomial multiarmed bandit process;
cognitive radio networks;
fusion center;
malicious nodes;
randomized probability matching;
rewarding nodes;
secure distributed spectrum sensing;
spectrum sensing data falsification attack;
Bayes methods;
Cognitive radio;
Communication networks;
Conferences;
Monte Carlo methods;
Security;
Sensors;
Cognitive radio;
data falsification attack;
distributed spectrum sensing;
84.
On secure communication over multiple access wiretap channels under channel uncertainty
机译:
在信道不确定性下通过多次接入丝网安全通信
作者:
Schaefer Rafael F.
;
Poor H. Vincent
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
broadcast channels;
cryptography;
decoding;
electronic messaging;
receivers;
transmitters;
MAWC transmitter;
average decoding error;
broadcast channel;
compound channel realization;
confidential messages send;
eavesdropper decoding performance;
multiletter outer bound;
multiple access wiretap channel receiver;
secure communication problem;
strong secrecy capacity region multiletter description;
Communication system security;
Compounds;
Decoding;
Joints;
Security;
Transmitters;
Zinc;
85.
Improving smart grid security using Merkle Trees
机译:
使用Merkle树改进智能电网安全
作者:
Munoz Melesio Calderon
;
Moh Melody
;
Teng-Sheng Moh
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
power system security;
public key cryptography;
smart power grids;
telecommunication security;
trees (mathematics);
wireless mesh networks;
Merkle trees;
WMN;
aging infrastructures;
control systems;
dynamic grids;
electrical power grid;
function foundation;
power grids;
public key encryption;
smart grid security;
wireless mesh networks;
wireless network security;
Authentication;
Computers;
Public key;
Quantum computing;
Smart grids;
Vegetation;
86.
Towards time-varying classification based on traffic pattern
机译:
基于交通模式的时变分类
作者:
Yiyang Shao
;
Luoshi Zhang
;
Xiaoxian Chen
;
Yibo Xue
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
cryptography;
firewalls;
learning (artificial intelligence);
next generation networks;
regression analysis;
telecommunication traffic;
accuracy improvement;
application-level protocols;
encrypted-complicated traffic identification;
intrusion detection system;
machine learning algorithms;
network security;
next-generation firewall;
time domain;
time-varying classification;
time-varying logistic regression model;
traffic change characteristics;
traffic classification techniques;
traffic pattern;
Accuracy;
Educational institutions;
Logistics;
Machine learning algorithms;
Ports (Computers);
Protocols;
Security;
Logistic Regression;
Time-varying Model;
Traffic Classification;
Traffic Pattern;
87.
DroidGraph: discovering Android malware by analyzing semantic behavior
机译:
Droidgraph:通过分析语义行为来发现Android恶意软件
作者:
Jonghoon Kwon
;
Jihwan Jeong
;
Jehyun Lee
;
Heejo Lee
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
graph theory;
invasive software;
mobile computing;
smart phones;
telecommunication security;
APK file;
Android API calls;
Android malware;
DroidGraph;
code obfuscation;
junk code insertion;
market share;
mobile malware;
semantic behavior;
smartphones;
Androids;
Humanoid robots;
Malware;
Mobile communication;
Semantics;
Smart phones;
Android Malware;
Semantic Analysis;
88.
RF-fingerprint based authentication: Exponents and achievable rates
机译:
基于RF指纹的身份验证:指数和可实现的费率
作者:
Gungor Onur
;
Koksal Can Emre
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
authorisation;
RF radio chain;
RF-fingerprint based authentication;
authentication problem;
keyless authentication;
radiofrequency fingerprinting;
Authentication;
Communication system security;
Decoding;
Radio frequency;
Receivers;
Transmitters;
Vectors;
89.
Manipulating the attacker's view of a system's attack surface
机译:
操纵攻击者对系统攻击表面的看法
作者:
Albanese Massimiliano
;
Battista Ermanno
;
Jajodia Sushil
;
Casola V.
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
IP networks;
computer network security;
adaptive defense;
admissible cost;
attacker probes;
attacker view manipulation;
control perspective;
critical resources;
cyber attacks;
defender cost minimization;
external view;
graph-based approach;
information collection;
internal view;
knowledge acquition;
minimum distance;
network topology;
principled approach;
reconnaissance phase;
service dependencies;
static system configurations;
system attack surface;
system view distance;
target system;
unpatched vulnerabilities;
upper bound;
Adaptive systems;
Communication networks;
Conferences;
Operating systems;
Probes;
Security;
Servers;
90.
VirtualFriendship: Hiding interactions on Online Social Networks
机译:
VirtualFriendship:隐藏在线社交网络上的互动
作者:
Beato Filipe
;
Conti Marco
;
Preneel Bart
;
Vettore Dario
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
cryptography;
information dissemination;
interactive systems;
social networking (online);
Facebook;
OSN;
VirtualFriendship;
encryption;
hiding interactions;
information dissemination;
masking techniques;
online social networks;
social interactions;
Encryption;
Facebook;
Privacy;
Protocols;
Routing;
91.
Integration and evaluation of intrusion detection for CoAP in smart city applications
机译:
智能城市应用中饼干入侵检测的集成与评价
作者:
Krimmling Jana
;
Peter Steffen
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
cloud computing;
mobile computing;
protocols;
public administration;
public transport;
security of data;
smart cities;
C/C++ application code;
CoAP;
OMNeT++ simulation;
cloud computing;
constrained application protocol;
intrusion detection;
resource-constrained devices;
smart city applications;
smart public transport application;
Cities and towns;
Hardware;
Intrusion detection;
Libraries;
Protocols;
Routing;
Critical Infrastructure protection;
Intrusion detection;
OMNeT++;
Simulation;
Smart city;
92.
Uniform distributed source coding for the multiple access wiretap channel
机译:
用于多个接入丝网通道的均匀分布式源编码
作者:
Chou Remi /A/.
;
Bloch Matthieu R.
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
information theory;
source coding;
telecommunication security;
coding scheme;
deterministic encoders;
information-theoretic security;
multiple access wiretap channel;
public messages transmission;
secret messages transmission;
source coding;
wiretap codes;
Communication networks;
Communication system security;
Conferences;
Decoding;
Security;
Source coding;
93.
MCR Decoding: A MIMO approach for defending against wireless jamming attacks
机译:
MCR解码:用于防止无线卡攻击的MIMO方法
作者:
Wenbo Shen
;
Peng Ning
;
Xiaofan He
;
Huaiyu Dai
;
Yao Liu
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
MIMO communication;
decoding;
jamming;
telecommunication security;
MCR decoding;
MIMO;
antijamming wireless communication;
multiantenna wireless device;
multichannel characteristics;
multichannel ratio decoding;
preamble signals;
wireless jamming attacks;
Decoding;
Jamming;
MIMO;
Receiving antennas;
Transmitters;
Wireless communication;
94.
Achievable secrecy capacity in an underlay cognitive radio network
机译:
底层认知无线电网络中可实现的保密能力
作者:
Sibomana Louis
;
Zepernick Hans-Jurgen
;
Hung Tran
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
cognitive radio;
radar receivers;
radio spectrum management;
radio transmitters;
telecommunication network reliability;
telecommunication security;
wireless channels;
EAV channel information;
PU outage;
PU receiver;
PU transmitter;
SU receiver;
SU-Rxs;
SU-Tx;
average secrecy capacity;
eavesdropper;
physical layer security;
primary user transmitter;
secondary network communication;
secondary user transmitter;
spectrum sharing cognitive radio network;
Cognitive radio;
Communication networks;
Conferences;
Interference;
Physical layer;
Security;
Signal to noise ratio;
95.
Introducing asymmetric DC-Nets
机译:
引入不对称的DC网
作者:
Borges Fabio
;
Buchmann Johannes
;
Muhlhauser Max
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
cryptographic protocols;
data privacy;
additive homomorphic encryption;
asymmetric DC-nets concept;
e-voting;
electronic voting;
multi-party computation;
privacy-preserving aggregation;
reputation systems;
sensor networks;
smart grids;
time-series data aggregation;
user privacy protection;
Aggregates;
Elliptic curve cryptography;
Privacy;
Protocols;
Smart grids;
96.
On the fading Gaussian wiretap channel with statistical channel state information at transmitter
机译:
在发射机统计频道状态信息的衰落高斯丝网通道上
作者:
Pin-Hsun Lin
;
Jorswieck Eduard
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
Gaussian channels;
Nakagami channels;
channel capacity;
statistical analysis;
transmitters;
Nakagami-m channels;
capacity lower bounds;
capacity upper bounds;
channel enhancement;
continuous fading wiretap channel;
convex orders;
eavesdropper's channels;
ergodic secrecy capacity;
fading Gaussian wiretao channel;
fast fading wiretap channels;
layered signaling;
main channels;
statistical channel state information;
stochastic orders;
transmitter;
wireless network;
Communication system security;
Fading;
Random variables;
Receivers;
Security;
Transmitters;
Upper bound;
97.
Securing smart home: Technologies, security challenges, and security requirements
机译:
确保智能家庭:技术,安全挑战和安全要求
作者:
Changmin Lee
;
Zappaterra Luca
;
Kwanghee Choi
;
Hyeong-Ah Choi
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
Internet of Things;
home automation;
home computing;
security of data;
Internet of Things technology;
automated services;
collaborative operations;
cyber-attacks;
distributed operations;
electronic devices;
interactive services;
residential customers;
resource-constrained nature;
security challenges;
security requirements;
security vulnerabilities;
smart home environment;
smart home security;
Batteries;
IEEE 802.11 Standards;
IEEE 802.15 Standards;
Protocols;
Security;
Smart homes;
Software;
98.
Sensory channel threats to Cyber Physical Systems: A wake-up call
机译:
对网络物理系统的感官渠道威胁:叫醒
作者:
Uluagac /A/. Selcuk
;
Subramanian Venkatachalam
;
Beyah Raheem
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
invasive software;
CPS;
cyber physical systems;
iRobot Create;
intrusion detection system;
malware;
novel computing paradigm;
security models;
sensory channel threats;
sensory channels;
Accelerometers;
Malware;
Robot sensing systems;
Sensor systems;
Wireless sensor networks;
CPS Security;
Cyber-Physical Systems;
Sensory Attacks;
Sensory-channel threats;
99.
Attribute-based access control for ICN naming scheme
机译:
基于属性的ICN命名方案的访问控制
作者:
Bing Li
;
Verleker Ashwin Prabhu
;
Dijiang Huang
;
Zhijie Wang
;
Yan Zhu
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
IP networks;
authorisation;
computer network management;
cryptography;
data privacy;
ABE;
ICN architecture;
ICN naming scheme;
IP-based networking architecture;
access control policy;
associated attribute management solution;
attribute-based access control;
attribute-based encryption;
communicating host;
content access policy;
control mechanism;
distributed content copy;
information centric networking;
network architecture;
privacy-preserving access control scheme;
unauthorized content viewer;
Access control;
Encryption;
Magnetic resonance imaging;
Medical services;
Ontologies;
access control;
attribute management;
information centric networking;
naming;
privacy;
100.
Detecting smart, self-propagating Internet worms
机译:
检测智能,自宣传互联网蠕虫
作者:
Jun Li
;
Stafford Shad
会议名称:
《IEEE Conference on Communications and Network Security》
|
2014年
关键词:
Internet;
computer network security;
invasive software;
telecommunication traffic;
SWORD worm detector;
arms race;
classic worms;
legitimate traffic;
scanning rate;
smart evasive worms;
smart self-propagating Internet worm detection;
worm authors;
worm parameters;
Boolean functions;
Data structures;
Detectors;
Grippers;
Internet;
Security;
Training;
Internet worm;
behavior-based worm detection;
smart worm;
worm detection;
意见反馈
回到顶部
回到首页