Search Results - "2016 IEEE Conference on Communications and Network Security (CNS)"
-
1
IoTSAT: A formal framework for security analysis of the internet of things (IoT)
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…The new attack surface being crafted by the huge influx of IoT devices is both formidable and unpredictable, as it introduces a rich set of unexplored attack…”
Get full text
Conference Proceeding -
2
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…Distributed Denial of Service attacks against high-profile targets have become more frequent in recent years. In response to such massive attacks, several…”
Get full text
Conference Proceeding -
3
A security framework for MQTT
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…In this paper, we propose a simple security framework for MQTT (for short, AugMQTT) by incorporating the AugPAKE protocol [16]. As a distinguishing feature,…”
Get full text
Conference Proceeding -
4
SEGAUTH: A segment-based approach to behavioral biometric authentication
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…Many studies have been conducted to apply behavioral biometric authentication on/with mobile devices and they have shown promising results. However, the…”
Get full text
Conference Proceeding -
5
SDNShield: Towards more comprehensive defense against DDoS attacks on SDN control plane
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…While the software-defined networking (SDN) paradigm is gaining much popularity, current SDN infrastructure has potential bottlenecks in the control plane,…”
Get full text
Conference Proceeding -
6
GPS spoofing attack characterization and detection in smart grids
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…The problem of global positioning system (GPS) spoofing attacks on smart grids endowed with phasor measurement units (PMUs) is addressed, taking into account…”
Get full text
Conference Proceeding -
7
CryptoImg: Privacy preserving processing over encrypted images
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…Cloud computing services provide a scalable solution for the storage and processing of images and multimedia files. However, concerns about privacy risks…”
Get full text
Conference Proceeding -
8
Detection of false data injection attacks in smart grid under colored Gaussian noise
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…In this paper, we consider the problems of state estimation and false data injection detection in smart grid when the measurements are corrupted by colored…”
Get full text
Conference Proceeding -
9
Real time motion-based authentication for smartwatch
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…Smartwatches become increasingly powerful and popular. These personal devices carry multiple sensors that continuously measure, collect, and analyze various…”
Get full text
Conference Proceeding -
10
Text mining for security threat detection discovering hidden information in unstructured log messages
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…The exponential growth of unstructured messages generated by the computer systems and applications in modern computing environment poses a significant…”
Get full text
Conference Proceeding -
11
Towards probabilistic identification of zero-day attack paths
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…Zero-day attacks continue to challenge the enterprise network security defense. A zero-day attack path is formed when a multi-step attack contains one or more…”
Get full text
Conference Proceeding -
12
Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…We consider a prototypical intelligent transportation system with a control law that is specifically designed to avoid collisions. We experimentally…”
Get full text
Conference Proceeding -
13
Covert bits through queues
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…We consider covert communication using a queuing timing channel in the presence of a warden. The covert message is encoded using the inter-arrival times of the…”
Get full text
Conference Proceeding -
14
Online learning-based optimal primary user emulation attacks in cognitive radio networks
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…In a cognitive radio (CR) network, a secondary user learns the spectrum environment and dynamically accesses the channel where the primary user is inactive. At…”
Get full text
Conference Proceeding -
15
Analysis of clickjacking attacks and an effective defense scheme for Android devices
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…Smartphones bring users lots of convenience by integrating all useful functions people may need. While users are spending more time on their phones, have they…”
Get full text
Conference Proceeding -
16
BidGuard: A framework for privacy-preserving crowdsensing incentive mechanisms
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…With the rapid growth of smartphones, crowdsensing emerges as a new paradigm which takes advantage of the pervasive sensor-embedded smartphones to collect data…”
Get full text
Conference Proceeding -
17
Security policy checking in distributed SDN based clouds
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…Separation of network control from devices in Software Defined Network (SDN) allows for centralized implementation and management of security policies in a…”
Get full text
Conference Proceeding -
18
Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…In this paper a physical layer authentication method is proposed to suit to time-variant wireless channels by taking advantage of the varied mutually…”
Get full text
Conference Proceeding -
19
Preventing kernel code-reuse attacks through disclosure resistant code diversification
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…Software diversity has been applied to operating system kernels to protect against code-reuse attacks. However, the security of fine-grained software…”
Get full text
Conference Proceeding -
20
Coded caching for resolvable networks with security requirements
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…We consider networks where a set of end users, equipped with cache memories, are connected to a single server via a set of relay nodes. We further consider a…”
Get full text
Conference Proceeding