Search Results - "2016 IEEE Conference on Communications and Network Security (CNS)"

Refine Results
  1. 1

    IoTSAT: A formal framework for security analysis of the internet of things (IoT) by Mohsin, Mujahid, Anwar, Zahid, Husari, Ghaith, Al-Shaer, Ehab, Rahman, Mohammad Ashiqur

    “…The new attack surface being crafted by the huge influx of IoT devices is both formidable and unpredictable, as it introduces a rich set of unexplored attack…”
    Get full text
    Conference Proceeding
  2. 2

    A moving target defense approach to mitigate DDoS attacks against proxy-based architectures by Venkatesan, Sridhar, Albanese, Massimiliano, Amin, Kareem, Jajodia, Sushil, Wright, Mason

    “…Distributed Denial of Service attacks against high-profile targets have become more frequent in recent years. In response to such massive attacks, several…”
    Get full text
    Conference Proceeding
  3. 3

    A security framework for MQTT by SeongHan Shin, Kobara, Kazukuni, Chia-Chuan Chuang, Weicheng Huang

    “…In this paper, we propose a simple security framework for MQTT (for short, AugMQTT) by incorporating the AugPAKE protocol [16]. As a distinguishing feature,…”
    Get full text
    Conference Proceeding
  4. 4

    SEGAUTH: A segment-based approach to behavioral biometric authentication by Yanyan Li, Mengjun Xie, Jiang Bian

    “…Many studies have been conducted to apply behavioral biometric authentication on/with mobile devices and they have shown promising results. However, the…”
    Get full text
    Conference Proceeding
  5. 5

    SDNShield: Towards more comprehensive defense against DDoS attacks on SDN control plane by Kuan-yin Chen, Junuthula, Anudeep Reddy, Siddhrau, Ishant Kumar, Yang Xu, Chao, H. Jonathan

    “…While the software-defined networking (SDN) paradigm is gaining much popularity, current SDN infrastructure has potential bottlenecks in the control plane,…”
    Get full text
    Conference Proceeding
  6. 6

    GPS spoofing attack characterization and detection in smart grids by Pradhan, Parth, Nagananda, Kyatsandra, Venkitasubramaniam, Parv, Kishore, Shalinee, Blum, Rick S.

    “…The problem of global positioning system (GPS) spoofing attacks on smart grids endowed with phasor measurement units (PMUs) is addressed, taking into account…”
    Get full text
    Conference Proceeding
  7. 7

    CryptoImg: Privacy preserving processing over encrypted images by Tarek Ibn Ziad, M., Alanwar, Amr, Alzantot, Moustafa, Srivastava, Mani

    “…Cloud computing services provide a scalable solution for the storage and processing of images and multimedia files. However, concerns about privacy risks…”
    Get full text
    Conference Proceeding
  8. 8

    Detection of false data injection attacks in smart grid under colored Gaussian noise by Bo Tang, Jun Yan, Kay, Steven, Haibo He

    “…In this paper, we consider the problems of state estimation and false data injection detection in smart grid when the measurements are corrupted by colored…”
    Get full text
    Conference Proceeding
  9. 9

    Real time motion-based authentication for smartwatch by Lewis, Antwane, Yanyan Li, Mengjun Xie

    “…Smartwatches become increasingly powerful and popular. These personal devices carry multiple sensors that continuously measure, collect, and analyze various…”
    Get full text
    Conference Proceeding
  10. 10

    Text mining for security threat detection discovering hidden information in unstructured log messages by Suh-Lee, Candace, Ju-Yeon Jo, Yoohwan Kim

    “…The exponential growth of unstructured messages generated by the computer systems and applications in modern computing environment poses a significant…”
    Get full text
    Conference Proceeding
  11. 11

    Towards probabilistic identification of zero-day attack paths by Xiaoyan Sun, Jun Dai, Peng Liu, Singhal, Anoop, Yen, John

    “…Zero-day attacks continue to challenge the enterprise network security defense. A zero-day attack path is formed when a multi-step attack contains one or more…”
    Get full text
    Conference Proceeding
  12. 12

    Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems by Woo-Hyun Ko, Satchidanandan, Bharadwaj, Kumar, P. R.

    “…We consider a prototypical intelligent transportation system with a control law that is specifically designed to avoid collisions. We experimentally…”
    Get full text
    Conference Proceeding
  13. 13

    Covert bits through queues by Mukherjee, Pritam, Ulukus, Sennur

    “…We consider covert communication using a queuing timing channel in the presence of a warden. The covert message is encoded using the inter-arrival times of the…”
    Get full text
    Conference Proceeding
  14. 14

    Online learning-based optimal primary user emulation attacks in cognitive radio networks by Dabaghchian, Monireh, Alipour-Fanid, Amir, Kai Zeng, Qingsi Wang

    “…In a cognitive radio (CR) network, a secondary user learns the spectrum environment and dynamically accesses the channel where the primary user is inactive. At…”
    Get full text
    Conference Proceeding
  15. 15

    Analysis of clickjacking attacks and an effective defense scheme for Android devices by Longfei Wu, Brandt, Benjamin, Xiaojiang Du, Bo Ji

    “…Smartphones bring users lots of convenience by integrating all useful functions people may need. While users are spending more time on their phones, have they…”
    Get full text
    Conference Proceeding
  16. 16

    BidGuard: A framework for privacy-preserving crowdsensing incentive mechanisms by Jian Lin, Dejun Yang, Ming Li, Jia Xu, Guoliang Xue

    “…With the rapid growth of smartphones, crowdsensing emerges as a new paradigm which takes advantage of the pervasive sensor-embedded smartphones to collect data…”
    Get full text
    Conference Proceeding
  17. 17

    Security policy checking in distributed SDN based clouds by Pisharody, Sandeep, Chowdhary, Ankur, Dijiang Huang

    “…Separation of network control from devices in Software Defined Network (SDN) allows for centralized implementation and management of security policies in a…”
    Get full text
    Conference Proceeding
  18. 18

    Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System by Jinling Zhang, Hong Wen, Huanhuan Song, Yixin Jiang, Zhengguang Zhang, Luping Zhang, Xiping Zhu

    “…In this paper a physical layer authentication method is proposed to suit to time-variant wireless channels by taking advantage of the varied mutually…”
    Get full text
    Conference Proceeding
  19. 19

    Preventing kernel code-reuse attacks through disclosure resistant code diversification by Gionta, Jason, Enck, William, Larsen, Per

    “…Software diversity has been applied to operating system kernels to protect against code-reuse attacks. However, the security of fine-grained software…”
    Get full text
    Conference Proceeding
  20. 20

    Coded caching for resolvable networks with security requirements by Zewail, Ahmed A., Yener, Aylin

    “…We consider networks where a set of end users, equipped with cache memories, are connected to a single server via a set of relay nodes. We further consider a…”
    Get full text
    Conference Proceeding