default search action
3rd CSNet 2019: Quito, Ecuador
- 3rd Cyber Security in Networking Conference, CSNet 2019, Quito, Ecuador, October 23-25, 2019. IEEE 2019, ISBN 978-1-7281-3949-4
- El-hacen Diallo, Alexandre Laubé, Khaldoun Al Agha, Steven Martin:
Efficient Block replication to optimize the blockchain resources. 1-5 - Mohammed S. Alshehri, Brajendra Panda:
A Blockchain-Encryption-Based Approach to Protect Fog Federations from Rogue Nodes. 6-13 - Kodjo Edem Agbezoutsi, Pascal Urien, Toundé Mesmin Dandjinou:
Towards Blockchain Services For Mobile Money Traceability And Federation. 14-20 - Nour El Madhoun, Julien Hatin, Emmanuel Bertin:
Going Beyond the Blockchain Hype: In Which Cases are Blockchains Useful for IT Applications? 21-27 - Achraf Fayad, Badis Hammi, Rida Khatoun, Ahmed Serhrouchni:
A Blockchain-based Lightweight Authentication Solution for IoT. 28-34 - Victor Pasknel de Alencar Ribeiro, Raimir Holanda Filho, Alex Ramos:
A Secure and Fault-Tolerant Architecture for LoRaWAN Based on Blockchain. 35-41 - Ralph Koning, Ameneh Deljoo, Lydia Meijer, Cees de Laat, Paola Grosso:
Trust-based collaborative defences in multi network alliances. 42-49 - Ameneh Deljoo, Ralph Koning, Tom M. van Engers, Leon Gommans, Cees de Laat:
Managing Effective Collaboration in Cybersecurity Alliances Using Social Computational Trust. 50-57 - Solange Ghernaouti, Léonore Cellier, Bastien Wanner:
Information sharing in cybersecurity : Enhancing security, trust and privacy by capacity building. 58-62 - Jorge Merchan-Lima, Fabian Astudillo-Salinas, Luis Tello-Oquendo, Franklin L. Sanchez, Gabriel Lopez, Dorys Quiroz:
Information Security Management Frameworks in Higher Education Institutions: An Overview. 63-65 - Abdelmalek Benzekri, Romain Laborde, Arnaud Oglaza, Darine Rammal, François Barrère:
Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situations. 66-72 - Maria Alejandra Osorio Angarita, Ebroul Izquierdo, Agustín Moreno Cañadas:
Human Interaction Proofs (HIPs) based on Emerging Images and Topological Data Analysis (TDA) Techniques. 73-79 - Nour El Madhoun, Emmanuel Bertin, Guy Pujolle:
The EMV Payment System: Is It Reliable? 80-85 - Fathima James:
A Risk Management Framework and A Generalized Attack Automata for IoT based Smart Home Environment. 86-90 - Olivier Cros, Gabriel Chênevert:
Hashing-based authentication for CAN bus and application to Denial-of-Service protection. 91-98 - Karim Lounis, Mohammad Zulkernine:
Bluetooth Low Energy Makes "Just Works" Not Work. 99-106 - Fathima James:
IoT Cybersecurity based Smart Home Intrusion Prevention System. 107-113 - Anika Anwar, Talal Halabi, Mohammad Zulkernine:
Cloud-based Sybil Attack Detection Scheme for Connected Vehicles. 114-121 - José David Vega Sánchez, Luis Urquiza-Aguiar, Martha Cecilia Paredes Paredes:
Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey. 122-129 - Christian Tietz, Eric Klieme, Lukas Behrendt, Pawel Böning, Leonard Marschke, Christoph Meinel:
Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTC. 130-137 - Firas Al-Doghman, Zenon Chaczko, Wayne Brookes, Lucia Carrion Gordon:
Social Consensus-inspired Aggregation Algorithms for Edge Computing. 138-141 - Germán E. Rodríguez, Jenny Torres, Pamela Flores, Diego Eduardo Benavides, Daniel Nuñez-Agurto:
XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in Universities. 142-149 - Andreane Spano da Roza, João Vitor Valle, Diogo Menezes Ferrazani Mattos:
A Precise Method for Monitoring and Detecting Recurrent Attacks on Wireless Networks based on Link-Layer Traffic Classification. 150-157 - Marek Malowidzki, Damian Hermanowski, Przemyslaw Berezinski:
TAG: Topological Attack Graph Analysis Tool. 158-160 - Diego Oña, Lenín Zapata, Walter Fuertes, Germán E. Rodríguez, Diego Eduardo Benavides, Theofilos Toulkeridis:
Phishing Attacks: Detecting and Preventing Infected E-mails Using Machine Learning Methods. 161-163
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.