default search action
CSS 2013: Zhangjiajie, China
- Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan:
Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings. Lecture Notes in Computer Science 8300, Springer 2013, ISBN 978-3-319-03583-3
CSS 2013 Regular Papers
- Jan-Min Chen:
A Crawler Guard for Quickly Blocking Unauthorized Web Robot. 1-13 - Tao Peng, Qin Liu, Guojun Wang:
Privacy Preserving for Location-Based Services Using Location Transformation. 14-28 - Ang Mi, Weiping Wang, Shigeng Zhang, Hong Song:
Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux. 29-39 - Jiangxiao Zhang, Zhoujun Li, Hua Guo:
Multiple-Bank E-Cash without Random Oracles. 40-51 - Chong Fu, Tao Wang, Zhao-yu Meng, Jun-Xin Chen, Hong-feng Ma:
A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy. 52-66 - Baosheng Ge, Wen Tao Zhu:
Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics. 67-80 - Wencheng Yang, Jiankun Hu, Song Wang, Jucheng Yang:
Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures. 81-91 - Juan Wang, Yong Wang, Hongxin Hu, Qingxin Sun, He Shi, Longjie Zeng:
Towards a Security-Enhanced Firewall Application for OpenFlow Networks. 92-103 - Lin-Bo Qiao, Bo-Feng Zhang, Rui-Yuan Zhao, Jinshu Su:
Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method. 104-116 - Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips:
Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows. 117-131 - Layal Samarji, Frédéric Cuppens, Nora Cuppens-Boulahia, Wael Kanoun, Samuel Dubus:
Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks. 132-150 - Robert Koch, Mario Golling, Gabi Dreo Rodosek:
Geolocation and Verification of IP-Addresses with Specific Focus on IPv6. 151-170 - Youssou Faye, Hervé Guyennet, Ibrahima Niang, Yanbo Shou:
Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks. 171-182 - Seyed Ali Mirheidari, Sajjad Arshad, Rasool Jalili:
Alert Correlation Algorithms: A Survey and Taxonomy. 183-197 - Natsuki Kimura, Noriaki Yoshiura:
Construction and Verification of Mobile Ad Hoc Network Protocols. 198-212 - Jun Zhang, Xiao Chen, Yang Xiang, Wanlei Zhou:
Zero-Day Traffic Identification. 213-227 - Christian Callegari, Stefano Giordano, Susanna Mannella, Michele Pagano:
Design and Implementation of a Testbed for the Security Assessment of MANETs. 228-242 - Qiang Liu, Jianping Yin, Shui Yu:
A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology. 243-257 - Leyou Zhang, Qing Wu, Yi Mu:
Anonymous Identity-Based Broadcast Encryption with Adaptive Security. 258-271 - Qing Wu, Leyou Zhang:
Hierarchical Identity-Based Signature with Short Public Keys. 272-281 - Nizar Kheir, Xiao Han:
PeerViewer: Behavioral Tracking and Classification of P2P Malware. 282-298 - Jingping Song, Zhiliang Zhu, Peter Scully, Chris J. Price:
Selecting Features for Anomaly Intrusion Detection: A Novel Method using Fuzzy C Means and Decision Tree Classification. 299-307 - Sheng Wen, Ping Li, Di Wu, Yang Xiang, Wanlei Zhou:
Detecting Stepping Stones by Abnormal Causality Probability. 308-322 - Aihua Peng, Lansheng Han, Yanan Yu, Nan Du, Mingquan Li:
Algebra-Based Behavior Identification of Trojan Horse. 323-337 - Cheng-Chi Lee, Chun-Ta Li, Chi-Yao Weng, Jian-Jhong Jheng, Xiao-Qian Zhang, Yi-Rui Zhu:
Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards. 338-348 - Haichang Gao, Wei Jia, Ning Liu, Kaisheng Li:
The Hot-Spots Problem in Windows 8 Graphical Password Scheme. 349-362 - Shaoyin Cheng, Shengmei Luo, Zifeng Li, Wei Wang, Yan Wu, Fan Jiang:
Static Detection of Dangerous Behaviors in Android Apps. 363-376 - Changji Wang, Wentao Li, Yuan Li, Xi-Lei Xu:
A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function. 377-386 - Shuhong Chen, Guojun Wang, Weijia Jia:
A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing. 387-402 - Fangfang Zhou, Ronghua Shi, Ying Zhao, Yezi Huang, Xing Liang:
NetSecRadar: A Visualization System for Network Security Situational Awareness. 403-416
Workshop Papers
- Ronghua Shi, Ye Kang, Zhaoyuan Zhang:
Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System. 417-428 - Cai Fu, Deliang Xu, Lansheng Han, Jingfang Xu, Zhicun Fang:
Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN. 429-440 - Zemin Cai, Yi Wang, Renfa Li:
An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space. 441-449 - Zhenyu Wang, Yanqiu Ye, Ruimin Wang:
An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux. 450-457 - Javier González, Philippe Bonnet:
Towards an Open Framework Leveraging a Trusted Execution Environment. 458-467 - Kok-Seng Wong, Myung Ho Kim:
Secure Re-publication of Dynamic Big Data. 468-477
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.