The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SecureComm"( http://dblp.L3S.de/Venues/SecureComm )

URL (DBLP): http://dblp.uni-trier.de/db/conf/securecomm

Publication years (Num. hits)
2005 (51) 2006 (56) 2007 (62) 2008 (43) 2009 (27) 2010 (29) 2011 (36) 2012 (22) 2013 (28) 2015 (49) 2016 (49) 2017 (47) 2018-2022 (44) 2023 (1)
Publication types (Num. hits)
inproceedings(531) proceedings(13)
Venues (Conferences, Journals, ...)
SecureComm(544)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 544 publication records. Showing 544 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Fengjun Li, Kaitai Liang, Zhiqiang Lin, Sokratis K. Katsikas (eds.) Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings Search on Bibsonomy SecureComm The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Md Ali Reza Al Amin, Sachin Shetty, Valerio Formicola, Martin Otto 0002 Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Xiaoting Li 0001, Lingwei Chen, Dinghao Wu Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social Networks. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Robert Cantaragiu, Antonis Michalas, Eugene Frimpong, Alexandros Bakas MetaPriv: Acting in Favor of Privacy on Social Media Platforms. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Qiang Liu, Hequ Xian, Jiancheng Zhang, Kunpeng Liu A Random Reversible Watermarking Scheme for Relational Data. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Juanjuan Guo, Mengjie Shuai, Qiongxiao Wang, Wenyuan Li, Jingqiang Lin Replicated Additive Secret Sharing with the Optimized Number of Shares. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Sanjeev Shukla, Manoj Misra, Gaurav Varshney Forensic Analysis and Detection of Spoofing Based Email Attack Using Memory Forensics and Machine Learning. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ruizhong Du, Tianhe Zhang Blockchain-Based Ciphertext Policy-Hiding Access Control Scheme. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Douglas J. Leith What Data Do the Google Dialer and Messages Apps on Android Send to Google? Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Peyman Momeni, Sergey Gorbunov 0001, Bohan Zhang FairBlock: Preventing Blockchain Front-Running with Minimal Overheads. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Farzaneh Abazari, Enrico Branca, Evgeniya Novikova, Natalia Stakhanova Language and Platform Independent Attribution of Heterogeneous Code. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Tongwei Ren, Ryan Williams, Sirshendu Ganguly, Lorenzo De Carli, Long Lu Breaking Embedded Software Homogeneity with Protocol Mutations. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jingfei Bian, Nan Yu, Hong Li 0004, Hongsong Zhu, Qiang Wang, Limin Sun An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Alexandros Bakas, Eugene Frimpong, Antonis Michalas Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Zhengyu Liu, Haochen Su, Nannan Wang, Cheng Huang 0003 Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Yuedong Pan, Lijun Cai, Tao Leng, Lixin Zhao, Jiangang Ma, Aimin Yu, Dan Meng AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Xiantong Hao, Dandan Ma, Hongliang Liang Detection and Privacy Leakage Analysis of Third-Party Libraries in Android Apps. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Qige Song, Yongzheng Zhang 0002, Shuhao Li Multi-relational Instruction Association Graph for Cross-Architecture Binary Similarity Comparison. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Shohei Kakei, Yoshiaki Shiraishi, Shoichi Saito Granting Access Privileges Using OpenID Connect in Permissioned Distributed Ledgers. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Omar Adel Ibrahim, Savio Sciancalepore, Roberto Di Pietro MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Wen Xie, Niusen Chen, Bo Chen 0028 Enabling Accurate Data Recovery for Mobile Devices Against Malware Attacks. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Qiying Dong, Ding Wang 0002, Yaosheng Shen, Chunfu Jia PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Nanda Rani, Ayushi Mishra, Rahul Kumar, Sarbajit Ghosh, Sandeep K. Shukla, Priyanka Bagade A Generalized Unknown Malware Classification. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ehsan Aghaei, Xi Niu, Waseem G. Shadid, Ehab Al-Shaer SecureBERT: A Domain-Specific Language Model for Cybersecurity. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Niusen Chen, Bo Chen 0028, Weisong Shi A Cross-layer Plausibly Deniable Encryption System for Mobile Devices. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Mengyao Shi, Zhu Wang 0005, Tingting Peng, Fenghua Li Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Spandan Mahadevegowda, Ryan M. Gerdes, Thidapat Chantem, Rose Qingyang Hu Secure CV2X Using COTS Smartphones over LTE Infrastructure. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Cavidan Yakupoglu, Kurt Rohloff PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption with AES and Intel SGX. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ziqiang Ma, Shuaigang Li, Jingqiang Lin, Quanwei Cai 0001, Shuqin Fan, Fan Zhang, Bo Luo Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Haitao Xiao, Chen Zhang, Song Liu, Bo Jiang, Zhigang Lu 0002, Fei Wang, Yuling Liu CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Kemin Zhang, Li Yang, Lu Zhou, Jianfeng Ma Decentralized and Efficient Blockchain Rewriting with Bi-level Validity Verification. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Tianning Zhang, Miao Cai, Diming Zhang, Hao Huang eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Hanyu Jia, Xiangxue Li, Qiang Li, Yue Bao, Xintian Hou Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Zhengxiang Zhou, Cong Wang 0001, Qingchuan Zhao No-Fuzz: Efficient Anti-fuzzing Techniques. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jingzhe Wang, Balaji Palanisamy CTDRB: Controllable Timed Data Release Using Blockchains. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Xiaoyi Duan, Ye Huang, Yonghua Su, Yujin Li, Xiaohong Fan Research on the Grouping Method of Side-Channel Leakage Detection. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Qian Qiang, Yige Chen, Yang Hu, Tianning Zang, Mian Cheng, Quanbo Pan, Yu Ding, Zisen Qi Cost-Effective Malware Classification Based on Deep Active Learning. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Haochen Zhai, Futai Zou, Junhua Tang, Yue Wu 0010 Towards High Transferability on Neural Network for Black-Box Adversarial Attacks. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Muhammad Shadi Hajar, Harsha K. Kalutarage, M. Omar Al-Kadri DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Pranay Kapoor, Rohan Pagey, Mohammad Mannan, Amr M. Youssef Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Sivaanandh Muneeswaran, Vinay Sachidananda, Rajendra Patil, Hongyi Peng, Mingchang Liu, Mohan Gurusamy Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Sangat Vaidya, Santiago Torres-Arias, Justin Cappos, Reza Curtmola Bootstrapping Trust in Community Repository Projects. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Maryam Davari, Mohammad Zulkernine Classification-Based Anomaly Prediction in XACML Policies. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Xiaodong Lin 0001, Ali A. Ghorbani 0001, Kui Ren 0001, Sencun Zhu, Aiqing Zhang (eds.) Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings Search on Bibsonomy SecureComm The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Peisong Shen, Chi Chen 0001, Xiaojie Zhu Privacy-Preserving Relevance Ranking Scheme and Its Application in Multi-keyword Searchable Encryption. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yao Liu 0011, Qingkai Zeng 0002, Pinghai Yuan Optimizing TLB for Access Pattern Privacy Protection in Data Outsourcing. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sascha Groß, Abhishek Tiwari 0001, Christian Hammer 0001 ThiefTrap - An Anti-theft Framework for Android. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Huasong Shan, Qingyang Wang 0001, Qiben Yan Very Short Intermittent DDoS Attacks in an Unsaturated System. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Subramaniyam Kannan, Paul Wood, Larry Deatrick, Patricia Beane, Somali Chaterji, Saurabh Bagchi TopHat : Topology-Based Host-Level Attribution for Multi-stage Attacks in Enterprise Systems Using Software Defined Networks. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fengwei Wang, Hui Zhu 0001, Rongxing Lu, Fen Liu, Cheng Huang 0001, Hui Li 0006 Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xiujia Guo, Zhao Wang, Zhong Chen 0001 Exploring the Network of Real-World Passwords: Visualization and Estimation. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhongliang Yang, Xueshun Peng, Yongfeng Huang 0001 A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wentao Chang, Aziz Mohaisen, An Wang 0002, Songqing Chen Understanding Adversarial Strategies from Bot Recruitment to Scheduling. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hong Rong, Huimei Wang, Jian Liu 0024, Jialu Hao, Ming Xian Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark Framework. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kailong Wang, Guangdong Bai, Naipeng Dong, Jin Song Dong A Framework for Formal Analysis of Privacy on SSO Protocols. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hong Liu, Eugene Y. Vasserman Gray-Box Software Integrity Checking via Side-Channels. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pengwei Lan, Pei Wang 0007, Shuai Wang 0011, Dinghao Wu Lambda Obfuscation. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Muhammad Taqi Raza, Fatima Muhammad Anwar, Songwu Lu Exposing LTE Security Weaknesses at Protocol Inter-layer, and Inter-radio Interactions. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yunfeng Hong, Yongjian Hu, Chun-Ming Lai, Shyhtsun Felix Wu, Iulian Neamtiu, Patrick D. McDaniel, Paul L. Yu, Hasan Cam, Gail-Joon Ahn Defining and Detecting Environment Discrimination in Android Apps. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pejman Najafi, Andrey Sapegin, Feng Cheng 0002, Christoph Meinel Guilt-by-Association: Detecting Malicious Entities via Graph Mining. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, Hrishikesh B. Acharya, Sambuddho Chakravarty Mending Wall: On the Implementation of Censorship in India. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jianming Fu, Rui Jin, Yan Lin 0003 FRProtector: Defeating Control Flow Hijacking Through Function-Level Randomization and Transfer Protection. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xurong Li, Chunming Wu 0001, Shouling Ji, Qinchen Gu, Raheem A. Beyah HSTS Measurement and an Enhanced Stripping Attack Against HTTPS. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jian Kang, Yousef Elmehdwi, Dan Lin 0001 SLIM: Secure and Lightweight Identity Management in VANETs with Minimum Infrastructure Reliance. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jiahao Cao, Mingwei Xu, Qi Li 0002, Kun Sun 0001, Yuan Yang 0001, Jing Zheng Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Quanwei Cai 0001, Jonathan Lutes, Jingqiang Lin, Bo Luo A-Tor: Accountable Anonymity in Tor. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Le Guan, Sadegh Farhang, Yu Pu, Pinyao Guo, Jens Grossklags, Peng Liu 0005 VaultIME: Regaining User Control for Password Managers Through Auto-Correction. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Chao Liu 0020, Kunying Liu, Min Yu 0001, Yongjian Wang A Deep Learning Based Online Malicious URL and DNS Detection Scheme. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xiang Ling 0001, Chunming Wu 0001, Shouling Ji, Meng Han H _2 DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chonghua Wang, Shiqing Ma, Xiangyu Zhang 0001, Junghwan Rhee, Xiaochun Yun, Zhiyu Hao A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dongliang Mu, Jia Guo, Wenbiao Ding, Zhilong Wang, Bing Mao, Lei Shi 0001 ROPOB: Obfuscating Binary Code via Return Oriented Programming. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vlad Bulakh, Andrew J. Kaizer, Minaxi Gupta All Your Accounts Are Belong to Us. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pinyao Guo, Hunmin Kim, Le Guan, Minghui Zhu, Peng Liu 0005 VCIDS: Collaborative Intrusion Detection of Sensor and Actuator Attacks on Connected Vehicles. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Drew Davidson, Vaibhav Rastogi, Mihai Christodorescu, Somesh Jha Enhancing Android Security Through App Splitting. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jun Zhu, Weiping Zhou, Zhilong Wang, Dongliang Mu, Bing Mao DiffGuard: Obscuring Sensitive Information in Canary Based Protections. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ting Chen 0002, Yang Xu, Xiaosong Zhang 0001 A Program Manipulation Middleware and Its Applications on System Security. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xunchao Hu, Yao Cheng, Yue Duan, Andrew Henderson, Heng Yin 0001 JSForce: A Forced Execution Engine for Malicious JavaScript Detection. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yi He, Qi Li 0002, Kun Sun 0001 LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Quanqi Ye, Guangdong Bai, Naipeng Dong, Jin Song Dong Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rémi Géraud, David Naccache, Razvan Rosie Twisting Lattice and Graph Techniques to Compress Transactional Ledgers. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jinwen Liang, Zheng Qin 0001, Sheng Xiao, Jixin Zhang, Hui Yin, Keqin Li 0001 MPOPE: Multi-provider Order-Preserving Encryption for Cloud Data Privacy. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yue Li 0002, Haining Wang, Kun Sun 0001 BluePass: A Secure Hand-Free Password Manager. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yan Wang, Shuai Wang 0011, Pei Wang 0007, Dinghao Wu Turing Obfuscation. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rui Zhao 0005, Chuan Yue, Qi Han 0001 Cross-site Input Inference Attacks on Mobile Web Users. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tommy Chin, Kaiqi Xiong, Mohamed Rahouti SDN-Based Kernel Modular Countermeasure for Intrusion Detection. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhiguo Wan, Zhangshuang Guan, Feng Zhuo, Hequn Xian BKI: Towards Accountable and Decentralized Public-Key Infrastructure with Blockchain. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zheng Wang 0034, Shui Yu 0001, Scott Rose An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Robert H. Deng, Jian Weng 0001, Kui Ren 0001, Vinod Yegneswaran (eds.) Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yingjun Zhang, Yu Qin, Dengguo Feng, Bo Yang, Weijin Wang An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yan Zhang, Gui Peng, Lu Yang, Yazhe Wang, Minghui Tian, Jianxing Hu, Liming Wang, Chen Song Visual Analysis of Android Malware Behavior Profile Based on PMCG_droid : A Pruned Lightweight APP Call Graph. Search on Bibsonomy SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dong Shen, Zhangkai Zhang, Xuhua Ding, Zhoujun Li 0001, Robert H. Deng H-Binder: A Hardened Binder Framework on Android Systems. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chengyu Zheng, Nicola Dellarocca, Niccolò Andronio, Stefano Zanero, Federico Maggi GreatEatlon: Fast, Static Detection of Mobile Ransomware. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Qian Wang 0002, Xiao Lu, Yan Zhang, Zhibo Wang 0001, Zhan Qin, Kui Ren 0001 SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohammad Karami, Songqing Chen Attribution of Economic Denial of Sustainability Attacks in Public Clouds. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pinaki Sarkar, Morshed Uddin Chowdhury Secure IoT Using Weighted Signed Graphs. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wei Shi 0001, Mengfei Peng, Jean-Pierre Corriveau, William Lee Croft Faulty Node Repair and Dynamically Spawned Black Hole Search. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nian Xue, Lulu Liang, Jie Zhang 0030, Xin Huang 0005 POSTER: A Framework for IoT Reprogramming. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kailei Ren, Qiang Wei, Zehui Wu, Qingxian Wang SDNGuardian: Secure Your REST NBIs with API-Grained Permission Checking System. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 544 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license