Efficient Random Route Mutation considering flow and network constraints
Qi Duan, Al-Shaer, Ehab, Jafarian, Haadi
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Get full text
Conference Proceeding
Secure and constant cost public cloud storage auditing with deduplication
Jiawei Yuan, Shucheng Yu
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Get full text
Conference Proceeding
Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org
Herzberg, Amir, Shulman, Haya
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Get full text
Conference Proceeding
Certificateless public auditing for data integrity in the cloud
Boyang Wang, Baochun Li, Hui Li, Fenghua Li
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Get full text
Conference Proceeding
Dynamic adaptive anti-jamming via controlled mobility
Xiaofan He, Huaiyu Dai, Peng Ning
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Get full text
Conference Proceeding
A passive technique for fingerprinting wireless devices with Wired-side Observations
Uluagac, A. Selcuk, Radhakrishnan, Sakthi V., Corbett, Cherita, Baca, Antony, Beyah, Raheem
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Get full text
Conference Proceeding
NOMAD: Towards non-intrusive moving-target defense against web bots
Vikram, Shardul, Chao Yang, Guofei Gu
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Get full text
Conference Proceeding
A moving target defense mechanism for MANETs based on identity virtualization
Albanese, Massimiliano, De Benedictis, Alessandra, Jajodia, Sushil, Kun Sun
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Get full text
Conference Proceeding
Computing encrypted cloud data efficiently under multiple keys
Boyang Wang, Ming Li, Chow, Sherman S. M., Hui Li
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Get full text
Conference Proceeding
A framework for risk-aware role based access control
Bijon, Khalid Zaman, Krishnan, Ram, Sandhu, Ravi
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Get full text
Conference Proceeding
A cloud computing based architecture for cyber security situation awareness
Wei Yu, Guobin Xu, Zhijiang Chen, Moulema, Paul
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Get full text
Conference Proceeding
LISA: Location information ScrAmbler for privacy protection on smartphones
Zhigang Chen, Xin Hu, Xiaoen Ju, Shin, Kang G.
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Get full text
Conference Proceeding
PHY-layer authentication by introducing controlled inter symbol interference
Kumar, Vireshwar, Jung-Min Park, Clancy, T. Charles, Kaigui Bian
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Get full text
Conference Proceeding
Rootkit detection on virtual machines through deep information extraction at hypervisor-level
Xiongwei Xie, Weichao Wang
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Get full text
Conference Proceeding
Secure pervasive social networking based on multi-dimensional trust levels
Zheng Yan, Mingjun Wang, Niemi, Valtteri, Kantola, Raimo
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Get full text
Conference Proceeding
A vulnerability study of geographic routing in Underwater Acoustic Networks
Zuba, Michael, Fagan, Michael, Jun-Hong Cui, Zhijie Shi
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Get full text
Conference Proceeding
T-dominance: Prioritized defense deployment for BYOD security
Wei Peng, Feng Li, Han, Keesook J., Xukai Zou, Jie Wu
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Get full text
Conference Proceeding