default search action
9th CNS 2021: Tempe, AZ, USA
- IEEE Conference on Communications and Network Security, CNS 2021, Tempe, AZ, USA, October 4-6, 2021. IEEE 2021, ISBN 978-1-6654-4496-5
- Abrar S. Alrumayh, Sarah M. Lehman, Chiu C. Tan:
Understanding and Mitigating Privacy Leaks from Third-Party Smart Speaker Apps. 1-9 - Micael A. Dias, Francisco Marcos de Assis:
Evaluating the Eavesdropper Entropy via Bloch-Messiah Decomposition. 1-6 - Yunqi Guo, Zhaowei Tan, Kaiyuan Chen, Songwu Lu, Ying Nian Wu:
A Model Obfuscation Approach to IoT Security. 1-9 - Oliver Slattery, Xiao Tang, Lijun Ma, Thomas Gerrits, Anouar Rahmouni, Sumit Bhushan:
The Quantum Communications and Networking Project at the Information Technology Laboratory of NIST. 1-6 - Savio Sciancalepore, Pietro Tedeschi, Usman Riasat, Roberto Di Pietro:
Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted Channel Access. 10-18 - Joel Höglund, Shahid Raza:
LICE: Lightweight certificate enrollment for IoT using application layer security. 19-28 - Zhaowei Tan, Boyan Ding, Zhehui Zhang, Qianru Li, Yunqi Guo, Songwu Lu:
Device-Centric Detection and Mitigation of Diameter Signaling Attacks against Mobile Core. 29-37 - Rupendra Nath Mitra, Mohamed M. Kassem, Jon Larrea, Mahesh K. Marina:
CUPS Hijacking in Mobile RAN Slicing: Modeling, Prototyping, and Analysis. 38-46 - Zhifan Xu, Melike Baykal-Gürsoy, Predrag Spasojevic:
A Game-Theoretic Approach for Probabilistic Cooperative Jamming Strategies over Parallel Wireless Channels. 47-55 - Gerbert Roitburd, Matthias Ortmann, Matthias Hollick, Jiska Classen:
Very Pwnable Network: Cisco AnyConnect Security Analysis. 56-64 - Md Tamjid Hossain, Shahriar Badsha, Haoting Shen:
Privacy, Security, and Utility Analysis of Differentially Private CPES Data. 65-73 - Sara Beatriz Schwarz, Dimitrios-Georgios Akestoridis, Patrick Tague, Hanan Hibshi:
Hiding the Topology of an IEEE 802.15.4 Network with Limited Energy. 74-82 - Suhan Jiang, Jie Wu:
On Game-theoretic Computation Power Diversification in the Bitcoin Mining Network. 83-91 - Lucian Trestioreanu, Cristina Nita-Rotaru, Aanchal Malhotra, Radu State:
SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay. 92-100 - Wenjun Fan, Sang-Yoon Chang, Xiaobo Zhou, Shouhuai Xu:
ConMan: A Connection Manipulation-based Attack Against Bitcoin Networking. 101-109 - Stephen Moskal, Shanchieh Jay Yang:
Translating Intrusion Alerts to Cyberattack Stages using Pseudo-Active Transfer Learning (PATRL). 110-118 - Maged AbdelAty, Sandra Scott-Hayward, Roberto Doriguzzi Corin, Domenico Siracusa:
GADoT: GAN-based Adversarial Training for Robust DDoS Attack Detection. 119-127 - Christoph Hardegen, Mike Petersen, Chukwuebuka Ezelu, Timo Geier, Sebastian Rieger, Ulrich Buehler:
A Hierarchical Architecture and Probabilistic Strategy for Collaborative Intrusion Detection. 128-136 - Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Frederica Free-Nelson:
DREVAN: Deep Reinforcement Learning-based Vulnerability-Aware Network Adaptations for Resilient Networks. 137-145 - Jordan Wright, Zane Fink, Michael Gowanlock, Christopher Robert Philabaum, Brian Donnelly, Bertrand Cambou:
A Symmetric Cipher Response-Based Cryptography Engine Accelerated Using GPGPU. 146-154 - Upakar Paudel, Andy Dolan, Suryadipta Majumdar, Indrakshi Ray:
Context-Aware IoT Device Functionality Extraction from Specifications for Ensuring Consumer Security. 155-163 - Martin Fejrskov, Jens Myrup Pedersen, Leon Böck, Emmanouil Vasilomanolakis:
An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records. 164-172 - Md. Mazharul Islam, Ashutosh Dutta, Md Sajidul Islam Sajid, Ehab Al-Shaer, Jinpeng Wei, Sadegh Farhang:
CHIMERA: Autonomous Planning and Orchestration for Malware Deception. 173-181 - Talha Ongun, Oliver Spohngellert, Benjamin A. Miller, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Alastair Nottingham, Jack W. Davidson, Malathi Veeraraghavan:
PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection. 182-190 - Nikolay Ivanov, Qiben Yan:
EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion. 191-199 - Md Hasan Shahriar, Alvi Ataur Khalil, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Dong Chen:
iAttackGen: Generative Synthesis of False Data Injection Attacks in Cyber-physical Systems. 200-208 - Dimitrios-Georgios Akestoridis, Patrick Tague:
HiveGuard: A Network Security Monitoring Architecture for Zigbee Networks. 209-217 - Songsong Liu, Pengbin Feng, Kun Sun:
HoneyBog: A Hybrid Webshell Honeypot Framework against Command Injection. 218-226 - Shalin Kumar Deval, Meenakshi Tripathi, Bruhadeshwar Bezawada, Indrakshi Ray:
"X-Phish: Days of Future Past"‡: Adaptive & Privacy Preserving Phishing Detection. 227-235 - Eric Husa, Reza Tourani:
Vibe: An Implicit Two-Factor Authentication using Vibration Signals. 236-244 - A. S. M. Asadujjaman, Momen Oqaily, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains. 245-253 - Wenhao Chen, Li Lin, Jennifer Newman, Yong Guan:
Automatic Detection of Android Steganography Apps via Symbolic Execution and Tree Matching. 254-262 - Ahmed S. Bendary, C. Emre Koksal, Daniel Canaday, Andrew Pomerance:
Unconditional Authentication for Constrained Applications via Strong PUFs. 272-280 - Fangfang Yang, Mohammad A. Islam, Fan Wu, Shaolei Ren:
CompKey: Exploiting Computer's Electromagnetic Radiation for Secret Key Generation. 281-289 - Salah Sharieh, Alexander Ferworn:
Securing APIs and Chaos Engineering. 290-294
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.