Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cns/cns2016.bht:"
@inproceedings{DBLP:conf/cns/AbdelazizKG16, author = {Amr Abdelaziz and Can Emre Koksal and Hesham El Gamal}, title = {On the security of Angle of Arrival estimation}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {109--117}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860476}, doi = {10.1109/CNS.2016.7860476}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AbdelazizKG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AmbrosinHMCP16, author = {Moreno Ambrosin and Hossein Hosseini and Kalikinkar Mandal and Mauro Conti and Radha Poovendran}, title = {Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {163--171}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860482}, doi = {10.1109/CNS.2016.7860482}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AmbrosinHMCP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AqilAKYSRLPSC16, author = {Azeem Aqil and Ahmed Osama Fathy Atya and Srikanth V. Krishnamurthy and Paul L. Yu and Ananthram Swami and Jeff Rowe and Karl N. Levitt and Alexander Poylisher and Constantin Serban and Ritu Chadha}, title = {Automated cross layer feature selection for effective intrusion detection in networked systems}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {270--278}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860494}, doi = {10.1109/CNS.2016.7860494}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AqilAKYSRLPSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AroraVAM16, author = {Shashank Arora and Gaurav Varshney and Pradeep K. Atrey and Manoj Mishra}, title = {SecureCEdit: An approach for secure cloud-based document editing}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {561--564}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860548}, doi = {10.1109/CNS.2016.7860548}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AroraVAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AsselinAJ16, author = {Eric Asselin and Carlos Aguilar Melchor and Gentian Jakllari}, title = {Anomaly detection for web server log reduction: {A} simple yet efficient crawling based approach}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {586--590}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860553}, doi = {10.1109/CNS.2016.7860553}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AsselinAJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BabunAU16, author = {Leonardo Babun and Hidayet Aksu and A. Selcuk Uluagac}, title = {A framework for counterfeit smart grid device detection}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {382--383}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860522}, doi = {10.1109/CNS.2016.7860522}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BabunAU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BadraYPC16, author = {Nadim Badra and Jiaxin Yang and Ioannis N. Psaromiligkos and Beno{\^{\i}}t Champagne}, title = {Robust and secure beamformer design for {MIMO} relaying with imperfect eavesdropper {CSI}}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {442--449}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860534}, doi = {10.1109/CNS.2016.7860534}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BadraYPC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BendaryMD16, author = {Ahmed S. Bendary and Yahya Z. Mohasseb and Hisham Dahshan}, title = {On the secure Degrees of Freedom for the K-user symmetric {MIMO} Wiretap {MAC} channel}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {591--595}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860554}, doi = {10.1109/CNS.2016.7860554}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BendaryMD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BicakciYG16, author = {Kemal Bicakci and Davut Deniz Yavuz and Sezin Gurkan}, title = {TwinCloud: Secure cloud sharing without explicit key management}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {581--585}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860552}, doi = {10.1109/CNS.2016.7860552}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BicakciYG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ButtnerH16, author = {Carsten B{\"{u}}ttner and Sorin A. Huss}, title = {Attribute-based authorization tickets for Car-to-X communication}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {234--242}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860490}, doi = {10.1109/CNS.2016.7860490}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ButtnerH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CaronLR16, author = {Eddy Caron and Arnaud Lefray and Jonathan Rouzaud{-}Cornabas}, title = {Secured systems in Clouds with Model-Driven Orchestration}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {498--506}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860541}, doi = {10.1109/CNS.2016.7860541}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CaronLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CervantesSLX16, author = {Diana K. Anguiano Cervantes and Ghouri Mohammad Saaduddin and Yanyan Li and Mengjun Xie}, title = {Comparison between fingerprint and behavioral biometric authentication using 2D and 3D gestures}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {372--373}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860517}, doi = {10.1109/CNS.2016.7860517}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/CervantesSLX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChangC16, author = {Wentao Chang and Songqing Chen}, title = {ExtensionGuard: Towards runtime browser extension information leakage detection}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {154--162}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860481}, doi = {10.1109/CNS.2016.7860481}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChangC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenJSXC16, author = {Kuan{-}yin Chen and Anudeep Reddy Junuthula and Ishant Kumar Siddhrau and Yang Xu and H. Jonathan Chao}, title = {SDNShield: Towards more comprehensive defense against DDoS attacks on {SDN} control plane}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {28--36}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860467}, doi = {10.1109/CNS.2016.7860467}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ChenJSXC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChoPK16, author = {Eunsang Cho and Minkyung Park and Ted Taekyoung Kwon}, title = {TwinPeaks: {A} new approach for certificateless public key distribution}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {10--18}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860465}, doi = {10.1109/CNS.2016.7860465}, timestamp = {Wed, 18 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChoPK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChukwuOM16, author = {Julian Chukwu and Ose Osamudiamen and Ashraf Matrawy}, title = {IDSaaS in {SDN:} Intrusion Detection System as a service in software defined networks}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {356--357}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860509}, doi = {10.1109/CNS.2016.7860509}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChukwuOM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChungFKIWS16, author = {Key{-}whan Chung and Valerio Formicola and Zbigniew T. Kalbarczyk and Ravishankar K. Iyer and Alexander Withers and Adam J. Slagell}, title = {Attacking supercomputers through targeted alteration of environmental control: {A} data driven case study}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {406--410}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860528}, doi = {10.1109/CNS.2016.7860528}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChungFKIWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Crescenzo16, author = {Giovanni Di Crescenzo}, title = {Server-assisted fully homomorphic computation protocols}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {534--542}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860545}, doi = {10.1109/CNS.2016.7860545}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Crescenzo16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DabaghchianAZW16, author = {Monireh Dabaghchian and Amir Alipour{-}Fanid and Kai Zeng and Qingsi Wang}, title = {Online learning-based optimal primary user emulation attacks in cognitive radio networks}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {100--108}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860475}, doi = {10.1109/CNS.2016.7860475}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DabaghchianAZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DaltonA16, author = {Brandon Dalton and Nitin Agarwal}, title = {Analyzing deviant behaviors on social media using cyber forensics-based methodologies}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {378--379}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860520}, doi = {10.1109/CNS.2016.7860520}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DaltonA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DeshmukhCHTB16, author = {Siddhant Deshmukh and Henry Carter and Grant Hernandez and Patrick Traynor and Kevin R. B. Butler}, title = {Efficient and secure template blinding for biometric authentication}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {480--488}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860539}, doi = {10.1109/CNS.2016.7860539}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DeshmukhCHTB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DoerrMKM16, author = {Christian Doerr and Mourad el Maouchi and Sille Kamoen and Jarno Moree}, title = {Scan prediction and reconnaissance mitigation through commodity graphics cards}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {287--295}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860496}, doi = {10.1109/CNS.2016.7860496}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DoerrMKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FaisalCW16, author = {Mustafa Faisal and Alvaro A. C{\'{a}}rdenas and Avishai Wool}, title = {Modeling Modbus {TCP} for intrusion detection}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {386--390}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860524}, doi = {10.1109/CNS.2016.7860524}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/FaisalCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FayedKL16, author = {Abdallah Fayed and Tamer Khattab and Lifeng Lai}, title = {On secure communication over the Z-Channel}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {606--610}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860557}, doi = {10.1109/CNS.2016.7860557}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/FayedKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GeganAOG16, author = {Ross K. Gegan and Vishal Ahuja and John D. Owens and Dipak Ghosal}, title = {Real-time GPU-based timing channel detection using entropy}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {296--305}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860497}, doi = {10.1109/CNS.2016.7860497}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GeganAOG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GiontaEL16, author = {Jason Gionta and William Enck and Per Larsen}, title = {Preventing kernel code-reuse attacks through disclosure resistant code diversification}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {189--197}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860485}, doi = {10.1109/CNS.2016.7860485}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/GiontaEL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HaasKMMF16, author = {Steffen Haas and Shankar Karuppayah and Selvakumar Manickam and Max M{\"{u}}hlh{\"{a}}user and Mathias Fischer}, title = {On the resilience of P2P-based botnet graphs}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {225--233}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860489}, doi = {10.1109/CNS.2016.7860489}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/HaasKMMF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HallgrenOS16, author = {Per A. Hallgren and Mart{\'{\i}}n Ochoa and Andrei Sabelfeld}, title = {MaxPace: Speed-constrained location queries}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {136--144}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860479}, doi = {10.1109/CNS.2016.7860479}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/HallgrenOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HanHKKMK16, author = {Mee Lan Han and Hee Chan Han and Ah Reum Kang and Byung Il Kwak and Aziz Mohaisen and Huy Kang Kim}, title = {{WHAP:} Web-hacking profiling using Case-Based Reasoning}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {344--345}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860503}, doi = {10.1109/CNS.2016.7860503}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HanHKKMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HuangJXWCGGW16, author = {Jianli Huang and Yixin Jiang and Aidong Xu and Hong Wen and Huajun Chen and Xiaobin Guo and Zewu Guan and Zhiming Wang}, title = {Joint beamforming and antenna subarray formation for secrecy capacity maximization in {MIMO} wiretap channels}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {368--369}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860515}, doi = {10.1109/CNS.2016.7860515}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HuangJXWCGGW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HusztiO16, author = {Andrea Huszti and Norbert Olah}, title = {A simple authentication scheme for clouds}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {565--569}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860549}, doi = {10.1109/CNS.2016.7860549}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HusztiO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/IsmailGS16, author = {Hatem Ismail and Daniel Germanus and Neeraj Suri}, title = {Malicious peers eviction for {P2P} overlays}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {216--224}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860488}, doi = {10.1109/CNS.2016.7860488}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/IsmailGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KangM16, author = {Ah Reum Kang and Aziz Mohaisen}, title = {Transparency of the new gTLD's centralized zone data service: {A} measurement study}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {354--355}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860508}, doi = {10.1109/CNS.2016.7860508}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KangM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KangM16a, author = {Ah Reum Kang and Aziz Mohaisen}, title = {Assessing {DNS} privacy under partial deployment of special-use Domain Names}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {358--359}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860510}, doi = {10.1109/CNS.2016.7860510}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KangM16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KangM16b, author = {Ah Reum Kang and Aziz Mohaisen}, title = {Automatic alerts annotation for improving DDoS mitigation systems}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {362--363}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860512}, doi = {10.1109/CNS.2016.7860512}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KangM16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KoSK16, author = {Woo{-}Hyun Ko and Bharadwaj Satchidanandan and P. R. Kumar}, title = {Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {416--420}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860529}, doi = {10.1109/CNS.2016.7860529}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KoSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LeibengerFS16, author = {Dominik Leibenger and Jonas Fortmann and Christoph Sorge}, title = {EncFS goes multi-user: Adding access control to an encrypted file system}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {525--533}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860544}, doi = {10.1109/CNS.2016.7860544}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LeibengerFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LewisLX16, author = {Antwane Lewis and Yanyan Li and Mengjun Xie}, title = {Real time motion-based authentication for smartwatch}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {380--381}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860521}, doi = {10.1109/CNS.2016.7860521}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LewisLX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiXB16, author = {Yanyan Li and Mengjun Xie and Jiang Bian}, title = {{SEGAUTH:} {A} segment-based approach to behavioral biometric authentication}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860464}, doi = {10.1109/CNS.2016.7860464}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiXB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiZ16, author = {Depeng Li and Rui Zhang}, title = {A framework to mitigate airliner risk in air traffic management}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {324--332}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860500}, doi = {10.1109/CNS.2016.7860500}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiZZ16, author = {Tao Li and Rui Zhang and Yanchao Zhang}, title = {PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access control}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {333--341}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860501}, doi = {10.1109/CNS.2016.7860501}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LinYLXX16, author = {Jian Lin and Dejun Yang and Ming Li and Jia Xu and Guoliang Xue}, title = {BidGuard: {A} framework for privacy-preserving crowdsensing incentive mechanisms}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {145--153}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860480}, doi = {10.1109/CNS.2016.7860480}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LinYLXX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LuP16, author = {Rui Lu and Derek Chi{-}Wai Pao}, title = {Optimized Aho-Corasick string matching algorithm for smart phones}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {342--343}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860502}, doi = {10.1109/CNS.2016.7860502}, timestamp = {Thu, 20 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LuP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MadaniV16, author = {Pooria Madani and Natalija Vlajic}, title = {Towards sequencing malicious system calls}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {376--377}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860519}, doi = {10.1109/CNS.2016.7860519}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MadaniV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MansourBS16, author = {Ahmed S. Mansour and Holger Boche and Rafael F. Schaefer}, title = {List decoding for arbitrarily varying wiretap channels}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {611--615}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860558}, doi = {10.1109/CNS.2016.7860558}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MansourBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MartensAEM16, author = {Marcus M{\"{a}}rtens and Hadi Asghari and Michel van Eeten and Piet Van Mieghem}, title = {A time-dependent SIS-model for long-term computer worm evolution}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {207--215}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860487}, doi = {10.1109/CNS.2016.7860487}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MartensAEM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MartinezCT16, author = {Daniel T. Martinez and Claire M. Cochrane and Chiu C. Tan}, title = {Encryption-based privacy protection for police body-worn cameras}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {364--365}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860513}, doi = {10.1109/CNS.2016.7860513}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MartinezCT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MichaelsAU16, author = {Spencer Michaels and Kemal Akkaya and A. Selcuk Uluagac}, title = {Inducing data loss in Zigbee networks via join/association handshake spoofing}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {401--405}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860527}, doi = {10.1109/CNS.2016.7860527}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MichaelsAU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MingX16, author = {Jonathan Ming and Mengjun Xie}, title = {Remote live forensics for Android devices}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {374--375}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860518}, doi = {10.1109/CNS.2016.7860518}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MingX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MohsinAHAR16, author = {Mujahid Mohsin and Zahid Anwar and Ghaith Husari and Ehab Al{-}Shaer and Mohammad Ashiqur Rahman}, title = {IoTSAT: {A} formal framework for security analysis of the internet of things (IoT)}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {180--188}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860484}, doi = {10.1109/CNS.2016.7860484}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MohsinAHAR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MukherjeeU16, author = {Pritam Mukherjee and Sennur Ulukus}, title = {Covert bits through queues}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {626--630}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860561}, doi = {10.1109/CNS.2016.7860561}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MukherjeeU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/OlmoF16, author = {Jaume del Olmo and Javier Rodr{\'{\i}}guez Fonollosa}, title = {Strong secrecy on a class of Degraded Broadcast Channels using polar codes}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {601--605}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860556}, doi = {10.1109/CNS.2016.7860556}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/OlmoF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PanW016, author = {Yao Pan and Jules White and Yu Sun}, title = {Assessing the threat of web worker distributed attacks}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {306--314}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860498}, doi = {10.1109/CNS.2016.7860498}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PanW016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PengGSSLH16, author = {Wei Peng and Tianchong Gao and Devkishen Sisodia and Tanay Kumar Saha and Feng Li and Mohammad Al Hasan}, title = {{ACTS:} Extracting Android App topologiCal signature through graphleT Sampling}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {37--45}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860468}, doi = {10.1109/CNS.2016.7860468}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PengGSSLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PhamAV16, author = {Luan Huy Pham and Massimiliano Albanese and Sridhar Venkatesan}, title = {A quantitative risk assessment framework for adaptive Intrusion Detection in the cloud}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {489--497}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860540}, doi = {10.1109/CNS.2016.7860540}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PhamAV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PisharodyCH16, author = {Sandeep Pisharody and Ankur Chowdhary and Dijiang Huang}, title = {Security policy checking in distributed {SDN} based clouds}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {19--27}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860466}, doi = {10.1109/CNS.2016.7860466}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PisharodyCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PradhanNVKB16, author = {Parth Pradhan and Kyatsandra G. Nagananda and Parv Venkitasubramaniam and Shalinee Kishore and Rick S. Blum}, title = {{GPS} spoofing attack characterization and detection in smart grids}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {391--395}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860525}, doi = {10.1109/CNS.2016.7860525}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PradhanNVKB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RahbariK16, author = {Hanif Rahbari and Marwan Krunz}, title = {Rolling preambles: Mitigating stealthy {FO} estimation attacks in OFDM-based 802.11 systems}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {118--126}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860477}, doi = {10.1109/CNS.2016.7860477}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/RahbariK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RahmanFDA16, author = {Mohammad Ashiqur Rahman and Abdullah Al Farooq and Amarjit Datta and Ehab Al{-}Shaer}, title = {Automated synthesis of resiliency configurations for cyber networks}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {243--251}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860491}, doi = {10.1109/CNS.2016.7860491}, timestamp = {Sun, 30 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/RahmanFDA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RashidiF16, author = {Bahman Rashidi and Carol J. Fung}, title = {XDroid: An Android permission control using Hidden Markov chain and online learning}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {46--54}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860469}, doi = {10.1109/CNS.2016.7860469}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/RashidiF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Rawat16, author = {Danda B. Rawat}, title = {Analyzing energy efficient physical layer security in large-scale {MIMO} enabled {CRN} with QoS requirements}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {465--471}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860537}, doi = {10.1109/CNS.2016.7860537}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Rawat16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ReimairKM16, author = {Florian Reimair and Christian Kollmann and Alexander Marsalek}, title = {Emulating {U2F} authenticator devices}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {543--551}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860546}, doi = {10.1109/CNS.2016.7860546}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ReimairKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ReimairPRE16, author = {Florian Reimair and Bernd Pr{\"{u}}nster and Andreas Reiter and Christian Ertler}, title = {Applied dynamic policy selection}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {507--515}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860542}, doi = {10.1109/CNS.2016.7860542}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ReimairPRE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SanatiniaN16, author = {Amirali Sanatinia and Guevara Noubir}, title = {Honey Onions: {A} framework for characterizing and identifying misbehaving Tor HSDirs}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {127--135}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860478}, doi = {10.1109/CNS.2016.7860478}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SanatiniaN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SchabhuserDB16, author = {Lucas Schabh{\"{u}}ser and Denise Demirel and Johannes Buchmann}, title = {An unconditionally hiding auditing procedure for computations over distributed data}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {552--560}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860547}, doi = {10.1109/CNS.2016.7860547}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SchabhuserDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShenMSL16, author = {Dakun Shen and Ian D. Markwood and Dan Shen and Yao Liu}, title = {Virtual Safe: Unauthorized movement detection for mobile devices}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {315--323}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860499}, doi = {10.1109/CNS.2016.7860499}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ShenMSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShiS16, author = {Yi Shi and Yalin E. Sagduyu}, title = {Spectrum learning and access for cognitive satellite communications under jamming}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {472--479}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860538}, doi = {10.1109/CNS.2016.7860538}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ShiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShinKCH16, author = {SeongHan Shin and Kazukuni Kobara and Chia{-}Chuan Chuang and Weicheng Huang}, title = {A security framework for {MQTT}}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {432--436}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860532}, doi = {10.1109/CNS.2016.7860532}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ShinKCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SoysaCM16, author = {Madushanka Soysa and Pamela C. Cosman and Laurence B. Milstein}, title = {Video cognitive radio networks for tactical scenarios}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {457--464}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860536}, doi = {10.1109/CNS.2016.7860536}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SoysaCM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SpauldingKUM16, author = {Jeffrey Spaulding and Ah Reum Kang and Shambhu J. Upadhyaya and Aziz Mohaisen}, title = {A user study of the effectiveness of typosquatting techniques}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {360--361}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860511}, doi = {10.1109/CNS.2016.7860511}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SpauldingKUM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Suh-LeeJK16, author = {Candace Suh{-}Lee and Ju{-}Yeon Jo and Yoohwan Kim}, title = {Text mining for security threat detection discovering hidden information in unstructured log messages}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {252--260}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860492}, doi = {10.1109/CNS.2016.7860492}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Suh-LeeJK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SunDLSY16, author = {Xiaoyan Sun and Jun Dai and Peng Liu and Anoop Singhal and John Yen}, title = {Towards probabilistic identification of zero-day attack paths}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {64--72}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860471}, doi = {10.1109/CNS.2016.7860471}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SunDLSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Suthaharan16, author = {Shan Suthaharan}, title = {A correlation-based subspace analysis for data confidentiality and classification as utility in {CPS}}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {426--431}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860531}, doi = {10.1109/CNS.2016.7860531}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/Suthaharan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SuthaharanS16, author = {Shan Suthaharan and Weining Shen}, title = {Pairing of most relevant variables and bootstrap samples with ridge regression for data sharing}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {384--385}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860523}, doi = {10.1109/CNS.2016.7860523}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SuthaharanS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Takabi16, author = {Hassan Takabi}, title = {Firewall for brain: Towards a privacy preserving ecosystem for {BCI} applications}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {370--371}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860516}, doi = {10.1109/CNS.2016.7860516}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Takabi16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TangYKH16, author = {Bo Tang and Jun Yan and Steven Kay and Haibo He}, title = {Detection of false data injection attacks in smart grid under colored Gaussian noise}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {172--179}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860483}, doi = {10.1109/CNS.2016.7860483}, timestamp = {Wed, 11 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TangYKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TaylorS16, author = {Curtis R. Taylor and Craig A. Shue}, title = {Validating security protocols with cloud-based middleboxes}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {261--269}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860493}, doi = {10.1109/CNS.2016.7860493}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TaylorS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ThompsonMC16, author = {Brian Thompson and James R. Morris{-}King and Hasan Cam}, title = {Effectiveness of proactive reset for mitigating impact of stealthy attacks on networks of autonomous systems}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {437--441}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860533}, doi = {10.1109/CNS.2016.7860533}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ThompsonMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TianYY16, author = {Yifan Tian and Jiawei Yuan and Shucheng Yu}, title = {{SBPA:} Social behavior based cross Social Network phishing attacks}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {366--367}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860514}, doi = {10.1109/CNS.2016.7860514}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TianYY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TrappeG16, author = {Wade Trappe and Andrey Garnaev}, title = {Bargaining over secrecy and reliability for low {SNR} {OFDM} communications}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {596--600}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860555}, doi = {10.1109/CNS.2016.7860555}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TrappeG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TuGLP16, author = {Wenwen Tu and Mario Goldenbaum and Lifeng Lai and H. Vincent Poor}, title = {Multiple key generation with restricted public discussion structure}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {641--645}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860564}, doi = {10.1109/CNS.2016.7860564}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TuGLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Vasilomanolakis16, author = {Emmanouil Vasilomanolakis and Michael Stahn and Carlos Garcia Cordero and Max M{\"{u}}hlh{\"{a}}user}, title = {On probe-response attacks in Collaborative Intrusion Detection Systems}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {279--286}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860495}, doi = {10.1109/CNS.2016.7860495}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Vasilomanolakis16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/VenkatesanAAJW16, author = {Sridhar Venkatesan and Massimiliano Albanese and Kareem Amin and Sushil Jajodia and Mason Wright}, title = {A moving target defense approach to mitigate DDoS attacks against proxy-based architectures}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {198--206}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860486}, doi = {10.1109/CNS.2016.7860486}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/VenkatesanAAJW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/VenugopalanPS16, author = {Vivek Venugopalan and Cameron D. Patterson and Devu Manikantan Shila}, title = {Detecting and thwarting hardware trojan attacks in cyber-physical systems}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {421--425}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860530}, doi = {10.1109/CNS.2016.7860530}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/VenugopalanPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Walsh16, author = {Kevin Walsh}, title = {{TLS} with trustworthy certificate authorities}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {516--524}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860543}, doi = {10.1109/CNS.2016.7860543}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Walsh16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangSTHW16, author = {Xuanxuan Wang and Rafael F. Schaefer and Lars Thiele and Thomas Haustein and Yongming Wang}, title = {Ergodic secrecy sum rate for multiuser {MIMO} downlink systems using block diagonalization}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {636--640}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860563}, doi = {10.1109/CNS.2016.7860563}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangSTHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WebbR16, author = {Allen T. Webb and A. L. Narasima Reddy}, title = {Finding proxy users at the service using anomaly detection}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {82--90}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860473}, doi = {10.1109/CNS.2016.7860473}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WebbR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WeiYTLY16, author = {Zhexiong Wei and F. Richard Yu and Helen Tang and Chengehao Liang and Qiao Yan}, title = {Securing cognitive radio vehicular Ad hoc networks with trusted lightweight cloud computing}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {450--456}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860535}, doi = {10.1109/CNS.2016.7860535}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/WeiYTLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WieseO16, author = {Moritz Wiese and Tobias J. Oechtering}, title = {Secure distributed estimation of linear systems}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {616--620}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860559}, doi = {10.1109/CNS.2016.7860559}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WieseO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WuBDJ16, author = {Longfei Wu and Benjamin Brandt and Xiaojiang Du and Bo Ji}, title = {Analysis of clickjacking attacks and an effective defense scheme for Android devices}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {55--63}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860470}, doi = {10.1109/CNS.2016.7860470}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/WuBDJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XinSN16, author = {Liangxiao Xin and David Starobinski and Guevara Noubir}, title = {Cascading denial of service attacks on Wi-Fi networks}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {91--99}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860474}, doi = {10.1109/CNS.2016.7860474}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/XinSN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YangCC16, author = {Huan Yang and Liang Cheng and Mooi Choo Chuah}, title = {Evaluation of utility-privacy trade-offs of data manipulation techniques for smart metering}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {396--400}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860526}, doi = {10.1109/CNS.2016.7860526}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YangCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YuCZY16, author = {Xiaoqi Yu and Nairen Cao and Jun Zhang and Siu{-}Ming Yiu}, title = {Dynamic Proofs of Retrievability with improved worst case overhead}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {576--580}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860551}, doi = {10.1109/CNS.2016.7860551}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YuCZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YuLWW16, author = {Wenqian Yu and Weigang Li and Junyuan Wang and Changzheng Wei}, title = {A study of {HSM} based key protection in encryption file system}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {352--353}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860507}, doi = {10.1109/CNS.2016.7860507}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/YuLWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YuPSB16, author = {Paul L. Yu and Jake B. Perazzone and Brian M. Sadler and Rick S. Blum}, title = {Authenticated side channel via physical layer fingerprinting}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {631--635}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860562}, doi = {10.1109/CNS.2016.7860562}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/YuPSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZewailY16, author = {Ahmed A. Zewail and Aylin Yener}, title = {Coded caching for resolvable networks with security requirements}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {621--625}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860560}, doi = {10.1109/CNS.2016.7860560}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZewailY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangWSJZZ16, author = {Zhengguang Zhang and Hong Wen and Huanhuan Song and Yixin Jiang and Jinling Zhang and Xiping Zhu}, title = {A {MIMO} cross-layer secure communication scheme based on spatial modulation}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {350--351}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860506}, doi = {10.1109/CNS.2016.7860506}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhangWSJZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangWSJZZZ16, author = {Jinling Zhang and Hong Wen and Huanhuan Song and Yixin Jiang and Zhengguang Zhang and Luping Zhang and Xiping Zhu}, title = {Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {348--349}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860505}, doi = {10.1109/CNS.2016.7860505}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhangWSJZZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangWSTJDZ16, author = {Luping Zhang and Hong Wen and Huanhuan Song and Jie Tang and Yixin Jiang and Weihua Dong and Xiping Zhu}, title = {The performance of the {MIMO} physical layer security system with imperfect {CSI}}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {346--347}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860504}, doi = {10.1109/CNS.2016.7860504}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhangWSTJDZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhengPGZM16, author = {Chengyu Zheng and Mila Dalla Preda and Jorge Granjal and Stefano Zanero and Federico Maggi}, title = {On-chip system call tracing: {A} feasibility study and open prototype}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {73--81}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860472}, doi = {10.1109/CNS.2016.7860472}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhengPGZM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZiadAAS16, author = {M. Tarek Ibn Ziad and Amr Al{-}Anwar and Moustafa Alzantot and Mani B. Srivastava}, title = {CryptoImg: Privacy preserving processing over encrypted images}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {570--575}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860550}, doi = {10.1109/CNS.2016.7860550}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZiadAAS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cns/2016, title = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7854080/proceeding}, isbn = {978-1-5090-3065-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.