Search dblp for Publications

export results for "toc:db/conf/cns/cns2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cns/AbdelazizKG16,
  author       = {Amr Abdelaziz and
                  Can Emre Koksal and
                  Hesham El Gamal},
  title        = {On the security of Angle of Arrival estimation},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {109--117},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860476},
  doi          = {10.1109/CNS.2016.7860476},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AbdelazizKG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AmbrosinHMCP16,
  author       = {Moreno Ambrosin and
                  Hossein Hosseini and
                  Kalikinkar Mandal and
                  Mauro Conti and
                  Radha Poovendran},
  title        = {Despicable me(ter): Anonymous and fine-grained metering data reporting
                  with dishonest meters},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {163--171},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860482},
  doi          = {10.1109/CNS.2016.7860482},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AmbrosinHMCP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AqilAKYSRLPSC16,
  author       = {Azeem Aqil and
                  Ahmed Osama Fathy Atya and
                  Srikanth V. Krishnamurthy and
                  Paul L. Yu and
                  Ananthram Swami and
                  Jeff Rowe and
                  Karl N. Levitt and
                  Alexander Poylisher and
                  Constantin Serban and
                  Ritu Chadha},
  title        = {Automated cross layer feature selection for effective intrusion detection
                  in networked systems},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {270--278},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860494},
  doi          = {10.1109/CNS.2016.7860494},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AqilAKYSRLPSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AroraVAM16,
  author       = {Shashank Arora and
                  Gaurav Varshney and
                  Pradeep K. Atrey and
                  Manoj Mishra},
  title        = {SecureCEdit: An approach for secure cloud-based document editing},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {561--564},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860548},
  doi          = {10.1109/CNS.2016.7860548},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AroraVAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AsselinAJ16,
  author       = {Eric Asselin and
                  Carlos Aguilar Melchor and
                  Gentian Jakllari},
  title        = {Anomaly detection for web server log reduction: {A} simple yet efficient
                  crawling based approach},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {586--590},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860553},
  doi          = {10.1109/CNS.2016.7860553},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AsselinAJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BabunAU16,
  author       = {Leonardo Babun and
                  Hidayet Aksu and
                  A. Selcuk Uluagac},
  title        = {A framework for counterfeit smart grid device detection},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {382--383},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860522},
  doi          = {10.1109/CNS.2016.7860522},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BabunAU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BadraYPC16,
  author       = {Nadim Badra and
                  Jiaxin Yang and
                  Ioannis N. Psaromiligkos and
                  Beno{\^{\i}}t Champagne},
  title        = {Robust and secure beamformer design for {MIMO} relaying with imperfect
                  eavesdropper {CSI}},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {442--449},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860534},
  doi          = {10.1109/CNS.2016.7860534},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BadraYPC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BendaryMD16,
  author       = {Ahmed S. Bendary and
                  Yahya Z. Mohasseb and
                  Hisham Dahshan},
  title        = {On the secure Degrees of Freedom for the K-user symmetric {MIMO} Wiretap
                  {MAC} channel},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {591--595},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860554},
  doi          = {10.1109/CNS.2016.7860554},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BendaryMD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BicakciYG16,
  author       = {Kemal Bicakci and
                  Davut Deniz Yavuz and
                  Sezin Gurkan},
  title        = {TwinCloud: Secure cloud sharing without explicit key management},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {581--585},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860552},
  doi          = {10.1109/CNS.2016.7860552},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BicakciYG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ButtnerH16,
  author       = {Carsten B{\"{u}}ttner and
                  Sorin A. Huss},
  title        = {Attribute-based authorization tickets for Car-to-X communication},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {234--242},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860490},
  doi          = {10.1109/CNS.2016.7860490},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ButtnerH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CaronLR16,
  author       = {Eddy Caron and
                  Arnaud Lefray and
                  Jonathan Rouzaud{-}Cornabas},
  title        = {Secured systems in Clouds with Model-Driven Orchestration},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {498--506},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860541},
  doi          = {10.1109/CNS.2016.7860541},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CaronLR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CervantesSLX16,
  author       = {Diana K. Anguiano Cervantes and
                  Ghouri Mohammad Saaduddin and
                  Yanyan Li and
                  Mengjun Xie},
  title        = {Comparison between fingerprint and behavioral biometric authentication
                  using 2D and 3D gestures},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {372--373},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860517},
  doi          = {10.1109/CNS.2016.7860517},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CervantesSLX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChangC16,
  author       = {Wentao Chang and
                  Songqing Chen},
  title        = {ExtensionGuard: Towards runtime browser extension information leakage
                  detection},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {154--162},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860481},
  doi          = {10.1109/CNS.2016.7860481},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChangC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenJSXC16,
  author       = {Kuan{-}yin Chen and
                  Anudeep Reddy Junuthula and
                  Ishant Kumar Siddhrau and
                  Yang Xu and
                  H. Jonathan Chao},
  title        = {SDNShield: Towards more comprehensive defense against DDoS attacks
                  on {SDN} control plane},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {28--36},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860467},
  doi          = {10.1109/CNS.2016.7860467},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ChenJSXC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChoPK16,
  author       = {Eunsang Cho and
                  Minkyung Park and
                  Ted Taekyoung Kwon},
  title        = {TwinPeaks: {A} new approach for certificateless public key distribution},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {10--18},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860465},
  doi          = {10.1109/CNS.2016.7860465},
  timestamp    = {Wed, 18 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChoPK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChukwuOM16,
  author       = {Julian Chukwu and
                  Ose Osamudiamen and
                  Ashraf Matrawy},
  title        = {IDSaaS in {SDN:} Intrusion Detection System as a service in software
                  defined networks},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {356--357},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860509},
  doi          = {10.1109/CNS.2016.7860509},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChukwuOM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChungFKIWS16,
  author       = {Key{-}whan Chung and
                  Valerio Formicola and
                  Zbigniew T. Kalbarczyk and
                  Ravishankar K. Iyer and
                  Alexander Withers and
                  Adam J. Slagell},
  title        = {Attacking supercomputers through targeted alteration of environmental
                  control: {A} data driven case study},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {406--410},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860528},
  doi          = {10.1109/CNS.2016.7860528},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChungFKIWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Crescenzo16,
  author       = {Giovanni Di Crescenzo},
  title        = {Server-assisted fully homomorphic computation protocols},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {534--542},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860545},
  doi          = {10.1109/CNS.2016.7860545},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Crescenzo16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DabaghchianAZW16,
  author       = {Monireh Dabaghchian and
                  Amir Alipour{-}Fanid and
                  Kai Zeng and
                  Qingsi Wang},
  title        = {Online learning-based optimal primary user emulation attacks in cognitive
                  radio networks},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {100--108},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860475},
  doi          = {10.1109/CNS.2016.7860475},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DabaghchianAZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DaltonA16,
  author       = {Brandon Dalton and
                  Nitin Agarwal},
  title        = {Analyzing deviant behaviors on social media using cyber forensics-based
                  methodologies},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {378--379},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860520},
  doi          = {10.1109/CNS.2016.7860520},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DaltonA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DeshmukhCHTB16,
  author       = {Siddhant Deshmukh and
                  Henry Carter and
                  Grant Hernandez and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  title        = {Efficient and secure template blinding for biometric authentication},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {480--488},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860539},
  doi          = {10.1109/CNS.2016.7860539},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DeshmukhCHTB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DoerrMKM16,
  author       = {Christian Doerr and
                  Mourad el Maouchi and
                  Sille Kamoen and
                  Jarno Moree},
  title        = {Scan prediction and reconnaissance mitigation through commodity graphics
                  cards},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {287--295},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860496},
  doi          = {10.1109/CNS.2016.7860496},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DoerrMKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FaisalCW16,
  author       = {Mustafa Faisal and
                  Alvaro A. C{\'{a}}rdenas and
                  Avishai Wool},
  title        = {Modeling Modbus {TCP} for intrusion detection},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {386--390},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860524},
  doi          = {10.1109/CNS.2016.7860524},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/FaisalCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FayedKL16,
  author       = {Abdallah Fayed and
                  Tamer Khattab and
                  Lifeng Lai},
  title        = {On secure communication over the Z-Channel},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {606--610},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860557},
  doi          = {10.1109/CNS.2016.7860557},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/FayedKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GeganAOG16,
  author       = {Ross K. Gegan and
                  Vishal Ahuja and
                  John D. Owens and
                  Dipak Ghosal},
  title        = {Real-time GPU-based timing channel detection using entropy},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {296--305},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860497},
  doi          = {10.1109/CNS.2016.7860497},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GeganAOG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GiontaEL16,
  author       = {Jason Gionta and
                  William Enck and
                  Per Larsen},
  title        = {Preventing kernel code-reuse attacks through disclosure resistant
                  code diversification},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {189--197},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860485},
  doi          = {10.1109/CNS.2016.7860485},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/GiontaEL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HaasKMMF16,
  author       = {Steffen Haas and
                  Shankar Karuppayah and
                  Selvakumar Manickam and
                  Max M{\"{u}}hlh{\"{a}}user and
                  Mathias Fischer},
  title        = {On the resilience of P2P-based botnet graphs},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {225--233},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860489},
  doi          = {10.1109/CNS.2016.7860489},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/HaasKMMF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HallgrenOS16,
  author       = {Per A. Hallgren and
                  Mart{\'{\i}}n Ochoa and
                  Andrei Sabelfeld},
  title        = {MaxPace: Speed-constrained location queries},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {136--144},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860479},
  doi          = {10.1109/CNS.2016.7860479},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/HallgrenOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HanHKKMK16,
  author       = {Mee Lan Han and
                  Hee Chan Han and
                  Ah Reum Kang and
                  Byung Il Kwak and
                  Aziz Mohaisen and
                  Huy Kang Kim},
  title        = {{WHAP:} Web-hacking profiling using Case-Based Reasoning},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {344--345},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860503},
  doi          = {10.1109/CNS.2016.7860503},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HanHKKMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HuangJXWCGGW16,
  author       = {Jianli Huang and
                  Yixin Jiang and
                  Aidong Xu and
                  Hong Wen and
                  Huajun Chen and
                  Xiaobin Guo and
                  Zewu Guan and
                  Zhiming Wang},
  title        = {Joint beamforming and antenna subarray formation for secrecy capacity
                  maximization in {MIMO} wiretap channels},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {368--369},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860515},
  doi          = {10.1109/CNS.2016.7860515},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HuangJXWCGGW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HusztiO16,
  author       = {Andrea Huszti and
                  Norbert Olah},
  title        = {A simple authentication scheme for clouds},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {565--569},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860549},
  doi          = {10.1109/CNS.2016.7860549},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HusztiO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/IsmailGS16,
  author       = {Hatem Ismail and
                  Daniel Germanus and
                  Neeraj Suri},
  title        = {Malicious peers eviction for {P2P} overlays},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {216--224},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860488},
  doi          = {10.1109/CNS.2016.7860488},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/IsmailGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KangM16,
  author       = {Ah Reum Kang and
                  Aziz Mohaisen},
  title        = {Transparency of the new gTLD's centralized zone data service: {A}
                  measurement study},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {354--355},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860508},
  doi          = {10.1109/CNS.2016.7860508},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KangM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KangM16a,
  author       = {Ah Reum Kang and
                  Aziz Mohaisen},
  title        = {Assessing {DNS} privacy under partial deployment of special-use Domain
                  Names},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {358--359},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860510},
  doi          = {10.1109/CNS.2016.7860510},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KangM16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KangM16b,
  author       = {Ah Reum Kang and
                  Aziz Mohaisen},
  title        = {Automatic alerts annotation for improving DDoS mitigation systems},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {362--363},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860512},
  doi          = {10.1109/CNS.2016.7860512},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KangM16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KoSK16,
  author       = {Woo{-}Hyun Ko and
                  Bharadwaj Satchidanandan and
                  P. R. Kumar},
  title        = {Theory and implementation of dynamic watermarking for cybersecurity
                  of advanced transportation systems},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {416--420},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860529},
  doi          = {10.1109/CNS.2016.7860529},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KoSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LeibengerFS16,
  author       = {Dominik Leibenger and
                  Jonas Fortmann and
                  Christoph Sorge},
  title        = {EncFS goes multi-user: Adding access control to an encrypted file
                  system},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {525--533},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860544},
  doi          = {10.1109/CNS.2016.7860544},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LeibengerFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LewisLX16,
  author       = {Antwane Lewis and
                  Yanyan Li and
                  Mengjun Xie},
  title        = {Real time motion-based authentication for smartwatch},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {380--381},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860521},
  doi          = {10.1109/CNS.2016.7860521},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LewisLX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiXB16,
  author       = {Yanyan Li and
                  Mengjun Xie and
                  Jiang Bian},
  title        = {{SEGAUTH:} {A} segment-based approach to behavioral biometric authentication},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860464},
  doi          = {10.1109/CNS.2016.7860464},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiXB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiZ16,
  author       = {Depeng Li and
                  Rui Zhang},
  title        = {A framework to mitigate airliner risk in air traffic management},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {324--332},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860500},
  doi          = {10.1109/CNS.2016.7860500},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiZZ16,
  author       = {Tao Li and
                  Rui Zhang and
                  Yanchao Zhang},
  title        = {PriExpress: Privacy-preserving express delivery with fine-grained
                  attribute-based access control},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {333--341},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860501},
  doi          = {10.1109/CNS.2016.7860501},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LinYLXX16,
  author       = {Jian Lin and
                  Dejun Yang and
                  Ming Li and
                  Jia Xu and
                  Guoliang Xue},
  title        = {BidGuard: {A} framework for privacy-preserving crowdsensing incentive
                  mechanisms},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {145--153},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860480},
  doi          = {10.1109/CNS.2016.7860480},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LinYLXX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LuP16,
  author       = {Rui Lu and
                  Derek Chi{-}Wai Pao},
  title        = {Optimized Aho-Corasick string matching algorithm for smart phones},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {342--343},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860502},
  doi          = {10.1109/CNS.2016.7860502},
  timestamp    = {Thu, 20 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LuP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MadaniV16,
  author       = {Pooria Madani and
                  Natalija Vlajic},
  title        = {Towards sequencing malicious system calls},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {376--377},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860519},
  doi          = {10.1109/CNS.2016.7860519},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MadaniV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MansourBS16,
  author       = {Ahmed S. Mansour and
                  Holger Boche and
                  Rafael F. Schaefer},
  title        = {List decoding for arbitrarily varying wiretap channels},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {611--615},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860558},
  doi          = {10.1109/CNS.2016.7860558},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MansourBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MartensAEM16,
  author       = {Marcus M{\"{a}}rtens and
                  Hadi Asghari and
                  Michel van Eeten and
                  Piet Van Mieghem},
  title        = {A time-dependent SIS-model for long-term computer worm evolution},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {207--215},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860487},
  doi          = {10.1109/CNS.2016.7860487},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MartensAEM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MartinezCT16,
  author       = {Daniel T. Martinez and
                  Claire M. Cochrane and
                  Chiu C. Tan},
  title        = {Encryption-based privacy protection for police body-worn cameras},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {364--365},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860513},
  doi          = {10.1109/CNS.2016.7860513},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MartinezCT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MichaelsAU16,
  author       = {Spencer Michaels and
                  Kemal Akkaya and
                  A. Selcuk Uluagac},
  title        = {Inducing data loss in Zigbee networks via join/association handshake
                  spoofing},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {401--405},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860527},
  doi          = {10.1109/CNS.2016.7860527},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MichaelsAU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MingX16,
  author       = {Jonathan Ming and
                  Mengjun Xie},
  title        = {Remote live forensics for Android devices},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {374--375},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860518},
  doi          = {10.1109/CNS.2016.7860518},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MingX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MohsinAHAR16,
  author       = {Mujahid Mohsin and
                  Zahid Anwar and
                  Ghaith Husari and
                  Ehab Al{-}Shaer and
                  Mohammad Ashiqur Rahman},
  title        = {IoTSAT: {A} formal framework for security analysis of the internet
                  of things (IoT)},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {180--188},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860484},
  doi          = {10.1109/CNS.2016.7860484},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MohsinAHAR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MukherjeeU16,
  author       = {Pritam Mukherjee and
                  Sennur Ulukus},
  title        = {Covert bits through queues},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {626--630},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860561},
  doi          = {10.1109/CNS.2016.7860561},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MukherjeeU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/OlmoF16,
  author       = {Jaume del Olmo and
                  Javier Rodr{\'{\i}}guez Fonollosa},
  title        = {Strong secrecy on a class of Degraded Broadcast Channels using polar
                  codes},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {601--605},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860556},
  doi          = {10.1109/CNS.2016.7860556},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/OlmoF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PanW016,
  author       = {Yao Pan and
                  Jules White and
                  Yu Sun},
  title        = {Assessing the threat of web worker distributed attacks},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {306--314},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860498},
  doi          = {10.1109/CNS.2016.7860498},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PanW016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PengGSSLH16,
  author       = {Wei Peng and
                  Tianchong Gao and
                  Devkishen Sisodia and
                  Tanay Kumar Saha and
                  Feng Li and
                  Mohammad Al Hasan},
  title        = {{ACTS:} Extracting Android App topologiCal signature through graphleT
                  Sampling},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {37--45},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860468},
  doi          = {10.1109/CNS.2016.7860468},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PengGSSLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PhamAV16,
  author       = {Luan Huy Pham and
                  Massimiliano Albanese and
                  Sridhar Venkatesan},
  title        = {A quantitative risk assessment framework for adaptive Intrusion Detection
                  in the cloud},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {489--497},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860540},
  doi          = {10.1109/CNS.2016.7860540},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PhamAV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PisharodyCH16,
  author       = {Sandeep Pisharody and
                  Ankur Chowdhary and
                  Dijiang Huang},
  title        = {Security policy checking in distributed {SDN} based clouds},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {19--27},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860466},
  doi          = {10.1109/CNS.2016.7860466},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PisharodyCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PradhanNVKB16,
  author       = {Parth Pradhan and
                  Kyatsandra G. Nagananda and
                  Parv Venkitasubramaniam and
                  Shalinee Kishore and
                  Rick S. Blum},
  title        = {{GPS} spoofing attack characterization and detection in smart grids},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {391--395},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860525},
  doi          = {10.1109/CNS.2016.7860525},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PradhanNVKB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RahbariK16,
  author       = {Hanif Rahbari and
                  Marwan Krunz},
  title        = {Rolling preambles: Mitigating stealthy {FO} estimation attacks in
                  OFDM-based 802.11 systems},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {118--126},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860477},
  doi          = {10.1109/CNS.2016.7860477},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RahbariK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RahmanFDA16,
  author       = {Mohammad Ashiqur Rahman and
                  Abdullah Al Farooq and
                  Amarjit Datta and
                  Ehab Al{-}Shaer},
  title        = {Automated synthesis of resiliency configurations for cyber networks},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {243--251},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860491},
  doi          = {10.1109/CNS.2016.7860491},
  timestamp    = {Sun, 30 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/RahmanFDA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RashidiF16,
  author       = {Bahman Rashidi and
                  Carol J. Fung},
  title        = {XDroid: An Android permission control using Hidden Markov chain and
                  online learning},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {46--54},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860469},
  doi          = {10.1109/CNS.2016.7860469},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RashidiF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Rawat16,
  author       = {Danda B. Rawat},
  title        = {Analyzing energy efficient physical layer security in large-scale
                  {MIMO} enabled {CRN} with QoS requirements},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {465--471},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860537},
  doi          = {10.1109/CNS.2016.7860537},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Rawat16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ReimairKM16,
  author       = {Florian Reimair and
                  Christian Kollmann and
                  Alexander Marsalek},
  title        = {Emulating {U2F} authenticator devices},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {543--551},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860546},
  doi          = {10.1109/CNS.2016.7860546},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ReimairKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ReimairPRE16,
  author       = {Florian Reimair and
                  Bernd Pr{\"{u}}nster and
                  Andreas Reiter and
                  Christian Ertler},
  title        = {Applied dynamic policy selection},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {507--515},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860542},
  doi          = {10.1109/CNS.2016.7860542},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ReimairPRE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SanatiniaN16,
  author       = {Amirali Sanatinia and
                  Guevara Noubir},
  title        = {Honey Onions: {A} framework for characterizing and identifying misbehaving
                  Tor HSDirs},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {127--135},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860478},
  doi          = {10.1109/CNS.2016.7860478},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SanatiniaN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SchabhuserDB16,
  author       = {Lucas Schabh{\"{u}}ser and
                  Denise Demirel and
                  Johannes Buchmann},
  title        = {An unconditionally hiding auditing procedure for computations over
                  distributed data},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {552--560},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860547},
  doi          = {10.1109/CNS.2016.7860547},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SchabhuserDB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShenMSL16,
  author       = {Dakun Shen and
                  Ian D. Markwood and
                  Dan Shen and
                  Yao Liu},
  title        = {Virtual Safe: Unauthorized movement detection for mobile devices},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {315--323},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860499},
  doi          = {10.1109/CNS.2016.7860499},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ShenMSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShiS16,
  author       = {Yi Shi and
                  Yalin E. Sagduyu},
  title        = {Spectrum learning and access for cognitive satellite communications
                  under jamming},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {472--479},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860538},
  doi          = {10.1109/CNS.2016.7860538},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ShiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShinKCH16,
  author       = {SeongHan Shin and
                  Kazukuni Kobara and
                  Chia{-}Chuan Chuang and
                  Weicheng Huang},
  title        = {A security framework for {MQTT}},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {432--436},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860532},
  doi          = {10.1109/CNS.2016.7860532},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ShinKCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SoysaCM16,
  author       = {Madushanka Soysa and
                  Pamela C. Cosman and
                  Laurence B. Milstein},
  title        = {Video cognitive radio networks for tactical scenarios},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {457--464},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860536},
  doi          = {10.1109/CNS.2016.7860536},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SoysaCM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SpauldingKUM16,
  author       = {Jeffrey Spaulding and
                  Ah Reum Kang and
                  Shambhu J. Upadhyaya and
                  Aziz Mohaisen},
  title        = {A user study of the effectiveness of typosquatting techniques},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {360--361},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860511},
  doi          = {10.1109/CNS.2016.7860511},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SpauldingKUM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Suh-LeeJK16,
  author       = {Candace Suh{-}Lee and
                  Ju{-}Yeon Jo and
                  Yoohwan Kim},
  title        = {Text mining for security threat detection discovering hidden information
                  in unstructured log messages},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {252--260},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860492},
  doi          = {10.1109/CNS.2016.7860492},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Suh-LeeJK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SunDLSY16,
  author       = {Xiaoyan Sun and
                  Jun Dai and
                  Peng Liu and
                  Anoop Singhal and
                  John Yen},
  title        = {Towards probabilistic identification of zero-day attack paths},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {64--72},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860471},
  doi          = {10.1109/CNS.2016.7860471},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SunDLSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Suthaharan16,
  author       = {Shan Suthaharan},
  title        = {A correlation-based subspace analysis for data confidentiality and
                  classification as utility in {CPS}},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {426--431},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860531},
  doi          = {10.1109/CNS.2016.7860531},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/Suthaharan16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SuthaharanS16,
  author       = {Shan Suthaharan and
                  Weining Shen},
  title        = {Pairing of most relevant variables and bootstrap samples with ridge
                  regression for data sharing},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {384--385},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860523},
  doi          = {10.1109/CNS.2016.7860523},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SuthaharanS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Takabi16,
  author       = {Hassan Takabi},
  title        = {Firewall for brain: Towards a privacy preserving ecosystem for {BCI}
                  applications},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {370--371},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860516},
  doi          = {10.1109/CNS.2016.7860516},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Takabi16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TangYKH16,
  author       = {Bo Tang and
                  Jun Yan and
                  Steven Kay and
                  Haibo He},
  title        = {Detection of false data injection attacks in smart grid under colored
                  Gaussian noise},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {172--179},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860483},
  doi          = {10.1109/CNS.2016.7860483},
  timestamp    = {Wed, 11 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TangYKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TaylorS16,
  author       = {Curtis R. Taylor and
                  Craig A. Shue},
  title        = {Validating security protocols with cloud-based middleboxes},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {261--269},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860493},
  doi          = {10.1109/CNS.2016.7860493},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TaylorS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ThompsonMC16,
  author       = {Brian Thompson and
                  James R. Morris{-}King and
                  Hasan Cam},
  title        = {Effectiveness of proactive reset for mitigating impact of stealthy
                  attacks on networks of autonomous systems},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {437--441},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860533},
  doi          = {10.1109/CNS.2016.7860533},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ThompsonMC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TianYY16,
  author       = {Yifan Tian and
                  Jiawei Yuan and
                  Shucheng Yu},
  title        = {{SBPA:} Social behavior based cross Social Network phishing attacks},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {366--367},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860514},
  doi          = {10.1109/CNS.2016.7860514},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TianYY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TrappeG16,
  author       = {Wade Trappe and
                  Andrey Garnaev},
  title        = {Bargaining over secrecy and reliability for low {SNR} {OFDM} communications},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {596--600},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860555},
  doi          = {10.1109/CNS.2016.7860555},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TrappeG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TuGLP16,
  author       = {Wenwen Tu and
                  Mario Goldenbaum and
                  Lifeng Lai and
                  H. Vincent Poor},
  title        = {Multiple key generation with restricted public discussion structure},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {641--645},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860564},
  doi          = {10.1109/CNS.2016.7860564},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TuGLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Vasilomanolakis16,
  author       = {Emmanouil Vasilomanolakis and
                  Michael Stahn and
                  Carlos Garcia Cordero and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {On probe-response attacks in Collaborative Intrusion Detection Systems},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {279--286},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860495},
  doi          = {10.1109/CNS.2016.7860495},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Vasilomanolakis16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/VenkatesanAAJW16,
  author       = {Sridhar Venkatesan and
                  Massimiliano Albanese and
                  Kareem Amin and
                  Sushil Jajodia and
                  Mason Wright},
  title        = {A moving target defense approach to mitigate DDoS attacks against
                  proxy-based architectures},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {198--206},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860486},
  doi          = {10.1109/CNS.2016.7860486},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/VenkatesanAAJW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/VenugopalanPS16,
  author       = {Vivek Venugopalan and
                  Cameron D. Patterson and
                  Devu Manikantan Shila},
  title        = {Detecting and thwarting hardware trojan attacks in cyber-physical
                  systems},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {421--425},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860530},
  doi          = {10.1109/CNS.2016.7860530},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/VenugopalanPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Walsh16,
  author       = {Kevin Walsh},
  title        = {{TLS} with trustworthy certificate authorities},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {516--524},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860543},
  doi          = {10.1109/CNS.2016.7860543},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Walsh16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangSTHW16,
  author       = {Xuanxuan Wang and
                  Rafael F. Schaefer and
                  Lars Thiele and
                  Thomas Haustein and
                  Yongming Wang},
  title        = {Ergodic secrecy sum rate for multiuser {MIMO} downlink systems using
                  block diagonalization},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {636--640},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860563},
  doi          = {10.1109/CNS.2016.7860563},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangSTHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WebbR16,
  author       = {Allen T. Webb and
                  A. L. Narasima Reddy},
  title        = {Finding proxy users at the service using anomaly detection},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {82--90},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860473},
  doi          = {10.1109/CNS.2016.7860473},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WebbR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WeiYTLY16,
  author       = {Zhexiong Wei and
                  F. Richard Yu and
                  Helen Tang and
                  Chengehao Liang and
                  Qiao Yan},
  title        = {Securing cognitive radio vehicular Ad hoc networks with trusted lightweight
                  cloud computing},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {450--456},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860535},
  doi          = {10.1109/CNS.2016.7860535},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/WeiYTLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WieseO16,
  author       = {Moritz Wiese and
                  Tobias J. Oechtering},
  title        = {Secure distributed estimation of linear systems},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {616--620},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860559},
  doi          = {10.1109/CNS.2016.7860559},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WieseO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WuBDJ16,
  author       = {Longfei Wu and
                  Benjamin Brandt and
                  Xiaojiang Du and
                  Bo Ji},
  title        = {Analysis of clickjacking attacks and an effective defense scheme for
                  Android devices},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {55--63},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860470},
  doi          = {10.1109/CNS.2016.7860470},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WuBDJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XinSN16,
  author       = {Liangxiao Xin and
                  David Starobinski and
                  Guevara Noubir},
  title        = {Cascading denial of service attacks on Wi-Fi networks},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {91--99},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860474},
  doi          = {10.1109/CNS.2016.7860474},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XinSN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YangCC16,
  author       = {Huan Yang and
                  Liang Cheng and
                  Mooi Choo Chuah},
  title        = {Evaluation of utility-privacy trade-offs of data manipulation techniques
                  for smart metering},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {396--400},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860526},
  doi          = {10.1109/CNS.2016.7860526},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YangCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YuCZY16,
  author       = {Xiaoqi Yu and
                  Nairen Cao and
                  Jun Zhang and
                  Siu{-}Ming Yiu},
  title        = {Dynamic Proofs of Retrievability with improved worst case overhead},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {576--580},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860551},
  doi          = {10.1109/CNS.2016.7860551},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YuCZY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YuLWW16,
  author       = {Wenqian Yu and
                  Weigang Li and
                  Junyuan Wang and
                  Changzheng Wei},
  title        = {A study of {HSM} based key protection in encryption file system},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {352--353},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860507},
  doi          = {10.1109/CNS.2016.7860507},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/YuLWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YuPSB16,
  author       = {Paul L. Yu and
                  Jake B. Perazzone and
                  Brian M. Sadler and
                  Rick S. Blum},
  title        = {Authenticated side channel via physical layer fingerprinting},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {631--635},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860562},
  doi          = {10.1109/CNS.2016.7860562},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YuPSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZewailY16,
  author       = {Ahmed A. Zewail and
                  Aylin Yener},
  title        = {Coded caching for resolvable networks with security requirements},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {621--625},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860560},
  doi          = {10.1109/CNS.2016.7860560},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZewailY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangWSJZZ16,
  author       = {Zhengguang Zhang and
                  Hong Wen and
                  Huanhuan Song and
                  Yixin Jiang and
                  Jinling Zhang and
                  Xiping Zhu},
  title        = {A {MIMO} cross-layer secure communication scheme based on spatial
                  modulation},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {350--351},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860506},
  doi          = {10.1109/CNS.2016.7860506},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangWSJZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangWSJZZZ16,
  author       = {Jinling Zhang and
                  Hong Wen and
                  Huanhuan Song and
                  Yixin Jiang and
                  Zhengguang Zhang and
                  Luping Zhang and
                  Xiping Zhu},
  title        = {Using Basis Expansion Model for Physical Layer Authentication in Time-Variant
                  System},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {348--349},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860505},
  doi          = {10.1109/CNS.2016.7860505},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangWSJZZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangWSTJDZ16,
  author       = {Luping Zhang and
                  Hong Wen and
                  Huanhuan Song and
                  Jie Tang and
                  Yixin Jiang and
                  Weihua Dong and
                  Xiping Zhu},
  title        = {The performance of the {MIMO} physical layer security system with
                  imperfect {CSI}},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {346--347},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860504},
  doi          = {10.1109/CNS.2016.7860504},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangWSTJDZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhengPGZM16,
  author       = {Chengyu Zheng and
                  Mila Dalla Preda and
                  Jorge Granjal and
                  Stefano Zanero and
                  Federico Maggi},
  title        = {On-chip system call tracing: {A} feasibility study and open prototype},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {73--81},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860472},
  doi          = {10.1109/CNS.2016.7860472},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhengPGZM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZiadAAS16,
  author       = {M. Tarek Ibn Ziad and
                  Amr Al{-}Anwar and
                  Moustafa Alzantot and
                  Mani B. Srivastava},
  title        = {CryptoImg: Privacy preserving processing over encrypted images},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {570--575},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860550},
  doi          = {10.1109/CNS.2016.7860550},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZiadAAS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2016,
  title        = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7854080/proceeding},
  isbn         = {978-1-5090-3065-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics