Search dblp for Publications

export results for "toc:db/conf/securecomm/securecomm2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/securecomm/AaferDY13,
  author       = {Yousra Aafer and
                  Wenliang Du and
                  Heng Yin},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {DroidAPIMiner: Mining API-Level Features for Robust Malware Detection
                  in Android},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {86--103},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_6},
  doi          = {10.1007/978-3-319-04283-1\_6},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/AaferDY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AbduallahRP13,
  author       = {Wafaa Mustafa Abduallah and
                  Abdul Monem S. Rahma and
                  Al{-}Sakib Khan Pathan},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Reversible Data Hiding Scheme Based on 3-Least Significant Bits and
                  Mix Column Transform},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {405--417},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_26},
  doi          = {10.1007/978-3-319-04283-1\_26},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/AbduallahRP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AvondsSAP13,
  author       = {Niels Avonds and
                  Raoul Strackx and
                  Pieter Agten and
                  Frank Piessens},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Salus: Non-hierarchical Memory Access Rights to Enforce the Principle
                  of Least Privilege},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {252--269},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_16},
  doi          = {10.1007/978-3-319-04283-1\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/AvondsSAP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/CesareXZ13,
  author       = {Silvio Cesare and
                  Yang Xiang and
                  Jun Zhang},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Clonewise - Detecting Package-Level Clones Using Machine Learning},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {197--215},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_13},
  doi          = {10.1007/978-3-319-04283-1\_13},
  timestamp    = {Sun, 11 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/CesareXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ChowdhuryCA13,
  author       = {Belal Chowdhury and
                  Morshed U. Chowdhury and
                  Jemal H. Abawajy},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Securing a Web-Based Anti-counterfeit {RFID} System},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {342--355},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_21},
  doi          = {10.1007/978-3-319-04283-1\_21},
  timestamp    = {Mon, 28 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ChowdhuryCA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/CuiFSL13,
  author       = {Xiang Cui and
                  Binxing Fang and
                  Jinqiao Shi and
                  Chaoge Liu},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional
                  Communication Botnets},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {53--68},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_4},
  doi          = {10.1007/978-3-319-04283-1\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/CuiFSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/CuiMA13,
  author       = {Hui Cui and
                  Yi Mu and
                  Man Ho Au},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Public-Key Encryption Resilient to Linear Related-Key Attacks},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {182--196},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_12},
  doi          = {10.1007/978-3-319-04283-1\_12},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/CuiMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ElashryMS13,
  author       = {Ibrahim F. Elashry and
                  Yi Mu and
                  Willy Susilo},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Generic Mediated Encryption},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {154--168},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_10},
  doi          = {10.1007/978-3-319-04283-1\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ElashryMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/FarleyW13,
  author       = {Ryan Farley and
                  Xinyuan Wang},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat
                  and Mitigation},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {104--121},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_7},
  doi          = {10.1007/978-3-319-04283-1\_7},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/FarleyW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/HongK13,
  author       = {Jin B. Hong and
                  Dong Seong Kim},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Scalable Security Model Generation and Analysis Using k-importance
                  Measures},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {270--287},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_17},
  doi          = {10.1007/978-3-319-04283-1\_17},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/HongK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/JiangNSF13,
  author       = {Jun Jiang and
                  Meining Nie and
                  Purui Su and
                  Dengguo Feng},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud
                  Computing},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {122--139},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_8},
  doi          = {10.1007/978-3-319-04283-1\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/JiangNSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/KaosarMIY13,
  author       = {Mohammed Kaosar and
                  Quazi Mamun and
                  Md. Rafiqul Islam and
                  Xun Yi},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {380--392},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_24},
  doi          = {10.1007/978-3-319-04283-1\_24},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/KaosarMIY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/KarapistoliE13,
  author       = {Eirini D. Karapistoli and
                  Anastasios A. Economides},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Anomaly Detection in Beacon-Enabled {IEEE} 802.15.4 Wireless Sensor
                  Networks},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_1},
  doi          = {10.1007/978-3-319-04283-1\_1},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/KarapistoliE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LiHYGLZ13,
  author       = {Miao Li and
                  Liangsheng He and
                  Tongjie Yang and
                  Neng Gao and
                  Zongbin Liu and
                  Qinglong Zhang},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {An Efficient Reconfigurable {II-ONB} Modular Multiplier},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {169--181},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_11},
  doi          = {10.1007/978-3-319-04283-1\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/LiHYGLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/MamunIK13,
  author       = {Quazi Mamun and
                  Md. Rafiqul Islam and
                  Mohammed Kaosar},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Ensuring Data Integrity by Anomaly Node Detection during Data Gathering
                  in WSNs},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {367--379},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_23},
  doi          = {10.1007/978-3-319-04283-1\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/MamunIK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/MasudIA13,
  author       = {Md. Anwar Hossain Masud and
                  Md. Rafiqul Islam and
                  Jemal H. Abawajy},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Security Concerns and Remedy in a Cloud Based E-learning System},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {356--366},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_22},
  doi          = {10.1007/978-3-319-04283-1\_22},
  timestamp    = {Mon, 28 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/MasudIA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/MoonsamyRLLB13,
  author       = {Veelasha Moonsamy and
                  Jia Rong and
                  Shaowu Liu and
                  Gang Li and
                  Lynn Margaret Batten},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Contrasting Permission Patterns between Clean and Malicious Android
                  Applications},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {69--85},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_5},
  doi          = {10.1007/978-3-319-04283-1\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/MoonsamyRLLB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/MsgnaMM13,
  author       = {Mehari Msgna and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {The B-Side of Side Channel Leakage: Control Flow Security in Embedded
                  Systems},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {288--304},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_18},
  doi          = {10.1007/978-3-319-04283-1\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/MsgnaMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/NishimotoKMHS13,
  author       = {Yuuki Nishimoto and
                  Naoya Kajiwara and
                  Shinichi Matsumoto and
                  Yoshiaki Hori and
                  Kouichi Sakurai},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Detection of Android {API} Call Using Logging Mechanism within Android
                  Framework},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {393--404},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_25},
  doi          = {10.1007/978-3-319-04283-1\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/NishimotoKMHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/PlateauxLCVMR13,
  author       = {Aude Plateaux and
                  Patrick Lacharme and
                  Vincent Coquet and
                  Sylvain Vernois and
                  Kumar Murty and
                  Christophe Rosenberger},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {An e-payment Architecture Ensuring a High Level of Privacy Protection},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {305--322},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_19},
  doi          = {10.1007/978-3-319-04283-1\_19},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/PlateauxLCVMR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/RuanYW13,
  author       = {Xin Ruan and
                  Chuan Yue and
                  Haining Wang},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Unveiling Privacy Setting Breaches in Online Social Networks},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {323--341},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_20},
  doi          = {10.1007/978-3-319-04283-1\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/RuanYW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/VaradharajanT13,
  author       = {Vijay Varadharajan and
                  Udaya Kiran Tupakula},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Integrated Security Architecture for Virtual Machines},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {140--153},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_9},
  doi          = {10.1007/978-3-319-04283-1\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/VaradharajanT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/WangHCMY13,
  author       = {Fei Wang and
                  Liusheng Huang and
                  Zhili Chen and
                  Haibo Miao and
                  Wei Yang},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {A Novel Web Tunnel Detection Method Based on Protocol Behaviors},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {234--251},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_15},
  doi          = {10.1007/978-3-319-04283-1\_15},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/WangHCMY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/WangSLYYF13,
  author       = {Minghua Wang and
                  Purui Su and
                  Qi Li and
                  Lingyun Ying and
                  Yi Yang and
                  Dengguo Feng},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Automatic Polymorphic Exploit Generation for Software Vulnerabilities},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {216--233},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_14},
  doi          = {10.1007/978-3-319-04283-1\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/WangSLYYF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/XieHYB13,
  author       = {Mengjun Xie and
                  Liang Hao and
                  Kenji Yoshigoe and
                  Jiang Bian},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {CamTalk: {A} Bidirectional Light Communications Framework for Secure
                  Communications on Smartphones},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {35--52},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_3},
  doi          = {10.1007/978-3-319-04283-1\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/XieHYB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZhouLZXL13,
  author       = {Ting Zhou and
                  Yaping Lin and
                  Wei Zhang and
                  Sheng Xiao and
                  Jinguo Li},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {19--34},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_2},
  doi          = {10.1007/978-3-319-04283-1\_2},
  timestamp    = {Tue, 19 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZhouLZXL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2013,
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1},
  doi          = {10.1007/978-3-319-04283-1},
  isbn         = {978-3-319-04282-4},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics