1939-0114
Volume 2018, 2018
An Efficient High-Throughput and Low-Latency SYN Flood Defender for High-Speed Networks.

Duc-Minh Ngo Cuong Pham-Quoc Tran Ngoc Thinh

Generalized Bootstrapping Technique Based on Block Equality Test Algorithm.

Xiufeng Zhao Ailan Wang

Optimal Improper Gaussian Signaling for Physical Layer Security in Cognitive Radio Networks.

Guilherme Oliveira Evelio M. G. Fernández Samuel Baraldi Mafra Samuel Montejo Sánchez Cesar A. Azurdia-Meza

Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection.

Rafal Kozik Marek Pawlicki Michal Choras

A More Efficient Fully Homomorphic Encryption Scheme Based on GSW and DM Schemes.

Xun Wang Tao Luo Jianfeng Li

Analysis on Matrix GSW-FHE and Optimizing Bootstrapping.

Xiufeng Zhao Hefeng Mao Shuai Liu Weitao Song Bo Zhang

Corrigendum to "Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS".

Weizhong Qiang Shizhen Wang Hai Jin Jiangying Zhong

Application of Temperature Prediction Based on Neural Network in Intrusion Detection of IoT.

Xuefei Liu Chao Zhang Pingzeng Liu Maoling Yan Baojia Wang Jianyong Zhang Russell Higgs

Identity-Based Proxy Signcryption Protocol with Universal Composability.

Huifang Yu Zhicang Wang Jianmin Li Xinzhe Gao

5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks.

Pablo Salva-Garcia Jose M. Alcaraz Calero Qi Wang Jorge Bernal Bernabé Antonio F. Skarmeta

GANs Based Density Distribution Privacy-Preservation on Mobility Data.

Dan Yin Qing Yang

Detection Method for Distributed Web-Crawlers: A Long-Tail Threshold Model.

Inwoo Ro Joong Soo Han Eul Gyu Im

DR-Net: A Novel Generative Adversarial Network for Single Image Deraining.

Chen Li Yecai Guo Qi Liu Xiaodong Liu

Research on Plaintext Restoration of AES Based on Neural Network.

Xinyi Hu Yaqun Zhao

Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing.

Jieren Cheng Mengyang Li Xiangyan Tang Victor S. Sheng Yifu Liu Wei Guo

Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment.

Xiaodan Gu Ming Yang Yiting Zhang Peilong Pan Zhen Ling

Construction of a New Biometric-Based Key Derivation Function and Its Application.

Minhye Seo Jong Hwan Park Youngsam Kim Sangrae Cho Dong Hoon Lee Jung Yeon Hwang

On the Performance of Power Splitting Energy Harvested Wireless Full-Duplex Relaying Network with Imperfect CSI over Dissimilar Channels.

Tan N. Nguyen Minh Tran Phuong T. Tran Phu Tran Tin Thanh-Long Nguyen Duy-Hung Ha Miroslav Voznák

Multibiometric Fusion Authentication in Wireless Multimedia Environment Using Dynamic Bayesian Method.

Zhendong Wu Jiajia Yang Jianwu Zhang Hengli Yue

A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service.

Jian Song Guangsong Li Bo-ru Xu Chuangui Ma

Asynchronous Group Authentication Based on Geometric Approach.

Hong Wang Jianhua Li Feng Zhu Zhe Wang

Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking.

Weiwei Liu Guangjie Liu Yang Xia Xiaopeng Ji Jiangtao Zhai Yuewei Dai

Robust Visual Secret Sharing Scheme Applying to QR Code.

Longdan Tan Kesheng Liu Xuehu Yan Lintao Liu Tianqi Lu Jinrui Chen Feng Liu Yuliang Lu

Applied Cryptography and Noise Resistant Data Security.

Iqtadar Hussain Fawad Ahmed Umar Mujahid Khokhar Amir Anees

Fake and Real Massaging at the Same Time with QR Code in Web Services for Different Users.

Mirsat Yesiltepe Muhammet Kurulay

An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization.

Naveed Ahmed Azam Umar Hayat Ikram Ullah

Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis.

Thanh Hai Nguyen Mason Wright Michael P. Wellman Satinder Singh

Covert Communication Networks in Hostile Environments.

Kiseon Kim Jalel Ben-Othman Prem Mahalik

An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature.

Xiling Luo Zequan Zhou Lin Zhong Jian Mao Chaoyong Chen

Practical Suitability and Experimental Assessment of Tree ORAMs.

Kholoud Al-Saleh Abdelfettah Belghith

Use of Data Visualisation for Zero-Day Malware Detection.

Sitalakshmi Venkatraman Mamoun Alazab

Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud.

Zhenghong Wang Zhangjie Fu Xingming Sun

A Robust Watermarking Scheme Based on the Mean Modulation of DWT Coefficients.

Zied Kricha Anis Kricha Anis Sakly

RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys.

Rahul Saha G. Geetha Gulshan Kumar Tai-Hoon Kim

A Study on Effectiveness Evaluation for the Physical Protection System of a High Security Prison Based on the Cloud Model.

Ke Yin

CAFA: A Checksum-Aware Fuzzing Assistant Tool for Coverage Improvement.

Xiaolong Liu Qiang Wei Qingxian Wang Zheng Zhao Zhongxu Yin

Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key.

Jiguo Li Shengzhou Hu Yichen Zhang

An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map.

Guodong Ye Kaixin Jiao Chen Pan Xiaoling Huang

A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN.

Haosu Cheng Jianwei Liu Jian Mao Mengmeng Wang Jie Chen Jingdong Bian

A Relative Phase Based Audio Integrity Protection Method: Model and Strategy.

Zhaozheng Li Weimin Lei Wei Zhang KwangHyok Jo

FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things.

Youwen Zhu Yue Zhang Jiabin Yuan Xianmin Wang

RPAR: Location Privacy Preserving via Repartitioning Anonymous Region in Mobile Social Network.

Jinquan Zhang Yanfeng Yuan Xiao Wang Lina Ni Jiguo Yu Mengmeng Zhang

A Novel Blind and Robust Video Watermarking Technique in Fast Motion Frames Based on SVD and MR-SVD.

Imen Nouioua Nouredine Amardjia Sarra Belilita

Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks.

Ugur Coruh Oguz Bayat

A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network.

Chunpeng Ge Jinyue Xia Aaron Wu Hongwei Li Yao Wang

Assessment of Secure OpenID-Based DAAA Protocol for Avoiding Session Hijacking in Web Applications.

Muhammad Bilal Muhammad Asif Abid Bashir

A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing.

Xin Wang Bo Yang Zhe Xia Yanqi Zhao Huifang Yu

An Ensemble Learning Method for Wireless Multimedia Device Identification.

Zhen Zhang Yibing Li Chao Wang Meiyu Wang Ya Tu Jin Wang

Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning.

Jieren Cheng Chen Zhang Xiangyan Tang Victor S. Sheng Zhe Dong Junqi Li

A Secure Multimedia Data Sharing Scheme for Wireless Network.

Liming Fang Liang Liu Jinyue Xia Maosheng Sun

A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord.

Riccardo Pecori Luca Veltri

System to Safeguard the Identity of Persons in Photographs through Cryptography and Steganography Techniques Using Chaos.

Octavio Flores Siordia Juan Carlos Estrada Gutiérrez Carlos Eduardo Padilla Leyferman Jorge Aguilar Santiago Maricela Jiménez Rodríguez

Research on Trajectory Data Releasing Method via Differential Privacy Based on Spatial Partition.

Qilong Han Zuobin Xiong Kejia Zhang

Test Sequence Reduction of Wireless Protocol Conformance Testing to Internet of Things.

Weiwei Lin Hongwei Zeng Honghao Gao Huaikou Miao Xiaolin Wang

A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs.

Rutvij H. Jhaveri Aneri Desai Ankit Patel Yubin Zhong

ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification.

Baoyuan Kang Lin Si Hong Jiang Chunqing Li Mingming Xie

Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS.

Weizhong Qiang Shizhen Wang Hai Jin

Scheduling Parallel Intrusion Detecting Applications on Hybrid Clouds.

Yi Zhang Jin Sun Zebin Wu Shuangyu Xie Ruitao Xu

Security and Communication Networks Behaviors of High-Frequency Subscribers in Cellular Data Networks.

Jingtao Li Yang Liu Wengang Pei Zhen Cao

A General Architecture for Multiserver Authentication Key Agreement with Provable Security.

Yunru Zhang Min Luo Kim-Kwang Raymond Choo Debiao He

An Improved Permission Management Scheme of Android Application Based on Machine Learning.

Shaozhang Niu Ruqiang Huang Wenbo Chen Yiming Xue

A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments.

Cheolhee Park Hyunil Kim Dowon Hong Changho Seo

Network Intrusion Detection Method Based on PCA and Bayes Algorithm.

Bing Zhang Zhiyang Liu Yanguo Jia Jiadong Ren Xiaolin Zhao

Towards a Secure and Borderless Collaboration between Organizations: An Automated Enforcement Mechanism.

Samira Haguouche Zahi Jarir

Privacy Preservation for Friend-Recommendation Applications.

Weicheng Wang Shengling Wang Jianhui Huang

Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption.

Qinlong Huang Yue He Wei Yue Yixian Yang

Key Substitution Attacks on Lattice Signature Schemes Based on SIS Problem.

Youngjoo An Hyang-Sook Lee Juhee Lee Seongan Lim

Energy-Efficient Cloudlet Management for Privacy Preservation in Wireless Metropolitan Area Networks.

Xiaolong Xu Rui Huang Ruihan Dou Yuancheng Li Jie Zhang Tao Huang Wenbin Yu

Multiview Ensemble Method for Detecting Shilling Attacks in Collaborative Recommender Systems.

Yaojun Hao Peng Zhang Fuzhi Zhang

Deep Learning Hash for Wireless Multimedia Image Content Security.

Yu Zheng Jiezhong Zhu Wei Fang Lian-Hua Chi

RoughDroid: Operative Scheme for Functional Android Malware Detection.

Khaled Riad Lishan Ke

Data-Driven and Low-Sparsity False Data Injection Attacks in Smart Grid.

Jiwei Tian Buhong Wang Xia Li

Achieving the Optimal k-Anonymity for Content Privacy in Interactive Cyberphysical Systems.

Jinbao Wang Ling Tian Yan Huang Donghua Yang Hong Gao

Towards a Novel Trust-Based Multicast Routing for VANETs.

Hui Xia Sanshun Zhang Benxia Li Li Li Xiangguo Cheng

Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor.

Taehwan Park Hwajeong Seo Junsub Kim Haeryong Park Howon Kim

Security Measurements of Cyber Networks.

Zheng Yan Yuqing Zhang Kim-Kwang Raymond Choo Yang Xiang

A Constraint-Aware Optimization Method for Concurrency Bug Diagnosis Service in a Distributed Cloud Environment.

Lili Bo Shujuan Jiang

A Novel Approach for Classifying MANETs Attacks with a Neutrosophic Intelligent System based on Genetic Algorithm.

Haitham Elwahsh Mona Gamal A. A. Salama Ibrahim M. El-Henawy

An Artificial Intelligence Approach to Financial Fraud Detection under IoT Environment: A Survey and Implementation.

Dahee Choi Kyungho Lee

Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms.

Karl Andersson Ilsun You Francesco Palmieri

A Novel Technique for the Construction of Safe Substitution Boxes Based on Cyclic and Symmetric Groups.

Abdul Razaq Hanan A. Al-Olayan Atta Ullah Arshad Riaz Adil Waheed

User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes.

Xiaoyu Ji Yushi Cheng Wenyuan Xu Xinyan Zhou

Differential Cryptanalysis on Block Cipher Skinny with MILP Program.

Pei Zhang Wenying Zhang

Differentially Private Recommendation System Based on Community Detection in Social Network Applications.

Gesu Li Zhipeng Cai Guisheng Yin Zaobo He Madhuri Siddula

A Privacy Protection Model of Data Publication Based on Game Theory.

Li Kuang Yujia Zhu Shuqi Li Xuejin Yan Han Yan Shuiguang Deng

An Evolutionary Computation Based Feature Selection Method for Intrusion Detection.

Yu Xue Weiwei Jia Xuejian Zhao Wei Pang

Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms.

Ye Yuan Junting Xiao Kazuhide Fukushima Shinsaku Kiyomoto Tsuyoshi Takagi

Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling.

Jungwoo Seo Sangjin Lee

A Closer Look at Intrusion Detection System for Web Applications.

Nancy Agarwal Syed Zeeshan Hussain

Reversible Data Hiding with Pixel Prediction and Additive Homomorphism for Encrypted Image.

Chunqiang Yu Xianquan Zhang Zhenjun Tang Yan Chen Jingyu Huang

Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing.

Yinghui Zhang Haonan Su Menglei Yang Dong Zheng Fang Ren Qinglan Zhao

Hardware/Software Adaptive Cryptographic Acceleration for Big Data Processing.

Chunhua Xiao Lei Zhang Yuhua Xie Weichen Liu Duo Liu

An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System.

Li Li Siqin Zhou Kim-Kwang Raymond Choo Xiaohong Li Debiao He

An Adaptive Audio Steganography for Covert Wireless Communication.

Guojiang Xin Yuling Liu Ting Yang Yu Cao

Improved Construction for Inner Product Functional Encryption.

Qingsong Zhao Qingkai Zeng Ximeng Liu

Multimedia Security: Novel Steganography and Privacy Preserving.

Zhenxing Qian Kim-Kwang Raymond Choo Rémi Cogranne Xinpeng Zhang

LA-GRU: Building Combined Intrusion Detection Model Based on Imbalanced Learning and Gated Recurrent Unit Neural Network.

Binghao Yan Guodong Han

HYBINT: A Hybrid Intelligence System for Critical Infrastructures Protection.

Javier Hingant Marcelo Zambrano Francisco J. Pérez Israel Pérez Manuel Esteve

Function-Aware Anomaly Detection Based on Wavelet Neural Network for Industrial Control Communication.

Ming Wan Yan Song Yuan Jing Junlu Wang

Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN.

Carlos Andres Lara-Nino Arturo Diaz-Perez Miguel Morales-Sandoval

Automatic Benchmark Generation Framework for Malware Detection.

Guanghui Liang Jianmin Pang Zheng Shan Runqing Yang Yihang Chen

Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications.

Marios Argyriou Nicola Dragoni Angelo Spognardi

Performance Analysis of Hyperledger Fabric Platforms.

Qassim Nasir Ilham A. Qasse Manar AbuTalib Ali Bou Nassif

Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation.

Nanda Kumar Thanigaivelan Ethiopia Nigussie Seppo Virtanen Jouni Isoaho

Towards Optimized DFA Attacks on AES under Multibyte Random Fault Model.

Ruyan Wang Xiaohan Meng Yang Li Jian Wang

Privacy-Preserving Sorting Algorithms Based on Logistic Map for Clouds.

Hua Dai Hui Ren Zhiye Chen Geng Yang Xun Yi

Corrigendum to "A New Metric for Flow-Level Filtering of Low-Rate DDoS Attacks".

Mehmet Simsek

Enhanced Adaptive Cloudlet Placement Approach for Mobile Application on Spark.

Yiwen Zhang Kaibin Wang Yuanyuan Zhou Qiang He

High Capacity Image Steganography Using Modified LSB Substitution and PVD against Pixel Difference Histogram Analysis.

Gandharba Swain

A Security Sandbox Approach of Android Based on Hook Mechanism.

Xin Jiang Mingzhe Liu Kun Yang Yanhua Liu Ruili Wang

Deep Learning Approaches for Predictive Masquerade Detection.

Wisam Elmasry Akhan Akbulut Abdul Halim Zaim

WS3N: Wireless Secure SDN-Based Communication for Sensor Networks.

Renan C. A. Alves Doriedson A. G. Oliveira Geovandro C. C. F. Pereira Bruno C. Albertini Cíntia B. Margi

Accountable and Transparent TLS Certificate Management: An Alternate Public-Key Infrastructure with Verifiable Trusted Parties.

Salabat Khan Zijian Zhang Liehuang Zhu Meng Li Qamas Gul Khan Safi Xiaobing Chen

A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization.

Jianjun Li Jie Yu Lanlan Xu Xinying Xue Chin-Chen Chang Xiaoyang Mao Junfeng Hu

Trust Management in Collaborative Systems for Critical Infrastructure Protection.

Nawal Ait Aali Amine Baïna Loubna Echabbi

Detecting Potential Insider Threat: Analyzing Insiders' Sentiment Exposed in Social Media.

Won Park Youngin You Kyungho Lee

Bootstrapping of FHE over the Integers with Large Message Space.

Zhizhu Lian Yupu Hu Hu Chen Baocang Wang

Identifying Fake Accounts on Social Networks Based on Graph Analysis and Classification Algorithms.

Mohammadreza Mohammadrezaei Mohammad Ebrahim Shiri Amir Masoud Rahmani

Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis.

Hao Hu Yuling Liu Hongqi Zhang Yuchen Zhang

Efficient Isogeny Computations on Twisted Edwards Curves.

Suhri Kim Kisoon Yoon Jihoon Kwon Seokhie Hong Young-Ho Park

A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection.

Zhaohui Zhang Xinxin Zhou Xiaobo Zhang Lizhi Wang Pengwei Wang

Cyberspace Security for Future Internet.

Dafang Zhang Guojun Wang Xin Wang Zhengyu Li Wenjia Li

A VQ-Based Joint Fingerprinting and Decryption Scheme for Secure and Efficient Image Distribution.

Ming Li Hua Ren En Zhang Wei Wang Lin Sun Di Xiao

A Privacy Preserving Approach to Collaborative Systemic Risk Identification: The Use-Case of Supply Chain Networks.

Tirazheh Zare Garizy Gilbert Fridgen Lars Wederhake

Moving Target Defense Techniques: A Survey.

Cheng Lei Hongqi Zhang Jing-Lei Tan Yu-Chen Zhang Xiao-Hu Liu

Street-Level Landmark Evaluation Based on Nearest Routers.

Ruixiang Li Yuchen Sun Jianwei Hu Te Ma Xiangyang Luo

Privacy-Preserving Oriented Floating-Point Number Fully Homomorphic Encryption Scheme.

Shuangjie Bai Geng Yang Jingqi Shi Guoxiu Liu Zhaoe Min

High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift.

Dinh-Chien Nguyen Thai-Son Nguyen Chin-Chen Chang Huan-Sheng Hsueh Fang-Rong Hsu

A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing.

Xingshuo An Fuhong Lin Shenggang Xu Li Miao Chao Gong

Steganography Algorithm Based on the Nonlocal Maximum Likelihood Noise Estimation for Mobile Applications.

Blanca E. Carvajal-Gámez Manuel Alejandro Díaz-Casco

A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT.

Tong Li Wenbin Chen Yi Tang Hongyang Yan

Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity.

Dongwoo Kang Jaewook Jung Hyoungshick Kim Youngsook Lee Dongho Won

Design and Analysis of Push Notification-Based Malware on Android.

Sangwon Hyun Junsung Cho Geumhwan Cho Hyoungshick Kim

Control Method for Sampled-Data Systems with Multiple Channels Based on Deadband-Triggered Scheme.

Ying-Ying Liu Yun-kai Chu

An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks.

Sahel Alouneh Feras Al-Hawari Ismail Hababeh Gheorghita Ghinea

Secure and Efficient Image Retrieval over Encrypted Cloud Data.

Haihua Liang Xinpeng Zhang Hang Cheng Qiuhan Wei

Blockchain Based Credibility Verification Method for IoT Entities.

Chao Qu Ming Tao Jie Zhang Xiaoyu Hong Ruifen Yuan

A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing.

Guoxiu Liu Geng Yang Huaqun Wang Yang Xiang Hua Dai

Session Fingerprinting in Android via Web-to-App Intercommunication.

Efthimios Alepis Constantinos Patsakis

A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience.

Yinghui Zhang Pengzhen Lang Dong Zheng Menglei Yang Rui Guo

An Imbalanced Malicious Domains Detection Method Based on Passive DNS Traffic Analysis.

Zhenyan Liu Yifei Zeng Pengfei Zhang Jingfeng Xue Ji Zhang Jiangtao Liu

A UAV-Aided Cluster Head Election Framework and Applying Such to Security-Driven Cluster Head Election Schemes: A Survey.

Gicheol Wang Byoung-Sun Lee Jae Young Ahn Gihwan Cho

Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework.

Jaewoo Shim Kyeonghwan Lim Seong-je Cho Sangchul Han Minkyu Park

Security Evaluation Framework for Military IoT Devices.

Sungyong Cha Seungsoo Baek Sooyoung Kang Seungjoo Kim

A Secure Incentive Scheme for Vehicular Delay Tolerant Networks Using Cryptocurrency.

Youngho Park Chul Sur Kyung-Hyune Rhee

Android Malware Characterization Using Metadata and Machine Learning Techniques.

Ignacio Martín José Alberto Hernández Alfonso Muñoz Antonio Guzmán

TLDA: An Efficient Two-Layered Data Authentication Mechanism for Content-Centric Networking.

Seog Chung Seo Taek-Young Youn

Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication.

Jiameng Sun Binrui Zhu Jing Qin Jiankun Hu Jixin Ma

A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF(sm) Based on Montgomery Arithmetic.

Martin Schramm Reiner Dojen Michael Heigl

TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest.

Erxue Min Jun Long Qiang Liu Jianjing Cui Wei Chen

Survey of Authentication and Authorization for the Internet of Things.

Michal Trnka Tomás Cerný Nathaniel Stickney

Secure Data Delivery with Linear Network Coding for Multiple Multicasts with Multiple Streams in Internet of Things.

Lianmin Shi Yihuai Wang Zhengqing Wen Tao Peng

Network Programming and Probabilistic Sketching for Securing the Data Plane.

Maha Shamseddine Wassim Itani Ali Chehab Ayman I. Kayssi

New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment.

Libing Wu Zhiyan Xu Debiao He Xianmin Wang

A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map.

Amir Anees Iqtadar Hussain Abdulmohsen Algarni Muhammad Aslam

Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures.

John Patrick Barrowclough Rameez Asif

Securing ZigBee Commercial Communications Using Constellation Based Distinct Native Attribute Fingerprinting.

Christopher M. Rondeau J. Addison Betances Michael A. Temple

Winternitz Signature Scheme Using Nonadjacent Forms.

Dongyoung Roh Sangim Jung Daesung Kwon

A Novel Trust Taxonomy for Shared Cyber Threat Intelligence.

Thomas D. Wagner Esther Palomar Khaled Mahbub Ali E. Abdallah

Efficient Compression and Encryption for Digital Data Transmission.

Bruno Carpentieri

Practical Consideration Factors to Design Array Configuration of Direction Finding System for Airborne Signal Intelligence.

Jong-Hwan Lee Jeungmin Joo Kichul Kim Jung-Hoon Lee Young-Ju Park

Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment.

Yan Zhao Shiming Li Liehui Jiang

GLPP: A Game-Based Location Privacy-Preserving Framework in Account Linked Mixed Location-Based Services.

Zhuo Ma Jiuxin Cao Xiusheng Chen Shuai Xu Bo Liu Yuntao Yang

Data Fusion for Network Intrusion Detection: A Review.

Guoquan Li Zheng Yan Yulong Fu Hanlu Chen

Network Security and Management in SDN.

Zhiping Cai Chengchen Hu Kai Zheng Yang Xu Qiang Fu

OFFDTAN: A New Approach of Offline Dynamic Taint Analysis for Binaries.

Xiajing Wang Rui Ma Bowen Dou Zefeng Jian Hongzhou Chen

Security Measurement for Unknown Threats Based on Attack Preferences.

Lihua Yin Yanwei Sun Zhen Wang Yunchuan Guo Fenghua Li Binxing Fang

HAC: Hybrid Access Control for Online Social Networks.

Fangfang Shan Hui Li Fenghua Li Yunchuan Guo Ben Niu

A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage.

Run Xie Chanlian He Dongqing Xie Chongzhi Gao Xiaojun Zhang

BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys.

Songjie Wei Shuai Li Peilong Liu Meilin Liu

A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures.

Faouzi Jaïdi Faten Labbene Ayachi Adel Bouhoula

Demadroid: Object Reference Graph-Based Malware Detection in Android.

Huanran Wang Hui He Weizhe Zhang

Robust Fully Distributed Minibatch Gradient Descent with Privacy Preservation.

Gábor Danner Árpád Berta István Hegedüs Márk Jelasity

A Feasible Fuzzy-Extended Attribute-Based Access Control Technique.

Yang Xu Wuqiang Gao Quanrun Zeng Guojun Wang Ju Ren Yaoxue Zhang

A Novel Load Capacity Model with a Tunable Proportion of Load Redistribution against Cascading Failures.

Zhen-Hao Zhang Yurong Song Ling-Ling Xia Yinwei Li Liang Zhang Guo-Ping Jiang

User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs.

Ding Wang Shujun Li Qi Jiang

A Framework for Vulnerability Detection in European Train Control Railway Communications.

Irene Arsuaga Nerea Toledo Igor Lopez Marina Aguado

Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model.

Chunming Zhang Jingwei Xiao

State-Based Switching for Optimal Control of Computer Virus Propagation with External Device Blocking.

Qingyi Zhu Seng W. Loke Ye Zhang

A High-Security and Smart Interaction System Based on Hand Gesture Recognition for Internet of Things.

Jun Xu Xiong Zhang Meng Zhou

Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks.

Yi-Hong Du Shi-Hua Liu

Latent Fingerprint Segmentation Based on Ridge Density and Orientation Consistency.

Manhua Liu Shuxin Liu Weiwu Yan

Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures.

Xin Su Ziyu Wang Xiaofeng Liu Chang Choi Dongmin Choi

A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things.

Chen Wang Jian Shen Qi Liu Yongjun Ren Tong Li

An Efficient Certificateless Generalized Signcryption Scheme.

Bo Zhang Zhongtian Jia Chuan Zhao

A Semistructured Random Identifier Protocol for Anonymous Communication in SDN Network.

Yulong Wang Junjie Yi Jun Guo Yanbo Qiao Mingyue Qi Qingyu Chen

A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism.

Ye Yuan Liji Wu Yijun Yang Xiangmin Zhang

The Motif-Based Approach to the Analysis of the Employee Trajectories within Organization.

Evgenia Novikova Yana A. Bekeneva Andrey Shorov

Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks.

Ali El Ksimi Leghris Cherkaoui

Less Communication: Energy-Efficient Key Exchange for Securing Implantable Medical Devices.

Wonsuk Choi Youngkyung Lee Duhyeong Lee Hyoseung Kim Jin Hyung Park In Seok Kim Dong Hoon Lee

Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest.

Mohamed Idhammad Karim Afdel Mustapha Belouch

A DDoS Attack Detection Method Based on SVM in Software Defined Network.

Jin Ye Xiangyang Cheng Jian Zhu Luting Feng Ling Song

Emerging and Unconventional: New Attacks and Innovative Detection Techniques.

Luca Caviglione Wojciech Mazurczyk Steffen Wendzel Sebastian Zander

A New Type of Graphical Passwords Based on Odd-Elegant Labelled Graphs.

Hongyu Wang Jin Xu Mingyuan Ma Hongyan Zhang

A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack.

Yuntao Zhao Wenbo Zhang Yongxin Feng Bo Yu

A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment.

Chenyu Wang Guoai Xu Wenting Li

Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication.

Reihaneh Safavi-Naini Alireza Poostindouz Viliam Lisý

Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks.

Yongbin Zeng Hui Guang Guangsong Li

Jammer Localization in Multihop Wireless Networks Based on Gravitational Search.

Tongxiang Wang Xianglin Wei Jianhua Fan Tao Liang

Big Data Analytics for Information Security.

Krzysztof Szczypiorski Liqiang Wang Xiangyang Luo Dengpan Ye

On the Complexity of Impossible Differential Cryptanalysis.

Qianqian Yang Lei Hu Danping Shi Yosuke Todo Siwei Sun

A Combined Static and Dynamic Analysis Approach to Detect Malicious Browser Extensions.

Yao Wang Wan-Dong Cai Pin Lyu Wei Shao

A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things.

Jean Caminha Angelo Perkusich Mirko Barbosa Perkusich

LWR-Based Fully Homomorphic Encryption, Revisited.

Fucai Luo Fuqun Wang Kunpeng Wang Jie Li Kefei Chen

To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers.

Shahid Mahmood Shabieh Farwa Muhammad Rafiq Syed Muhammad Jawwad Riaz Tariq Shah Sajjad Shaukat Jamal

A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents.

Milad Taleby Ahvanooey Qianmu Li Hiuk Jae Shim Yanyan Huang

Exploiting the Security Aspects of Compressive Sampling.

Junxin Chen Leo Yu Zhang Yushu Zhang Fabio Pareschi Yu-Dong Yao

Uncovering Tor: An Examination of the Network Structure.

Bryan Monk Julianna Mitchell Richard Frank Garth Davies

An Approach for Internal Network Security Metric Based on Attack Probability.

Chun Shan Benfu Jiang Jingfeng Xue Fang Guan Na Xiao

AppFA: A Novel Approach to Detect Malicious Android Applications on the Network.

Gaofeng He Bingfeng Xu Haiting Zhu

Development of the ECAT Preprocessor with the Trust Communication Approach.

Kevser Ovaz Akpinar Ibrahim Özçelik

Large-Scale Analysis of Remote Code Injection Attacks in Android Apps.

Hyunwoo Choi Yongdae Kim

A Survey on Security-Aware Measurement in SDN.

Heng Zhang Zhiping Cai Qiang Liu Qingjun Xiao Yangyang Li Chak-Fong Cheang

Global Behavior of a Computer Virus Propagation Model on Multilayer Networks.

Chunming Zhang

A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments.

Yun Chen Kun Lv Changzhen Hu

Blind Key Based Attack Resistant Audio Steganography Using Cocktail Party Effect.

Barnali Gupta Banik Samir Kumar Bandyopadhyay

An Intrusion Detection and Prevention Framework for Internet-Integrated CoAP WSN.

Jorge Granjal Artur Pedroso

Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario.

Yanan Chen Zhenyu Lu Hu Xiong Weixiang Xu

Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9.

Qi Zhang An Wang Yongchuan Niu Ning Shang Rixin Xu Guoshuang Zhang Liehuang Zhu

A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack.

Emanuel Ferreira Jesus Vanessa R. L. Chicarino Célio Vinicius N. de Albuquerque Antônio A. de A. Rocha

Secure Virtualization Environment Based on Advanced Memory Introspection.

Shuhui Zhang Xiangxu Meng Lianhai Wang Lijuan Xu Xiaohui Han

Efficient Channel Selection and Routing Algorithm for Multihop, Multichannel Cognitive Radio Networks with Energy Harvesting under Jamming Attacks.

Pham-Duy Thanh Hiep-Vu Van Insoo Koo

Multiple Impossible Differentials Cryptanalysis on 7-Round ARIA-192.

Zilong Jiang Chenhui Jin

Detecting Malware with an Ensemble Method Based on Deep Neural Network.

Jinpei Yan Yong Qi Qifan Rao

Analysis of Software Implemented Low Entropy Masking Schemes.

Dan Li Jiazhe Chen An Wang Xiaoyun Wang

A Modification-Free Steganography Method Based on Image Information Entropy.

Xia ShuangKui Jianbin Wu

A Cascading Failure Model for Command and Control Networks with Hierarchy Structure.

Xiue Gao Duoping Zhang Keqiu Li Bo Chen

Security and Privacy in the Medical Internet of Things: A Review.

Wencheng Sun Zhiping Cai Yangyang Li Fang Liu Shengqun Fang Guoyan Wang

Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing.

Hongliang Zhu Meiqi Chen Maohua Sun Xin Liao Lei Hu

Security Feature Measurement for Frequent Dynamic Execution Paths in Software System.

Qian Wang Jiadong Ren Xiaoli Yang Yongqiang Cheng Darryl N. Davis Changzhen Hu

An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development.

HyunSeo Kang YoonJe Sung HyoungJun Kwon SugJoon Yoon SangYeong Choi

Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption.

Dianyan Xiao Yang Yu

An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme.

Lu Ou Hui Yin Zheng Qin Sheng Xiao Guangyi Yang Yupeng Hu

Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme.

Tanping Zhou Ningbo Li Xiaoyuan Yang Liqun Lv Yitao Ding Xu An Wang

An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression.

Zhiyuan Jiang Chao Feng Chaojing Tang

Vulnerability Analysis of Network Scanning on SCADA Systems.

Kyle Coffey Richard Smith Leandros A. Maglaras Helge Janicke

Network Intrusion Detection with Threat Agent Profiling.

Tomás Bajtos Andrej Gajdos Lenka Kleinova Katarína Lucivjanská Pavol Sokol

Modeling and Simulation for the Investigation of Radar Responses to Electronic Attacks in Electronic Warfare Environments.

So Ryoung Park Ilku Nam Sanguk Noh

Reversible Data Hiding for DNA Sequence Using Multilevel Histogram Shifting.

Suk-Hwan Lee

Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors.

Hyun-Gu Lee Jung Yeon Hwang Dong In Kim Shincheol Lee Sung-Hoon Lee Ji Sun Shin

A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing.

Rui Zhang Di Xiao Yanting Chang

Analysis on Influential Functions in the Weighted Software Network.

Haitao He Chun Shan Xiangmin Tian Yalei Wei Guoyan Huang

Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain.

Ming Li Haiju Fan Hua Ren Dandan Lu Di Xiao Yang Li

An Epidemic Model of Computer Worms with Time Delay and Variable Infection Rate.

Yu Yao Qiang Fu Wei Yang Ying Wang Chuan Sheng

Close to Optimally Secure Variants of GCM.

Ping Zhang Honggang Hu Qian Yuan

NOSArmor: Building a Secure Network Operating System.

Hyeonseong Jo Jaehyun Nam Seungwon Shin

A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View.

Baraka D. Sija Young-Hoon Goo Kyu-Seok Shim Huru Hasanova Myung-Sup Kim

Quantum Cryptography for the Future Internet and the Security Analysis.

Tianqi Zhou Jian Shen Xiong Li Chen Wang Jun Shen

Practical Secure Transaction for Privacy-Preserving Ride-Hailing Services.

Chenglong Cao Xiaoling Zhu

On the Antijamming Performance of the NR-DCSK System.

Binh Van Nguyen Hyoyoung Jung Kiseon Kim

Leverage Website Favicon to Detect Phishing Websites.

Kang-Leng Chiew Jeffrey Choo Soon Fatt San-Nah Sze Kelvin S. C. Yong

DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation.

Michele De Donno Nicola Dragoni Alberto Giaretta Angelo Spognardi

A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition.

Junhui He Junxi Chen Shichang Xiao Xiaoyu Huang Shaohua Tang

Information Propagation Prediction Based on Key Users Authentication in Microblogging.

Miao Yu Yongzheng Zhang Tianning Zang Yipeng Wang Yijing Wang

UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks.

Jin Cao Hui Li Maode Ma Fenghua Li

Using Physical Context-Based Authentication against External Attacks: Models and Protocols.

Wilson S. Melo Raphael C. S. Machado Luiz Fernando Rust da Costa Carmo

Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications.

Xuyun Zhang Julian Jang-Jaccard Lianyong Qi Md. Zakirul Alam Bhuiyan Chang Liu

Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT.

Ming Luo Yi Luo Yuwei Wan Ze Wang

Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques.

Zhihui Chu Huaifeng Chen Xiaoyun Wang Xiaoyang Dong Lu Li

Iris Template Protection Based on Local Ranking.

Dongdong Zhao Shu Fang Jianwen Xiang Jing Tian Shengwu Xiong

Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment.

Ady Wahyudi Paundu Doudou Fall Daisuke Miyamoto Youki Kadobayashi

Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing.

Shuang Zhao Xiapu Luo Xiaobo Ma Bo Bai Yankang Zhao Wei Zou Zeming Yang Man Ho Au Xinliang Qiu

Defending against the Advanced Persistent Threat: An Optimal Control Approach.

Pengdeng Li Xiaofan Yang Qingyu Xiong Junhao Wen Yuan Yan Tang

A Heuristic Model for Supporting Users' Decision-Making in Privacy Disclosure for Recommendation.

Hongchen Wu Huaxiang Zhang Lizhen Cui Xinjun Wang

A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy.

Chong Fu Gao-yuan Zhang Mai Zhu Zhe Chen Weimin Lei

Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction.

Dongmei Niu Hongxia Wang Minquan Cheng Canghong Shi

Under Quantum Computer Attack: Is Rainbow a Replacement of RSA and Elliptic Curves on Hardware?

Haibo Yi

A Novel Immune-Inspired Shellcode Detection Algorithm Based on Hyperellipsoid Detectors.

Tianliang Lu Lu Zhang Yixian Fu

International Network Performance and Security Testing Based on Distributed Abyss Storage Cluster and Draft of Data Lake Framework.

ByungRae Cha Sun Park JongWon Kim Sung Bum Pan Juhyun Shin

Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification.

Dawen Xu Kai Chen Rangding Wang Shubing Su

Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion.

Xianyi Chen Haidong Zhong Lizhi Xiong Zhihua Xia

Validating User Flows to Protect Software Defined Network Environments.

Ihsan H. Abdulqadder Deqing Zou Israa T. Aziz Bin Yuan

Cloud Based Data Protection in Anonymously Controlled SDN.

Jian Shen Jun Shen Chin-Feng Lai Qi Liu Tianqi Zhou

Detecting P2P Botnet in Software Defined Networks.

Shang-Chiuan Su Yi-Ren Chen Shi-Chun Tsai Yi-Bing Lin

A Clustering k-Anonymity Privacy-Preserving Method for Wearable IoT Devices.

Fang Liu Tong Li

An Alternative Method for Understanding User-Chosen Passwords.

Zhixiong Zheng Haibo Cheng Zijian Zhang Yiming Zhao Ping Wang

Analysis of Iterative Erasure Insertion and Decoding of FH/MFSK Systems without Channel State Information.

Jinsoo Park Gangsan Kim Hong-Yeop Song Chanki Kim Jong-Seon No Suil Kim

OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN.

Biao Han Xiangrui Yang Zhigang Sun Jinfeng Huang Jinshu Su

An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks.

Jiawei Tang Anfeng Liu Ming Zhao Tian Wang

Security Analysis of Dynamic SDN Architectures Based on Game Theory.

Chao Qi Jiangxing Wu Guozhen Cheng Jianjian Ai Shuo Zhao

Nonoverlapping Blocks Based Copy-Move Forgery Detection.

Yu Sun Rongrong Ni Yao Zhao

Perceptual Hashing-Based Image Copy-Move Forgery Detection.

Huan Wang Hongxia Wang

Duo: Software Defined Intrusion Tolerant System Using Dual Cluster.

Yongjae Lee Seunghyeon Lee Hyunmin Seo Changhoon Yoon Seungwon Shin Hyunsoo Yoon

Distance Measurement Methods for Improved Insider Threat Detection.

Owen Lo William J. Buchanan Paul Griffiths Richard Macfarlane

FAS: Using FPGA to Accelerate and Secure SDN Software Switches.

Wenwen Fu Tao Li Zhigang Sun

A Privacy-Preserving Incentive Mechanism for Participatory Sensing Systems.

Xiaoguang Niu Jiawei Wang Qiongzan Ye Yihao Zhang

DNS Tunneling Detection Method Based on Multilabel Support Vector Machine.

Ahmed Almusawi Haleh Amintoosi

Two-Step Integral Imaging Coding Based Three-Dimensional Information Encryption Approach.

Min Zhao Yan Xing Xiao-Wei Li Qiong-Hua Wang

Kuijia: Traffic Rescaling in Software-Defined Data Center WANs.

Che Zhang Hong Xu Libin Liu Zhixiong Niu Peng Wang

SDNManager: A Safeguard Architecture for SDN DoS Attacks Based on Bandwidth Prediction.

Tao Wang Hongchang Chen Guozhen Cheng Yulin Lu

Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense.

Yadong Zhou Kaiyue Chen Junjie Zhang Junyuan Leng Yazhe Tang

LSTM-Based Hierarchical Denoising Network for Android Malware Detection.

Jinpei Yan Yong Qi Qifan Rao

A Wireless Covert Channel Based on Constellation Shaping Modulation.

Pengcheng Cao Weiwei Liu Guangjie Liu Xiaopeng Ji Jiangtao Zhai Yuewei Dai

An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment.

Shin-Yan Chiou Ching-Hsuan Lin