SCN - volume 2018 论文列表 |
点击这里查看 Security and Communication Networks 的JCR分区、影响因子等信息 |
Duc-Minh Ngo Cuong Pham-Quoc Tran Ngoc Thinh
Generalized Bootstrapping Technique Based on Block Equality Test Algorithm. Optimal Improper Gaussian Signaling for Physical Layer Security in Cognitive Radio Networks.Guilherme Oliveira Evelio M. G. Fernández Samuel Baraldi Mafra Samuel Montejo Sánchez Cesar A. Azurdia-Meza
Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection.Rafal Kozik Marek Pawlicki Michal Choras
A More Efficient Fully Homomorphic Encryption Scheme Based on GSW and DM Schemes. Analysis on Matrix GSW-FHE and Optimizing Bootstrapping.Xiufeng Zhao Hefeng Mao Shuai Liu Weitao Song Bo Zhang
Corrigendum to "Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS".Weizhong Qiang Shizhen Wang Hai Jin Jiangying Zhong
Application of Temperature Prediction Based on Neural Network in Intrusion Detection of IoT.Xuefei Liu Chao Zhang Pingzeng Liu Maoling Yan Baojia Wang Jianyong Zhang Russell Higgs
Identity-Based Proxy Signcryption Protocol with Universal Composability.Huifang Yu Zhicang Wang Jianmin Li Xinzhe Gao
5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks.Pablo Salva-Garcia Jose M. Alcaraz Calero Qi Wang Jorge Bernal Bernabé Antonio F. Skarmeta
GANs Based Density Distribution Privacy-Preservation on Mobility Data. Detection Method for Distributed Web-Crawlers: A Long-Tail Threshold Model.Inwoo Ro Joong Soo Han Eul Gyu Im
DR-Net: A Novel Generative Adversarial Network for Single Image Deraining.Chen Li Yecai Guo Qi Liu Xiaodong Liu
Research on Plaintext Restoration of AES Based on Neural Network. Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing.Jieren Cheng Mengyang Li Xiangyan Tang Victor S. Sheng Yifu Liu Wei Guo
Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment.Xiaodan Gu Ming Yang Yiting Zhang Peilong Pan Zhen Ling
Construction of a New Biometric-Based Key Derivation Function and Its Application.Minhye Seo Jong Hwan Park Youngsam Kim Sangrae Cho Dong Hoon Lee Jung Yeon Hwang
On the Performance of Power Splitting Energy Harvested Wireless Full-Duplex Relaying Network with Imperfect CSI over Dissimilar Channels.Tan N. Nguyen Minh Tran Phuong T. Tran Phu Tran Tin Thanh-Long Nguyen Duy-Hung Ha Miroslav Voznák
Multibiometric Fusion Authentication in Wireless Multimedia Environment Using Dynamic Bayesian Method.Zhendong Wu Jiajia Yang Jianwu Zhang Hengli Yue
A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service.Jian Song Guangsong Li Bo-ru Xu Chuangui Ma
Asynchronous Group Authentication Based on Geometric Approach.Hong Wang Jianhua Li Feng Zhu Zhe Wang
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking.Weiwei Liu Guangjie Liu Yang Xia Xiaopeng Ji Jiangtao Zhai Yuewei Dai
Robust Visual Secret Sharing Scheme Applying to QR Code.Longdan Tan Kesheng Liu Xuehu Yan Lintao Liu Tianqi Lu Jinrui Chen Feng Liu Yuliang Lu
Applied Cryptography and Noise Resistant Data Security.Iqtadar Hussain Fawad Ahmed Umar Mujahid Khokhar Amir Anees
Fake and Real Massaging at the Same Time with QR Code in Web Services for Different Users.Mirsat Yesiltepe Muhammet Kurulay
An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization.Naveed Ahmed Azam Umar Hayat Ikram Ullah
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis.Thanh Hai Nguyen Mason Wright Michael P. Wellman Satinder Singh
Covert Communication Networks in Hostile Environments.Kiseon Kim Jalel Ben-Othman Prem Mahalik
An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature.Xiling Luo Zequan Zhou Lin Zhong Jian Mao Chaoyong Chen
Practical Suitability and Experimental Assessment of Tree ORAMs.Kholoud Al-Saleh Abdelfettah Belghith
Use of Data Visualisation for Zero-Day Malware Detection.Sitalakshmi Venkatraman Mamoun Alazab
Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud.Zhenghong Wang Zhangjie Fu Xingming Sun
A Robust Watermarking Scheme Based on the Mean Modulation of DWT Coefficients.Zied Kricha Anis Kricha Anis Sakly
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys.Rahul Saha G. Geetha Gulshan Kumar Tai-Hoon Kim
A Study on Effectiveness Evaluation for the Physical Protection System of a High Security Prison Based on the Cloud Model. CAFA: A Checksum-Aware Fuzzing Assistant Tool for Coverage Improvement.Xiaolong Liu Qiang Wei Qingxian Wang Zheng Zhao Zhongxu Yin
Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key.Jiguo Li Shengzhou Hu Yichen Zhang
An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map.Guodong Ye Kaixin Jiao Chen Pan Xiaoling Huang
A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN.Haosu Cheng Jianwei Liu Jian Mao Mengmeng Wang Jie Chen Jingdong Bian
A Relative Phase Based Audio Integrity Protection Method: Model and Strategy.Zhaozheng Li Weimin Lei Wei Zhang KwangHyok Jo
FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things.Youwen Zhu Yue Zhang Jiabin Yuan Xianmin Wang
RPAR: Location Privacy Preserving via Repartitioning Anonymous Region in Mobile Social Network.Jinquan Zhang Yanfeng Yuan Xiao Wang Lina Ni Jiguo Yu Mengmeng Zhang
A Novel Blind and Robust Video Watermarking Technique in Fast Motion Frames Based on SVD and MR-SVD.Imen Nouioua Nouredine Amardjia Sarra Belilita
Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks. A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network.Chunpeng Ge Jinyue Xia Aaron Wu Hongwei Li Yao Wang
Assessment of Secure OpenID-Based DAAA Protocol for Avoiding Session Hijacking in Web Applications.Muhammad Bilal Muhammad Asif Abid Bashir
A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing.Xin Wang Bo Yang Zhe Xia Yanqi Zhao Huifang Yu
An Ensemble Learning Method for Wireless Multimedia Device Identification.Zhen Zhang Yibing Li Chao Wang Meiyu Wang Ya Tu Jin Wang
Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning.Jieren Cheng Chen Zhang Xiangyan Tang Victor S. Sheng Zhe Dong Junqi Li
A Secure Multimedia Data Sharing Scheme for Wireless Network.Liming Fang Liang Liu Jinyue Xia Maosheng Sun
A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord. System to Safeguard the Identity of Persons in Photographs through Cryptography and Steganography Techniques Using Chaos.Octavio Flores Siordia Juan Carlos Estrada Gutiérrez Carlos Eduardo Padilla Leyferman Jorge Aguilar Santiago Maricela Jiménez Rodríguez
Research on Trajectory Data Releasing Method via Differential Privacy Based on Spatial Partition.Qilong Han Zuobin Xiong Kejia Zhang
Test Sequence Reduction of Wireless Protocol Conformance Testing to Internet of Things.Weiwei Lin Hongwei Zeng Honghao Gao Huaikou Miao Xiaolin Wang
A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs.Rutvij H. Jhaveri Aneri Desai Ankit Patel Yubin Zhong
ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification.Baoyuan Kang Lin Si Hong Jiang Chunqing Li Mingming Xie
Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS.Weizhong Qiang Shizhen Wang Hai Jin
Scheduling Parallel Intrusion Detecting Applications on Hybrid Clouds.Yi Zhang Jin Sun Zebin Wu Shuangyu Xie Ruitao Xu
Security and Communication Networks Behaviors of High-Frequency Subscribers in Cellular Data Networks.Jingtao Li Yang Liu Wengang Pei Zhen Cao
A General Architecture for Multiserver Authentication Key Agreement with Provable Security.Yunru Zhang Min Luo Kim-Kwang Raymond Choo Debiao He
An Improved Permission Management Scheme of Android Application Based on Machine Learning.Shaozhang Niu Ruqiang Huang Wenbo Chen Yiming Xue
A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments.Cheolhee Park Hyunil Kim Dowon Hong Changho Seo
Network Intrusion Detection Method Based on PCA and Bayes Algorithm.Bing Zhang Zhiyang Liu Yanguo Jia Jiadong Ren Xiaolin Zhao
Towards a Secure and Borderless Collaboration between Organizations: An Automated Enforcement Mechanism. Privacy Preservation for Friend-Recommendation Applications.Weicheng Wang Shengling Wang Jianhui Huang
Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption.Qinlong Huang Yue He Wei Yue Yixian Yang
Key Substitution Attacks on Lattice Signature Schemes Based on SIS Problem.Youngjoo An Hyang-Sook Lee Juhee Lee Seongan Lim
Energy-Efficient Cloudlet Management for Privacy Preservation in Wireless Metropolitan Area Networks.Xiaolong Xu Rui Huang Ruihan Dou Yuancheng Li Jie Zhang Tao Huang Wenbin Yu
Multiview Ensemble Method for Detecting Shilling Attacks in Collaborative Recommender Systems.Yaojun Hao Peng Zhang Fuzhi Zhang
Deep Learning Hash for Wireless Multimedia Image Content Security.Yu Zheng Jiezhong Zhu Wei Fang Lian-Hua Chi
RoughDroid: Operative Scheme for Functional Android Malware Detection. Data-Driven and Low-Sparsity False Data Injection Attacks in Smart Grid. Achieving the Optimal k-Anonymity for Content Privacy in Interactive Cyberphysical Systems.Jinbao Wang Ling Tian Yan Huang Donghua Yang Hong Gao
Towards a Novel Trust-Based Multicast Routing for VANETs.Hui Xia Sanshun Zhang Benxia Li Li Li Xiangguo Cheng
Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor.Taehwan Park Hwajeong Seo Junsub Kim Haeryong Park Howon Kim
Security Measurements of Cyber Networks.Zheng Yan Yuqing Zhang Kim-Kwang Raymond Choo Yang Xiang
A Constraint-Aware Optimization Method for Concurrency Bug Diagnosis Service in a Distributed Cloud Environment. A Novel Approach for Classifying MANETs Attacks with a Neutrosophic Intelligent System based on Genetic Algorithm.Haitham Elwahsh Mona Gamal A. A. Salama Ibrahim M. El-Henawy
An Artificial Intelligence Approach to Financial Fraud Detection under IoT Environment: A Survey and Implementation. Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms.Karl Andersson Ilsun You Francesco Palmieri
A Novel Technique for the Construction of Safe Substitution Boxes Based on Cyclic and Symmetric Groups.Abdul Razaq Hanan A. Al-Olayan Atta Ullah Arshad Riaz Adil Waheed
User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes.Xiaoyu Ji Yushi Cheng Wenyuan Xu Xinyan Zhou
Differential Cryptanalysis on Block Cipher Skinny with MILP Program. Differentially Private Recommendation System Based on Community Detection in Social Network Applications.Gesu Li Zhipeng Cai Guisheng Yin Zaobo He Madhuri Siddula
A Privacy Protection Model of Data Publication Based on Game Theory.Li Kuang Yujia Zhu Shuqi Li Xuejin Yan Han Yan Shuiguang Deng
An Evolutionary Computation Based Feature Selection Method for Intrusion Detection.Yu Xue Weiwei Jia Xuejian Zhao Wei Pang
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms.Ye Yuan Junting Xiao Kazuhide Fukushima Shinsaku Kiyomoto Tsuyoshi Takagi
Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling. A Closer Look at Intrusion Detection System for Web Applications.Nancy Agarwal Syed Zeeshan Hussain
Reversible Data Hiding with Pixel Prediction and Additive Homomorphism for Encrypted Image.Chunqiang Yu Xianquan Zhang Zhenjun Tang Yan Chen Jingyu Huang
Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing.Yinghui Zhang Haonan Su Menglei Yang Dong Zheng Fang Ren Qinglan Zhao
Hardware/Software Adaptive Cryptographic Acceleration for Big Data Processing.Chunhua Xiao Lei Zhang Yuhua Xie Weichen Liu Duo Liu
An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System.Li Li Siqin Zhou Kim-Kwang Raymond Choo Xiaohong Li Debiao He
An Adaptive Audio Steganography for Covert Wireless Communication.Guojiang Xin Yuling Liu Ting Yang Yu Cao
Improved Construction for Inner Product Functional Encryption.Qingsong Zhao Qingkai Zeng Ximeng Liu
Multimedia Security: Novel Steganography and Privacy Preserving.Zhenxing Qian Kim-Kwang Raymond Choo Rémi Cogranne Xinpeng Zhang
LA-GRU: Building Combined Intrusion Detection Model Based on Imbalanced Learning and Gated Recurrent Unit Neural Network. HYBINT: A Hybrid Intelligence System for Critical Infrastructures Protection.Javier Hingant Marcelo Zambrano Francisco J. Pérez Israel Pérez Manuel Esteve
Function-Aware Anomaly Detection Based on Wavelet Neural Network for Industrial Control Communication.Ming Wan Yan Song Yuan Jing Junlu Wang
Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN.Carlos Andres Lara-Nino Arturo Diaz-Perez Miguel Morales-Sandoval
Automatic Benchmark Generation Framework for Malware Detection.Guanghui Liang Jianmin Pang Zheng Shan Runqing Yang Yihang Chen
Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications.Marios Argyriou Nicola Dragoni Angelo Spognardi
Performance Analysis of Hyperledger Fabric Platforms.Qassim Nasir Ilham A. Qasse Manar AbuTalib Ali Bou Nassif
Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation.Nanda Kumar Thanigaivelan Ethiopia Nigussie Seppo Virtanen Jouni Isoaho
Towards Optimized DFA Attacks on AES under Multibyte Random Fault Model.Ruyan Wang Xiaohan Meng Yang Li Jian Wang
Privacy-Preserving Sorting Algorithms Based on Logistic Map for Clouds.Hua Dai Hui Ren Zhiye Chen Geng Yang Xun Yi
Corrigendum to "A New Metric for Flow-Level Filtering of Low-Rate DDoS Attacks". Enhanced Adaptive Cloudlet Placement Approach for Mobile Application on Spark.Yiwen Zhang Kaibin Wang Yuanyuan Zhou Qiang He
High Capacity Image Steganography Using Modified LSB Substitution and PVD against Pixel Difference Histogram Analysis. A Security Sandbox Approach of Android Based on Hook Mechanism.Xin Jiang Mingzhe Liu Kun Yang Yanhua Liu Ruili Wang
Deep Learning Approaches for Predictive Masquerade Detection.Wisam Elmasry Akhan Akbulut Abdul Halim Zaim
WS3N: Wireless Secure SDN-Based Communication for Sensor Networks.Renan C. A. Alves Doriedson A. G. Oliveira Geovandro C. C. F. Pereira Bruno C. Albertini Cíntia B. Margi
Accountable and Transparent TLS Certificate Management: An Alternate Public-Key Infrastructure with Verifiable Trusted Parties.Salabat Khan Zijian Zhang Liehuang Zhu Meng Li Qamas Gul Khan Safi Xiaobing Chen
A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization.Jianjun Li Jie Yu Lanlan Xu Xinying Xue Chin-Chen Chang Xiaoyang Mao Junfeng Hu
Trust Management in Collaborative Systems for Critical Infrastructure Protection.Nawal Ait Aali Amine Baïna Loubna Echabbi
Detecting Potential Insider Threat: Analyzing Insiders' Sentiment Exposed in Social Media.Won Park Youngin You Kyungho Lee
Bootstrapping of FHE over the Integers with Large Message Space.Zhizhu Lian Yupu Hu Hu Chen Baocang Wang
Identifying Fake Accounts on Social Networks Based on Graph Analysis and Classification Algorithms.Mohammadreza Mohammadrezaei Mohammad Ebrahim Shiri Amir Masoud Rahmani
Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis.Hao Hu Yuling Liu Hongqi Zhang Yuchen Zhang
Efficient Isogeny Computations on Twisted Edwards Curves.Suhri Kim Kisoon Yoon Jihoon Kwon Seokhie Hong Young-Ho Park
A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection.Zhaohui Zhang Xinxin Zhou Xiaobo Zhang Lizhi Wang Pengwei Wang
Cyberspace Security for Future Internet.Dafang Zhang Guojun Wang Xin Wang Zhengyu Li Wenjia Li
A VQ-Based Joint Fingerprinting and Decryption Scheme for Secure and Efficient Image Distribution.Ming Li Hua Ren En Zhang Wei Wang Lin Sun Di Xiao
A Privacy Preserving Approach to Collaborative Systemic Risk Identification: The Use-Case of Supply Chain Networks.Tirazheh Zare Garizy Gilbert Fridgen Lars Wederhake
Moving Target Defense Techniques: A Survey.Cheng Lei Hongqi Zhang Jing-Lei Tan Yu-Chen Zhang Xiao-Hu Liu
Street-Level Landmark Evaluation Based on Nearest Routers.Ruixiang Li Yuchen Sun Jianwei Hu Te Ma Xiangyang Luo
Privacy-Preserving Oriented Floating-Point Number Fully Homomorphic Encryption Scheme.Shuangjie Bai Geng Yang Jingqi Shi Guoxiu Liu Zhaoe Min
High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift.Dinh-Chien Nguyen Thai-Son Nguyen Chin-Chen Chang Huan-Sheng Hsueh Fang-Rong Hsu
A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing.Xingshuo An Fuhong Lin Shenggang Xu Li Miao Chao Gong
Steganography Algorithm Based on the Nonlocal Maximum Likelihood Noise Estimation for Mobile Applications.Blanca E. Carvajal-Gámez Manuel Alejandro Díaz-Casco
A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT.Tong Li Wenbin Chen Yi Tang Hongyang Yan
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity.Dongwoo Kang Jaewook Jung Hyoungshick Kim Youngsook Lee Dongho Won
Design and Analysis of Push Notification-Based Malware on Android.Sangwon Hyun Junsung Cho Geumhwan Cho Hyoungshick Kim
Control Method for Sampled-Data Systems with Multiple Channels Based on Deadband-Triggered Scheme. An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks.Sahel Alouneh Feras Al-Hawari Ismail Hababeh Gheorghita Ghinea
Secure and Efficient Image Retrieval over Encrypted Cloud Data.Haihua Liang Xinpeng Zhang Hang Cheng Qiuhan Wei
Blockchain Based Credibility Verification Method for IoT Entities.Chao Qu Ming Tao Jie Zhang Xiaoyu Hong Ruifen Yuan
A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing.Guoxiu Liu Geng Yang Huaqun Wang Yang Xiang Hua Dai
Session Fingerprinting in Android via Web-to-App Intercommunication.Efthimios Alepis Constantinos Patsakis
A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience.Yinghui Zhang Pengzhen Lang Dong Zheng Menglei Yang Rui Guo
An Imbalanced Malicious Domains Detection Method Based on Passive DNS Traffic Analysis.Zhenyan Liu Yifei Zeng Pengfei Zhang Jingfeng Xue Ji Zhang Jiangtao Liu
A UAV-Aided Cluster Head Election Framework and Applying Such to Security-Driven Cluster Head Election Schemes: A Survey.Gicheol Wang Byoung-Sun Lee Jae Young Ahn Gihwan Cho
Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework.Jaewoo Shim Kyeonghwan Lim Seong-je Cho Sangchul Han Minkyu Park
Security Evaluation Framework for Military IoT Devices.Sungyong Cha Seungsoo Baek Sooyoung Kang Seungjoo Kim
A Secure Incentive Scheme for Vehicular Delay Tolerant Networks Using Cryptocurrency.Youngho Park Chul Sur Kyung-Hyune Rhee
Android Malware Characterization Using Metadata and Machine Learning Techniques.Ignacio Martín José Alberto Hernández Alfonso Muñoz Antonio Guzmán
TLDA: An Efficient Two-Layered Data Authentication Mechanism for Content-Centric Networking.Seog Chung Seo Taek-Young Youn
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication.Jiameng Sun Binrui Zhu Jing Qin Jiankun Hu Jixin Ma
A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF(sm) Based on Montgomery Arithmetic.Martin Schramm Reiner Dojen Michael Heigl
TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest.Erxue Min Jun Long Qiang Liu Jianjing Cui Wei Chen
Survey of Authentication and Authorization for the Internet of Things.Michal Trnka Tomás Cerný Nathaniel Stickney
Secure Data Delivery with Linear Network Coding for Multiple Multicasts with Multiple Streams in Internet of Things.Lianmin Shi Yihuai Wang Zhengqing Wen Tao Peng
Network Programming and Probabilistic Sketching for Securing the Data Plane.Maha Shamseddine Wassim Itani Ali Chehab Ayman I. Kayssi
New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment.Libing Wu Zhiyan Xu Debiao He Xianmin Wang
A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map.Amir Anees Iqtadar Hussain Abdulmohsen Algarni Muhammad Aslam
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures.John Patrick Barrowclough Rameez Asif
Securing ZigBee Commercial Communications Using Constellation Based Distinct Native Attribute Fingerprinting.Christopher M. Rondeau J. Addison Betances Michael A. Temple
Winternitz Signature Scheme Using Nonadjacent Forms.Dongyoung Roh Sangim Jung Daesung Kwon
A Novel Trust Taxonomy for Shared Cyber Threat Intelligence.Thomas D. Wagner Esther Palomar Khaled Mahbub Ali E. Abdallah
Efficient Compression and Encryption for Digital Data Transmission. Practical Consideration Factors to Design Array Configuration of Direction Finding System for Airborne Signal Intelligence.Jong-Hwan Lee Jeungmin Joo Kichul Kim Jung-Hoon Lee Young-Ju Park
Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment.Yan Zhao Shiming Li Liehui Jiang
GLPP: A Game-Based Location Privacy-Preserving Framework in Account Linked Mixed Location-Based Services.Zhuo Ma Jiuxin Cao Xiusheng Chen Shuai Xu Bo Liu Yuntao Yang
Data Fusion for Network Intrusion Detection: A Review.Guoquan Li Zheng Yan Yulong Fu Hanlu Chen
Network Security and Management in SDN.Zhiping Cai Chengchen Hu Kai Zheng Yang Xu Qiang Fu
OFFDTAN: A New Approach of Offline Dynamic Taint Analysis for Binaries.Xiajing Wang Rui Ma Bowen Dou Zefeng Jian Hongzhou Chen
Security Measurement for Unknown Threats Based on Attack Preferences.Lihua Yin Yanwei Sun Zhen Wang Yunchuan Guo Fenghua Li Binxing Fang
HAC: Hybrid Access Control for Online Social Networks.Fangfang Shan Hui Li Fenghua Li Yunchuan Guo Ben Niu
A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage.Run Xie Chanlian He Dongqing Xie Chongzhi Gao Xiaojun Zhang
BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys.Songjie Wei Shuai Li Peilong Liu Meilin Liu
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures.Faouzi Jaïdi Faten Labbene Ayachi Adel Bouhoula
Demadroid: Object Reference Graph-Based Malware Detection in Android.Huanran Wang Hui He Weizhe Zhang
Robust Fully Distributed Minibatch Gradient Descent with Privacy Preservation.Gábor Danner Árpád Berta István Hegedüs Márk Jelasity
A Feasible Fuzzy-Extended Attribute-Based Access Control Technique.Yang Xu Wuqiang Gao Quanrun Zeng Guojun Wang Ju Ren Yaoxue Zhang
A Novel Load Capacity Model with a Tunable Proportion of Load Redistribution against Cascading Failures.Zhen-Hao Zhang Yurong Song Ling-Ling Xia Yinwei Li Liang Zhang Guo-Ping Jiang
User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs. A Framework for Vulnerability Detection in European Train Control Railway Communications.Irene Arsuaga Nerea Toledo Igor Lopez Marina Aguado
Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model. State-Based Switching for Optimal Control of Computer Virus Propagation with External Device Blocking.Qingyi Zhu Seng W. Loke Ye Zhang
A High-Security and Smart Interaction System Based on Hand Gesture Recognition for Internet of Things. Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks. Latent Fingerprint Segmentation Based on Ridge Density and Orientation Consistency.Manhua Liu Shuxin Liu Weiwu Yan
Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures.Xin Su Ziyu Wang Xiaofeng Liu Chang Choi Dongmin Choi
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things.Chen Wang Jian Shen Qi Liu Yongjun Ren Tong Li
An Efficient Certificateless Generalized Signcryption Scheme.Bo Zhang Zhongtian Jia Chuan Zhao
A Semistructured Random Identifier Protocol for Anonymous Communication in SDN Network.Yulong Wang Junjie Yi Jun Guo Yanbo Qiao Mingyue Qi Qingyu Chen
A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism.Ye Yuan Liji Wu Yijun Yang Xiangmin Zhang
The Motif-Based Approach to the Analysis of the Employee Trajectories within Organization.Evgenia Novikova Yana A. Bekeneva Andrey Shorov
Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks.Ali El Ksimi Leghris Cherkaoui
Less Communication: Energy-Efficient Key Exchange for Securing Implantable Medical Devices.Wonsuk Choi Youngkyung Lee Duhyeong Lee Hyoseung Kim Jin Hyung Park In Seok Kim Dong Hoon Lee
Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest.Mohamed Idhammad Karim Afdel Mustapha Belouch
A DDoS Attack Detection Method Based on SVM in Software Defined Network.Jin Ye Xiangyang Cheng Jian Zhu Luting Feng Ling Song
Emerging and Unconventional: New Attacks and Innovative Detection Techniques.Luca Caviglione Wojciech Mazurczyk Steffen Wendzel Sebastian Zander
A New Type of Graphical Passwords Based on Odd-Elegant Labelled Graphs.Hongyu Wang Jin Xu Mingyuan Ma Hongyan Zhang
A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack.Yuntao Zhao Wenbo Zhang Yongxin Feng Bo Yu
A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment.Chenyu Wang Guoai Xu Wenting Li
Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication.Reihaneh Safavi-Naini Alireza Poostindouz Viliam Lisý
Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks.Yongbin Zeng Hui Guang Guangsong Li
Jammer Localization in Multihop Wireless Networks Based on Gravitational Search.Tongxiang Wang Xianglin Wei Jianhua Fan Tao Liang
Big Data Analytics for Information Security.Krzysztof Szczypiorski Liqiang Wang Xiangyang Luo Dengpan Ye
On the Complexity of Impossible Differential Cryptanalysis.Qianqian Yang Lei Hu Danping Shi Yosuke Todo Siwei Sun
A Combined Static and Dynamic Analysis Approach to Detect Malicious Browser Extensions.Yao Wang Wan-Dong Cai Pin Lyu Wei Shao
A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things.Jean Caminha Angelo Perkusich Mirko Barbosa Perkusich
LWR-Based Fully Homomorphic Encryption, Revisited.Fucai Luo Fuqun Wang Kunpeng Wang Jie Li Kefei Chen
To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers.Shahid Mahmood Shabieh Farwa Muhammad Rafiq Syed Muhammad Jawwad Riaz Tariq Shah Sajjad Shaukat Jamal
A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents.Milad Taleby Ahvanooey Qianmu Li Hiuk Jae Shim Yanyan Huang
Exploiting the Security Aspects of Compressive Sampling.Junxin Chen Leo Yu Zhang Yushu Zhang Fabio Pareschi Yu-Dong Yao
Uncovering Tor: An Examination of the Network Structure.Bryan Monk Julianna Mitchell Richard Frank Garth Davies
An Approach for Internal Network Security Metric Based on Attack Probability.Chun Shan Benfu Jiang Jingfeng Xue Fang Guan Na Xiao
AppFA: A Novel Approach to Detect Malicious Android Applications on the Network.Gaofeng He Bingfeng Xu Haiting Zhu
Development of the ECAT Preprocessor with the Trust Communication Approach.Kevser Ovaz Akpinar Ibrahim Özçelik
Large-Scale Analysis of Remote Code Injection Attacks in Android Apps. A Survey on Security-Aware Measurement in SDN.Heng Zhang Zhiping Cai Qiang Liu Qingjun Xiao Yangyang Li Chak-Fong Cheang
Global Behavior of a Computer Virus Propagation Model on Multilayer Networks. A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments. Blind Key Based Attack Resistant Audio Steganography Using Cocktail Party Effect.Barnali Gupta Banik Samir Kumar Bandyopadhyay
An Intrusion Detection and Prevention Framework for Internet-Integrated CoAP WSN. Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario.Yanan Chen Zhenyu Lu Hu Xiong Weixiang Xu
Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9.Qi Zhang An Wang Yongchuan Niu Ning Shang Rixin Xu Guoshuang Zhang Liehuang Zhu
A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack.Emanuel Ferreira Jesus Vanessa R. L. Chicarino Célio Vinicius N. de Albuquerque Antônio A. de A. Rocha
Secure Virtualization Environment Based on Advanced Memory Introspection.Shuhui Zhang Xiangxu Meng Lianhai Wang Lijuan Xu Xiaohui Han
Efficient Channel Selection and Routing Algorithm for Multihop, Multichannel Cognitive Radio Networks with Energy Harvesting under Jamming Attacks.Pham-Duy Thanh Hiep-Vu Van Insoo Koo
Multiple Impossible Differentials Cryptanalysis on 7-Round ARIA-192. Detecting Malware with an Ensemble Method Based on Deep Neural Network. Analysis of Software Implemented Low Entropy Masking Schemes.Dan Li Jiazhe Chen An Wang Xiaoyun Wang
A Modification-Free Steganography Method Based on Image Information Entropy. A Cascading Failure Model for Command and Control Networks with Hierarchy Structure.Xiue Gao Duoping Zhang Keqiu Li Bo Chen
Security and Privacy in the Medical Internet of Things: A Review.Wencheng Sun Zhiping Cai Yangyang Li Fang Liu Shengqun Fang Guoyan Wang
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing.Hongliang Zhu Meiqi Chen Maohua Sun Xin Liao Lei Hu
Security Feature Measurement for Frequent Dynamic Execution Paths in Software System.Qian Wang Jiadong Ren Xiaoli Yang Yongqiang Cheng Darryl N. Davis Changzhen Hu
An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development.HyunSeo Kang YoonJe Sung HyoungJun Kwon SugJoon Yoon SangYeong Choi
Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption. An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme.Lu Ou Hui Yin Zheng Qin Sheng Xiao Guangyi Yang Yupeng Hu
Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme.Tanping Zhou Ningbo Li Xiaoyuan Yang Liqun Lv Yitao Ding Xu An Wang
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression.Zhiyuan Jiang Chao Feng Chaojing Tang
Vulnerability Analysis of Network Scanning on SCADA Systems.Kyle Coffey Richard Smith Leandros A. Maglaras Helge Janicke
Network Intrusion Detection with Threat Agent Profiling.Tomás Bajtos Andrej Gajdos Lenka Kleinova Katarína Lucivjanská Pavol Sokol
Modeling and Simulation for the Investigation of Radar Responses to Electronic Attacks in Electronic Warfare Environments.So Ryoung Park Ilku Nam Sanguk Noh
Reversible Data Hiding for DNA Sequence Using Multilevel Histogram Shifting. Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors.Hyun-Gu Lee Jung Yeon Hwang Dong In Kim Shincheol Lee Sung-Hoon Lee Ji Sun Shin
A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing.Rui Zhang Di Xiao Yanting Chang
Analysis on Influential Functions in the Weighted Software Network.Haitao He Chun Shan Xiangmin Tian Yalei Wei Guoyan Huang
Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain.Ming Li Haiju Fan Hua Ren Dandan Lu Di Xiao Yang Li
An Epidemic Model of Computer Worms with Time Delay and Variable Infection Rate.Yu Yao Qiang Fu Wei Yang Ying Wang Chuan Sheng
Close to Optimally Secure Variants of GCM.Ping Zhang Honggang Hu Qian Yuan
NOSArmor: Building a Secure Network Operating System.Hyeonseong Jo Jaehyun Nam Seungwon Shin
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View.Baraka D. Sija Young-Hoon Goo Kyu-Seok Shim Huru Hasanova Myung-Sup Kim
Quantum Cryptography for the Future Internet and the Security Analysis.Tianqi Zhou Jian Shen Xiong Li Chen Wang Jun Shen
Practical Secure Transaction for Privacy-Preserving Ride-Hailing Services. On the Antijamming Performance of the NR-DCSK System.Binh Van Nguyen Hyoyoung Jung Kiseon Kim
Leverage Website Favicon to Detect Phishing Websites.Kang-Leng Chiew Jeffrey Choo Soon Fatt San-Nah Sze Kelvin S. C. Yong
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation.Michele De Donno Nicola Dragoni Alberto Giaretta Angelo Spognardi
A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition.Junhui He Junxi Chen Shichang Xiao Xiaoyu Huang Shaohua Tang
Information Propagation Prediction Based on Key Users Authentication in Microblogging.Miao Yu Yongzheng Zhang Tianning Zang Yipeng Wang Yijing Wang
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks.Jin Cao Hui Li Maode Ma Fenghua Li
Using Physical Context-Based Authentication against External Attacks: Models and Protocols.Wilson S. Melo Raphael C. S. Machado Luiz Fernando Rust da Costa Carmo
Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications.Xuyun Zhang Julian Jang-Jaccard Lianyong Qi Md. Zakirul Alam Bhuiyan Chang Liu
Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT.Ming Luo Yi Luo Yuwei Wan Ze Wang
Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques.Zhihui Chu Huaifeng Chen Xiaoyun Wang Xiaoyang Dong Lu Li
Iris Template Protection Based on Local Ranking.Dongdong Zhao Shu Fang Jianwen Xiang Jing Tian Shengwu Xiong
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment.Ady Wahyudi Paundu Doudou Fall Daisuke Miyamoto Youki Kadobayashi
Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing.Shuang Zhao Xiapu Luo Xiaobo Ma Bo Bai Yankang Zhao Wei Zou Zeming Yang Man Ho Au Xinliang Qiu
Defending against the Advanced Persistent Threat: An Optimal Control Approach.Pengdeng Li Xiaofan Yang Qingyu Xiong Junhao Wen Yuan Yan Tang
A Heuristic Model for Supporting Users' Decision-Making in Privacy Disclosure for Recommendation.Hongchen Wu Huaxiang Zhang Lizhen Cui Xinjun Wang
A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy.Chong Fu Gao-yuan Zhang Mai Zhu Zhe Chen Weimin Lei
Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction.Dongmei Niu Hongxia Wang Minquan Cheng Canghong Shi
Under Quantum Computer Attack: Is Rainbow a Replacement of RSA and Elliptic Curves on Hardware? A Novel Immune-Inspired Shellcode Detection Algorithm Based on Hyperellipsoid Detectors.Tianliang Lu Lu Zhang Yixian Fu
International Network Performance and Security Testing Based on Distributed Abyss Storage Cluster and Draft of Data Lake Framework.ByungRae Cha Sun Park JongWon Kim Sung Bum Pan Juhyun Shin
Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification.Dawen Xu Kai Chen Rangding Wang Shubing Su
Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion.Xianyi Chen Haidong Zhong Lizhi Xiong Zhihua Xia
Validating User Flows to Protect Software Defined Network Environments.Ihsan H. Abdulqadder Deqing Zou Israa T. Aziz Bin Yuan
Cloud Based Data Protection in Anonymously Controlled SDN.Jian Shen Jun Shen Chin-Feng Lai Qi Liu Tianqi Zhou
Detecting P2P Botnet in Software Defined Networks.Shang-Chiuan Su Yi-Ren Chen Shi-Chun Tsai Yi-Bing Lin
A Clustering k-Anonymity Privacy-Preserving Method for Wearable IoT Devices. An Alternative Method for Understanding User-Chosen Passwords.Zhixiong Zheng Haibo Cheng Zijian Zhang Yiming Zhao Ping Wang
Analysis of Iterative Erasure Insertion and Decoding of FH/MFSK Systems without Channel State Information.Jinsoo Park Gangsan Kim Hong-Yeop Song Chanki Kim Jong-Seon No Suil Kim
OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN.Biao Han Xiangrui Yang Zhigang Sun Jinfeng Huang Jinshu Su
An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks.Jiawei Tang Anfeng Liu Ming Zhao Tian Wang
Security Analysis of Dynamic SDN Architectures Based on Game Theory.Chao Qi Jiangxing Wu Guozhen Cheng Jianjian Ai Shuo Zhao
Nonoverlapping Blocks Based Copy-Move Forgery Detection. Perceptual Hashing-Based Image Copy-Move Forgery Detection. Duo: Software Defined Intrusion Tolerant System Using Dual Cluster.Yongjae Lee Seunghyeon Lee Hyunmin Seo Changhoon Yoon Seungwon Shin Hyunsoo Yoon
Distance Measurement Methods for Improved Insider Threat Detection.Owen Lo William J. Buchanan Paul Griffiths Richard Macfarlane
FAS: Using FPGA to Accelerate and Secure SDN Software Switches. A Privacy-Preserving Incentive Mechanism for Participatory Sensing Systems.Xiaoguang Niu Jiawei Wang Qiongzan Ye Yihao Zhang
DNS Tunneling Detection Method Based on Multilabel Support Vector Machine.Ahmed Almusawi Haleh Amintoosi
Two-Step Integral Imaging Coding Based Three-Dimensional Information Encryption Approach.Min Zhao Yan Xing Xiao-Wei Li Qiong-Hua Wang
Kuijia: Traffic Rescaling in Software-Defined Data Center WANs.Che Zhang Hong Xu Libin Liu Zhixiong Niu Peng Wang
SDNManager: A Safeguard Architecture for SDN DoS Attacks Based on Bandwidth Prediction.Tao Wang Hongchang Chen Guozhen Cheng Yulin Lu
Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense.Yadong Zhou Kaiyue Chen Junjie Zhang Junyuan Leng Yazhe Tang
LSTM-Based Hierarchical Denoising Network for Android Malware Detection. A Wireless Covert Channel Based on Constellation Shaping Modulation.Pengcheng Cao Weiwei Liu Guangjie Liu Xiaopeng Ji Jiangtao Zhai Yuewei Dai
An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment.