


default search action
16th SecureComm 2020: Washington, DC, USA
- Noseong Park, Kun Sun, Sara Foresti, Kevin R. B. Butler, Nitesh Saxena:
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 335, Springer 2020, ISBN 978-3-030-63085-0 - Md. Mazharul Islam, Ehab Al-Shaer, Muhammad Abdul Basit Ur Rahim
:
Email Address Mutation for Proactive Deterrence Against Lateral Spear-Phishing Attacks. 1-22 - Ehsan Aghaei, Waseem G. Shadid, Ehab Al-Shaer:
ThreatZoom: Hierarchical Neural Network for CVEs to CWEs Classification. 23-41 - Qianying Shen, Futai Zou:
Detecting Dictionary Based AGDs Based on Community Detection. 42-48 - Qingchuan Zhao
, Haohuang Wen
, Zhiqiang Lin, Dong Xuan, Ness B. Shroff:
On the Accuracy of Measured Proximity of Bluetooth-Based Contact Tracing Apps. 49-60 - Muhammad Abdul Basit Ur Rahim
, Ehab Al-Shaer, Qi Duan:
A Formal Verification of Configuration-Based Mutation Techniques for Moving Target Defense. 61-79 - Douglas J. Leith
, Stephen Farrell:
Coronavirus Contact Tracing App Privacy: What Data Is Shared by the Singapore OpenTrace App? 80-96 - Tyler McDaniel, Jared M. Smith, Max Schuchard:
The Maestro Attack: Orchestrating Malicious Flows with BGP. 97-117 - Jingcheng Yang, Haowei Ye, Futai Zou:
pyDNetTopic: A Framework for Uncovering What Darknet Market Users Talking About. 118-139 - Dalton A. Hahn, Drew Davidson, Alexandru G. Bardas:
MisMesh: Security Issues and Challenges in Service Meshes. 140-151 - Fatemeh Rezaei
, Shahrzad Naseri, Ittay Eyal, Amir Houmansadr:
The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels. 152-171 - Fengzhao Shi, Chao Zheng, Yiming Cui, Qingyun Liu:
MAAN: A Multiple Attribute Association Network for Mobile Encrypted Traffic Classification. 172-189 - Niels Hansen, Lorenzo De Carli
, Drew Davidson:
Assessing Adaptive Attacks Against Trained JavaScript Classifiers. 190-210 - Yisroel Mirsky, Benjamin Fedidat, Yoram Haddad:
An Encryption System for Securing Physical Signals. 211-232 - Zhifan Xu
, Melike Baykal-Gürsoy:
A Cooperative Jamming Game in Wireless Networks Under Uncertainty. 233-254 - Haipeng Li, Ben Niu, Boyang Wang:
SmartSwitch: Efficient Traffic Obfuscation Against Stream Fingerprinting. 255-275 - Quinn Burke, Patrick D. McDaniel, Thomas F. La Porta, Mingli Yu, Ting He:
Misreporting Attacks in Software-Defined Networking. 276-296 - Haohuang Wen
, Qingchuan Zhao
, Zhiqiang Lin, Dong Xuan, Ness B. Shroff:
A Study of the Privacy of COVID-19 Contact Tracing Apps. 297-317 - Abdullah Ali, Birhanu Eshete
:
Best-Effort Adversarial Approximation of Black-Box Malware Classifiers. 318-338 - Yubao Zhang, Shuai Hao, Haining Wang:
Review Trade: Everything Is Free in Incentivized Review Groups. 339-359 - Yuyang Rong
, Peng Chen, Hao Chen
:
Integrity: Finding Integer Errors by Targeted Fuzzing. 360-380 - Sayed M. Saghaian N. E., Tom La Porta, Simone Silvestri, Patrick D. McDaniel:
Improving Robustness of a Popular Probabilistic Clustering Algorithm Against Insider Attacks. 381-401 - David Darling, Ang Li, Qinghua Li:
Automated Bystander Detection and Anonymization in Mobile Photography. 402-424 - Nikolay Ivanov, Jianzhi Lou, Qiben Yan:
SmartWiFi: Universal and Secure Smart Contract-Enabled WiFi Hotspot. 425-445 - Elizabeth Stobert, Tina Safaie, Heather Molyneaux, Mohammad Mannan, Amr M. Youssef:
ByPass: Reconsidering the Usability of Password Managers. 446-466 - Jiaping Gui, Zhengzhang Chen
, Xiao Yu, Cristian Lumezanu, Haifeng Chen:
Anomaly Detection on Web-User Behaviors Through Deep Learning. 467-473 - Ross Copeland, Drew Davidson:
Identity Armour: User Controlled Browser Security. 474-480 - Xiaoyong Yuan
, Lei Ding
, Malek Ben Salem, Xiaolin Li, Dapeng Wu
:
Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-supervised Neural Networks. 481-502 - Nilanjan Sen, Ram Dantu, Mark A. Thompson:
Performance Analysis of Elliptic Curves for VoIP Audio Encryption Using a Softphone. 503-508 - Zhili Chen, Baohua Yang, Fuhu Wu, Shuai Ren, Hong Zhong:
TCNN: Two-Way Convolutional Neural Network for Image Steganalysis. 509-514 - Ssu-Hsin Yu:
PrivyTRAC - Privacy and Security Preserving Contact Tracing System. 515-525

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.