default search action
1st CSNet 2017: Rio de Janeiro, Brazil
- 1st Cyber Security in Networking Conference, CSNet 2017, Rio de Janeiro, Brazil, October 18-20, 2017. IEEE 2017, ISBN 978-1-5386-1332-0
- Valerio Selis, Alan Marshall:
A fake timing attack against behavioural tests used in embedded IoT M2M communications. 1-6 - Igor Jochem Sanz, Martin Andreoni Lopez, Diogo Menezes Ferrazani Mattos, Otto Carlos Muniz Bandeira Duarte:
A cooperation-aware virtual network function for proactive detection of distributed port scanning. 1-8 - Zakarya Drias, Ahmed Serhrouchni, Olivier Vogel:
Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems (ICS). 1-10 - Romain Laborde, Arnaud Oglaza, François Barrère, Abdelmalek Benzekri:
dynSMAUG: A dynamic security management framework driven by situations. 1-8 - Renato Souza Silva, Evandro L. C. Macedo:
A cooperative approach for a global intrusion detection system for internet service providers. 1-8 - Jéssica Alcântara Gonçalves, Vinicius S. Faria, Gabriele de Brito Vieira, Camilla Alves Mariano da Silva, Dalbert Matos Mascarenhas:
WIDIP: Wireless distributed IPS for DDoS attacks. 1-3 - Markus Endler, Anderson Silva, Rafael A. M. S. Cruz:
An approach for secure edge computing in the Internet of Things. 1-8 - Nour El Madhoun, Emmanuel Bertin:
Magic always comes with a price: Utility versus security for bank cards. 1-7 - Katarzyna Kapusta, Gérard Memmi, Hassan Noura:
Secure and resilient scheme for data protection in unattended wireless sensor networks. 1-8 - Badis Hammi, Jean Philippe Monteuuis, Houda Labiod, Rida Khatoun, Ahmed Serhrouchni:
Using butterfly keys: A performance study of pseudonym certificates requests in C-ITS. 1-6 - Varun Sharma:
A ranking based privilege model for privacy in location based services. 1-7 - Valentin Vallois, Fouad Amine Guenane:
Bitcoin transaction: From the creation to validation, a protocol overview. 1-7 - Batoul Haidar, Maroun Chamoun, Ahmed Serhrouchni:
Multilingual cyberbullying detection system: Detecting cyberbullying in Arabic content. 1-8 - Martin Andreoni Lopez, Renato Souza Silva, Igor Drummond Alvarenga, Gabriel A. F. Rebello, Igor Jochem Sanz, Antonio Gonzalez Pastana Lobato, Diogo M. F. Mattos, Otto Carlos M. B. Duarte, Guy Pujolle:
Collecting and characterizing a real broadband access network traffic dataset. 1-8 - Khalil Hariss, Maroun Chamoun, Abed Ellatif Samhat:
On DGHV and BGV fully homomorphic encryption schemes. 1-9 - Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri:
Describing advanced persistent threats using a multi-agent system approach. 1-3 - Mohammad-Mahdi Bazm, Marc Lacoste, Mario Südholt, Jean-Marc Menaud:
Side-channels beyond the cloud edge: New isolation threats and solutions. 1-8 - Mohamed Tahar Hammi, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, Pascale Minet:
A lightweight IoT security protocol. 1-8 - Mohammed El-hajj, Maroun Chamoun, Ahmad Fadlallah, Ahmed Serhrouchni:
Analysis of authentication techniques in Internet of Things (IoT). 1-3 - Patricio Zambrano, Marco Sánchez, Jenny Torres, Walter Fuertes:
BotHook: An option against Cyberpedophilia. 1-3 - Joanna Moubarak, Eric Filiol, Maroun Chamoun:
Comparative analysis of blockchain technologies and TOR network: Two faces of the same reality? 1-9 - Sofiane Lagraa, Jérôme François, Abdelkader Lahmadi, Marine Miner, Christian A. Hammerschmidt, Radu State:
BotGM: Unsupervised graph mining to detect botnets in traffic flows. 1-8 - Nikola Bozic, Guy Pujolle, Stefano Secci:
Securing virtual machine orchestration with blockchains. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.