{"title":"Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation","authors":"Liu Liu, Chao Chen, Jun Zhang, O. Vel, Yang Xiang","doi":"10.1007/978-3-030-36938-5_2","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_2","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121549749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed Raad Al-Sudani, Wanlei Zhou, S. Wen, Ahmed Al-Mansoori
{"title":"SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control","authors":"Ahmed Raad Al-Sudani, Wanlei Zhou, S. Wen, Ahmed Al-Mansoori","doi":"10.1007/978-3-030-02744-5_15","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_15","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124370739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiahao Peng, Xiaobo Ma, Jianfeng Li, Lei Xue, Wenjun Hu
{"title":"Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks","authors":"Jiahao Peng, Xiaobo Ma, Jianfeng Li, Lei Xue, Wenjun Hu","doi":"10.1007/978-3-030-02744-5_32","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_32","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134377423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding the Behaviors of BGP-based DDoS Protection Services","authors":"T. Tung, Chenxu Wang, Jinhe Wang","doi":"10.1007/978-3-030-02744-5_34","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_34","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"114 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117222008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Creating and Managing Realism in the Next-Generation Cyber Range","authors":"Dragos Ionica, Florin Pop, Aniello Castiglione","doi":"10.1007/978-3-030-02744-5_33","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_33","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129220864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amber Umair, P. Nanda, Xiangjian He, Kim-Kwang Raymond Choo
{"title":"User Relationship Classification of Facebook Messenger Mobile Data using WEKA","authors":"Amber Umair, P. Nanda, Xiangjian He, Kim-Kwang Raymond Choo","doi":"10.1007/978-3-030-02744-5_25","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_25","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121217051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Burn After Reading: Expunging Execution Footprints of Android Apps","authors":"Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu","doi":"10.1007/978-3-030-02744-5_4","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_4","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122911734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yemian Lu, Qi Li, Purui Su, Juan Pan, Jia Yan, Pengyi Zhan, Wei Guo
{"title":"A Comprehensive Study of Permission Usage on Android","authors":"Yemian Lu, Qi Li, Purui Su, Juan Pan, Jia Yan, Pengyi Zhan, Wei Guo","doi":"10.1007/978-3-030-02744-5_5","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_5","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123809865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Semantic Search Based on Two-Level Index Over Encrypted Cloud","authors":"Lili Xia, Zhangjie Fu","doi":"10.1007/978-3-030-02744-5_11","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_11","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127830467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Paola Barra, Carmen Bisogni, M. Nappi, S. Ricciardi
{"title":"Fast QuadTree-Based Pose Estimation for Security Applications Using Face Biometrics","authors":"Paola Barra, Carmen Bisogni, M. Nappi, S. Ricciardi","doi":"10.1007/978-3-030-02744-5_12","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_12","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134475645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}