CNS 2014 Oct. 29, 2014 to Oct. 31, 2014, san francisco,usa

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Security and Privacy of Information Sources: Information Theoretic Insights, Vincent Poor N/A
Session A.1: Internet Security I Aziz Mohaisen N/A
The Drunk Motorcyclist Protocol for Anonymous Communication Adam L. Young , Moti Yung N/A
Modelling IP Darkspace Traffic by Means of Clustering Techniques Tanja Zseby , Felix Iglesias N/A
Location Verification on the Internet: Towards Enforcing Location-aware Access Policies Over Internet Clients Paul Oorschot , Abdelrahman Abdou , Ashraf Matrawy N/A IncludeThinkstScapes
Analyzing the Dangers Posed by Chrome Extensions Lujo Bauer , Limin Jia , Shaoying Cai , Yuan Tian , Tim Passaro N/A
Detecting Smart, Self-Propagating Internet Worms Jun Li , Shad Stafford N/A
Session B.1: Wireless Security I Ming Li N/A
Location Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Network Kexiong Zeng , Sreeraksha Kondaji Ramesh , Yaling Yang N/A
Accurate Rogue Access Point Localization Leveraging Fine-grained Channel Information Yingying Chen , Jie Yang , Xiuyuan Zheng , Chen Wang N/A IncludeThinkstScapes
Self-Healing Wireless Networks under Insider Jamming Attacks Sencun Zhu , Sushil Jajodia , Longquan Li , Don Torrieri N/A
NRE: Suppress Selective Forwarding Attacks in Wireless Sensor Networks Biru Cui , Shanchieh Jay Yang N/A
CETAD: Detecting Evil Twin Access Point Attacks in Wireless Hotspots Hossen Mustafa , Wenyuan Xu N/A
Panel 1: "Networks Security: The Triumph and Tribulation" Mukesh Singhal N/A
Session A.2: Intrusion Detection Shanchieh Jay Yang N/A
Towards Effective Feature Selection in Machine Learning-Based Botnet Detection Approaches Ali a. Ghorbani , Natalia Stakhanova , Elaheh Biglar Beigi , Hossein Hadian Jazi N/A
Security Configuration Analytics Using Video Games Ehab Al-shaer , Mohammed Noraden Alsaleh N/A
An Evasion and Counter-Evasion Study in Malicious Websites Detection Shouhuai Xu , Li Xu , Zhenxin Zhan , Keying Ye N/A
Exploiting Altruism in Social Networks for Friend-to-Friend Malware Detection Matthew Probst , Jun Cheol Park , Sneha Kumar Kasera N/A
Chatter: Exploring Classification of Malware based on the Order of Events Aziz Mohaisen N/A
Session B.2: Security and Privacy in Emerging Networks Rui Zhang N/A
Two-tier Data-Driven Intrusion Detection for Automatic Generation Control in Smart Grid Ehab Al-shaer , Muhammad Qasim Ali , Reza Yousefian , Sukumar Kamalasadan , Quanyan Zhu N/A
Sensory Channel Threats to Cyber Physical Systems: A Wake-up Call Raheem Beyah , A. Selcuk Uluagac , Venkatachalam Subramanian N/A
iKUP Keeps Users' Privacy in the Smart Grid Fábio Borges , Leonardo A. Martucci N/A
Secret Message Sharing Using Online Social Media Indrajeet Singh , Harsha V. Madhyastha , Jianxia Ning , Srikanth V. Krishnamurthy , Guohong Cao , Prasant Mohapatra N/A
VirtualFriendship: Hiding interactions on Online Social Networks Bart Preneel , Filipe Beato , Mauro Conti , Dario Vettore N/A
Introducing the Samsung KNOX, Peng Ning N/A
Session A.3: Security and Privacy in Cloud Computing A. Selcuk Uluagac N/A
A Tale of Two Servers: Efficient Privacy-Preserving Computation over Cloud Data under Multiple Keys Sherman Chow , Boyang Wang , Hui Li , Ming Li N/A
Towards Verifiable File Search on the Cloud Xinwen Fu , Tao Xiang , Fei Chen , Wei Yu N/A
Enabling Trusted Data-Intensive Execution in Cloud Computing Xuxian Jiang , Wenjing Lou , Thomas Hou , Ning Zhang N/A
Integrity for Distributed Queries Sushil Jajodia , Pierangela Samarati , Sara Foresti , Giovanni Livraga , Stefano Paraboschi , Sabrina Decapitanidivimercati N/A
Lightweight (k,n)-File Sharing Scheme for Distributed Storages with Diverse Communication Capacities Young-hoon Park , Eun-dong Lee , Seung-woo Seo N/A
Session B.3: Internet Security II Sencun Zhu N/A
An Optimistic Certified E-mail Protocol for the Current Internet E-mail Architecture Gerard Tauber N/A
Attribute-based Access Control for ICN Naming Scheme Yan Zhu , Bing Li , Ashwin Prabhu Verleker , Dijiang Huang , Zhijie Wang N/A
Mitigating Eclipse Attacks in Peer-to-Peer Networks Neeraj Suri , Thorsten Strufe , Stefanie Roos , Daniel Germanus N/A
Reroute on Loop in Anonymous Peer-to-Peer Content Sharing Networks Todd Baumeister , Yingfei Dong , Zhenhai Duan , Guanyu Tian N/A
Identifying Global Hot Items in Distributed Dynamic Data Streams Yong Guan , Wenji Chen N/A
Panel 2: "Wireless Security: Securing the Lower and Higher Layers" Wenyuan Xu N/A
Session A.4: Wireless Security II Albert Levi N/A
LAPWiN: Location-Aided Probing for Protecting User Privacy in Wi-Fi Networks Yuan Tian , Patrick Tague , Yu Seung Kim , Le T Nguyen N/A
TouchIn: Sightless Two-factor Authentication on Multi-touch Mobile Devices Rui Zhang , Jinxue Zhang , Yanchao Zhang , Jingchao Sun N/A
MagPairing: Exploiting Magnetometers for Pairing Smartphones in Close Proximity Rong Jin , Kai Zeng , Prasant Mohapatra , Liu Shi , Amit Pande N/A
Uncooperative Localization Improves Attack Performance in Underwater Acoustic Networks Michael Zuba , Jun-hong Cui , Zhijie Shi , Xiaoyan Lu N/A
Session B.4: Information Theoretical Security Sherman Chow N/A
Adversarial Wiretap Channel with Public Discussion Reihaneh Safavi-naini , Pengwei Wang N/A
Multi-trapdoor Hash Functions and Their Applications in Network Security Mukesh Singhal , Santosh Chandrasekhar N/A
Manipulating Attacker's View of a System's Attack Surface Sushil Jajodia , Massimiliano Albanese , Ermanno Battista , Valentina Casola N/A