Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_27
Y. Tang, Kai Li, Ju Chen
{"title":"Authenticated LSM Trees with Minimal Trust","authors":"Y. Tang, Kai Li, Ju Chen","doi":"10.1007/978-3-030-37231-6_27","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_27","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"672 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123989945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_11
Md Ali Reza Al Amin, S. Shetty, L. Njilla, Deepak K. Tosh, C. Kamhoua
{"title":"Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework","authors":"Md Ali Reza Al Amin, S. Shetty, L. Njilla, Deepak K. Tosh, C. Kamhoua","doi":"10.1007/978-3-030-37231-6_11","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_11","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123190839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_17
Hongfa Xue, Yurong Chen, Guru Venkataramani, Tian Lan
{"title":"Hecate: Automated Customization of Program and Communication Features to Reduce Attack Surfaces","authors":"Hongfa Xue, Yurong Chen, Guru Venkataramani, Tian Lan","doi":"10.1007/978-3-030-37231-6_17","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_17","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131916894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_13
Xuetao Wei, Can Lu, F. Ozcan, Ting Chen, Boyang Wang, Di Wu, Qiang Tang
{"title":"A Behavior-Aware Profiling of Smart Contracts","authors":"Xuetao Wei, Can Lu, F. Ozcan, Ting Chen, Boyang Wang, Di Wu, Qiang Tang","doi":"10.1007/978-3-030-37231-6_13","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_13","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129572437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-26DOI: 10.1007/978-3-030-37231-6_21
Tian Liu, Tao Shu
{"title":"Adversarial False Data Injection Attack Against Nonlinear AC State Estimation with ANN in Smart Grid","authors":"Tian Liu, Tao Shu","doi":"10.1007/978-3-030-37231-6_21","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_21","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130804951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-19DOI: 10.1007/978-3-030-63086-7_7
Tyler McDaniel, Jared M. Smith, Max Schuchard
{"title":"The Maestro Attack: Orchestrating Malicious Flows with BGP","authors":"Tyler McDaniel, Jared M. Smith, Max Schuchard","doi":"10.1007/978-3-030-63086-7_7","DOIUrl":"https://doi.org/10.1007/978-3-030-63086-7_7","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121421208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-14DOI: 10.1007/978-3-030-37228-6_3
Kai Li, Y. Tang, Beom Heyn Kim, Jianliang Xu
{"title":"Secure Consistency Verification for Untrusted Cloud Storage by Public Blockchains","authors":"Kai Li, Y. Tang, Beom Heyn Kim, Jianliang Xu","doi":"10.1007/978-3-030-37228-6_3","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_3","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126208065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-13DOI: 10.1007/978-3-030-37231-6_19
A. Tiwari, S. Groß, Christian Hammer
{"title":"IIFA: Modular Inter-app Intent Information Flow Analysis of Android Applications","authors":"A. Tiwari, S. Groß, Christian Hammer","doi":"10.1007/978-3-030-37231-6_19","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_19","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121166995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01704-0_18
Keitaro Yamazaki, Daisuke Kotani, Y. Okabe
{"title":"Xilara: An XSS Filter Based on HTML Template Restoration","authors":"Keitaro Yamazaki, Daisuke Kotani, Y. Okabe","doi":"10.1007/978-3-030-01704-0_18","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_18","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125817628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01704-0_21
M. Siddique, Muhammad Ayzed Mirza, Mudassar Ahmad, J. Chaudhry, R. Islam
{"title":"A Survey of Big Data Security Solutions in Healthcare","authors":"M. Siddique, Muhammad Ayzed Mirza, Mudassar Ahmad, J. Chaudhry, R. Islam","doi":"10.1007/978-3-030-01704-0_21","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_21","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126612019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}