Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01704-0_3
Xueping Liang, S. Shetty, Deepak K. Tosh, Yafei Ji, Danyi Li
{"title":"Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using Blockchain","authors":"Xueping Liang, S. Shetty, Deepak K. Tosh, Yafei Ji, Danyi Li","doi":"10.1007/978-3-030-01704-0_3","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_3","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134407972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01704-0_23
G. Sharma, Soultana Ellinidou, Veronika Kuchta, R. Sahu, O. Markowitch, J. Dricot
{"title":"Secure Communication on NoC Based MPSoC","authors":"G. Sharma, Soultana Ellinidou, Veronika Kuchta, R. Sahu, O. Markowitch, J. Dricot","doi":"10.1007/978-3-030-01704-0_23","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_23","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127165783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01704-0_2
Yu Li, D. Kim, Junjie Zhang, Derek Doran
{"title":"Detecting Suspicious Members in an Online Emotional Support Service","authors":"Yu Li, D. Kim, Junjie Zhang, Derek Doran","doi":"10.1007/978-3-030-01704-0_2","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_2","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132662440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01701-9_19
C. Javali, G. Revadigar
{"title":"Birds of a Feather Flock Together: Fuzzy Extractor and Gait-Based Robust Group Secret Key Generation for Smart Wearables","authors":"C. Javali, G. Revadigar","doi":"10.1007/978-3-030-01701-9_19","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_19","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116624157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01704-0_24
Yeslam Al‐Saggaf
{"title":"Online Radicalisation Along a Continuum: From When Individuals Express Grievances to When They Transition into Extremism","authors":"Yeslam Al‐Saggaf","doi":"10.1007/978-3-030-01704-0_24","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_24","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129764471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01701-9_12
Yao Guo, Junming Ma, Wenjun Wu, Xiangqun Chen
{"title":"Inferring UI States of Mobile Applications Through Power Side Channel Exploitation","authors":"Yao Guo, Junming Ma, Wenjun Wu, Xiangqun Chen","doi":"10.1007/978-3-030-01701-9_12","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_12","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125987731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01704-0_4
Yahan Wang, Chunhua Wu, K. Zheng, Xiujuan Wang
{"title":"Social Bot Detection Using Tweets Similarity","authors":"Yahan Wang, Chunhua Wu, K. Zheng, Xiujuan Wang","doi":"10.1007/978-3-030-01704-0_4","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_4","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"23 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126319970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01704-0_22
Mozammel Chowdhury, Sharmin Jahan, R. Islam, Junbin Gao
{"title":"Malware Detection for Healthcare Data Security","authors":"Mozammel Chowdhury, Sharmin Jahan, R. Islam, Junbin Gao","doi":"10.1007/978-3-030-01704-0_22","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_22","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116651973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01701-9_24
Tommy Chin, Kaiqi Xiong, Chengbin Hu, Yi Li
{"title":"A Machine Learning Framework for Studying Domain Generation Algorithm (DGA)-Based Malware","authors":"Tommy Chin, Kaiqi Xiong, Chengbin Hu, Yi Li","doi":"10.1007/978-3-030-01701-9_24","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_24","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114289017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01701-9_20
Arne Bochem, Benjamin Leiding, D. Hogrefe
{"title":"Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc Networks","authors":"Arne Bochem, Benjamin Leiding, D. Hogrefe","doi":"10.1007/978-3-030-01701-9_20","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_20","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127094564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}