Security, Privacy, and Anonymity in Computation, Communication, and Storage: 12th International Conference, Spaccs 2019, Atlanta, Ga, Usa, July 14-17, » książka
Protecting Your Smartphone from Theft Using Accelerometer.- Ransomware Attack Protection: A Cryptographic Approach.- A Lightweight Secure Communication Protocol for IoT devices using Physically Unclonable Function.- Blockchain-based Mobility Management for LTE and Beyond.- EPT: EDNS Privacy Tunnel for DNS.- Ensuring Data Integrity in Fog Computing Based Healthcare Systems.- Modelling Security Requirements for Software Development with Common Criteria.- Visualization of DNS Tunneling Attacks using Parallel Coordinates Technique.- A Data-Driven Network Intrusion Detection Model based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection.- Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning.- End-to-end Encryption Schemes for Online Social Networks.- Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data.- Paper Document Authentication Using Print-scan Resistant Image Hashing and Public-key Cryptography.- TLShps: SDN-based TLS Handshake Protocol Simplification for IoT.- Data Protection Labware for Secure Mobile Software Development.- Multi-Round Bidding Strategy Based on Game Theory for Crowdsensing Task.- Information Leakage in Wearable Applications.- An Encryption based Approach to Protect Fog Federations from Rogue Nodes.- Python Scrapers for Scraping Cryptomarkets on Tor.- Characteristics of Bitcoin Transactions on Cryptomarkets.- Effectiveness of Machine Learning based Intrusion Detection Systems.- DNS Flood Attack Mitigation Utilizing Hot-lists and Stale Content Updates.- Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking.- Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation industry.- Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching.- Using machine learning to find anomalies in fieldbus network traffic.- Cyber Weapons Storage Mechanisms.- A New Intrusion Detection System Based on Gated Recurrent Unit(GRU) and Genetic Algorithm.- Topic Model Based Android Malware Detection.- A Verifiable Encryption Scheme Supporting Fuzzy Search.- A Verifiable Fully Homomorphic Encryption Scheme.- Secure Communication in UAV Assisted HetNets: A Proposed Model.- Detection of Application-Layer Tunnels with Rules and Machine Learning.- A Study on Anonymous Protocol in a Permission Blockchain with Ensure Privacy for a Member.- Automated Construction of Malware Families.- A Closer Look At Anonymous Proxy Re-encryption Schemes.- Approximate String Matching for DNS Anomaly Detection.