Future Network Systems and Security: 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27–29, 2019, Proceedings
暂无分享,去创建一个
Krishna M. Sivalingam | Wei Zhou | Alfredo Cuzzocrea | Simone Diniz Junqueira Barbosa | Xiaokang Yang | Junsong Yuan | Dominik Ślęzak | Phoebe Chen | Orhun Kara | Takashi Washio | Selwyn Piramuthu | Ting Liu | Robin Doss | Xiaoyong Du | Junsong Yuan | T. Washio | D. Ślęzak | Simone Diniz Junqueira Barbosa | Phoebe Chen | A. Cuzzocrea | Xiaoyong Du | Orhun Kara | Ting Liu | K. Sivalingam | Xiaokang Yang | S. Piramuthu | W. Zhou | R. Doss
[1] Fredrik Johansson,et al. Time Profiles for Identifying Users in Online Environments , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.
[2] Isaac Woungang,et al. Continuous Authentication Using Writing Style , 2018, Biometric-Based Physical and Cybersecurity Systems.
[3] Tempestt J. Neal,et al. Exploiting Linguistic Style as a Cognitive Biometric for Continuous Verification , 2018, 2018 International Conference on Biometrics (ICB).
[4] Davide Balzarotti,et al. Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies , 2017, USENIX Security Symposium.
[5] Fredrik Johansson,et al. Evaluating Algorithms for Detection of Compromised Social Media User Accounts , 2015, 2015 Second European Network Intelligence Conference.
[6] Ondřej Ryšavý,et al. Distributed password cracking with BOINC and hashcat , 2019, Digit. Investig..
[7] Pang-Ning Tan,et al. Understanding compromised accounts on Twitter , 2017, WI.
[8] Maurice van Keulen,et al. Detecting Hacked Twitter Accounts based on Behavioural Change , 2017, WEBIST.
[9] Sylvio Barbon Junior,et al. Authorship verification applied to detection of compromised accounts on online social networks , 2017, Multimedia Tools and Applications.
[10] C. Randler,et al. Circadian Typology: A Comprehensive Review , 2012, Chronobiology international.
[11] Rick Wash,et al. Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites , 2016, SOUPS.
[12] William Koch,et al. Identifier Binding Attacks and Defenses in Software-Defined Networks , 2017, USENIX Security Symposium.
[13] Gianluca Stringhini,et al. COMPA: Detecting Compromised Accounts on Social Networks , 2013, NDSS.
[14] Frank Piessens,et al. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 , 2017, CCS.
[15] Sylvio Barbon Junior,et al. Recognition on Online Social Network by user's writing style , 2015, Braz. J. Inf. Syst..
[16] Heng Yin,et al. Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation , 2014, CCS.
[17] Srdjan Capkun,et al. On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications , 2014, USENIX Security Symposium.
[18] Wouter Joosen,et al. Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting , 2017, CCS.
[19] David M. Eyers,et al. FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications , 2015, CCS.
[20] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[21] Nor Badrul Anuar,et al. Malicious accounts: Dark of the social networks , 2017, J. Netw. Comput. Appl..
[22] Sudhir Aggarwal,et al. Next Gen PCFG Password Cracking , 2015, IEEE Transactions on Information Forensics and Security.
[23] Zhi-Li Zhang,et al. Multi-touch Authentication Using Hand Geometry and Behavioral Information , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[24] Yuval Elovici,et al. Friend or foe? Fake profile identification in online social networks , 2013, Social Network Analysis and Mining.
[25] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, IMC '10.
[26] Brij B. Gupta,et al. Classification of various attacks and their defence mechanism in online social networks: a survey , 2019, Enterp. Inf. Syst..
[27] Meike Nauta. Detecting Hacked Twitter Accounts by Examining Behavioural Change using Twitter Metadata , 2016 .
[28] Calton Pu,et al. Tail Attacks on Web Applications , 2017, CCS.
[29] Isaac Woungang,et al. Authorship verification of e-mail and tweet messages applied for continuous authentication , 2015, J. Comput. Syst. Sci..
[30] Pranjal Singh,et al. A comparison of classifiers and features for authorship authentication of social networking messages , 2017, Concurr. Comput. Pract. Exp..
[31] Matthew Smith,et al. Why Do Developers Get Password Storage Wrong?: A Qualitative Usability Study , 2017, CCS.
[32] Emin Islam Tatli. Cracking More Password Hashes With Patterns , 2015, IEEE Transactions on Information Forensics and Security.
[33] Tat-Seng Chua,et al. Harvesting Multiple Sources for User Profile Learning: a Big Data Study , 2015, ICMR.
[34] S. Santhosinidevi,et al. Towards Detecting Compromised Accounts on Social Networks , 2018 .
[35] Sushil Jajodia,et al. Profiling Online Social Behaviors for Compromised Account Detection , 2016, IEEE Transactions on Information Forensics and Security.
[36] Michael M. Swift,et al. A Placement Vulnerability Study in Multi-Tenant Public Clouds , 2015, USENIX Security Symposium.
[37] Nicolas Christin,et al. Automatically Detecting Vulnerable Websites Before They Turn Malicious , 2014, USENIX Security Symposium.
[38] Prasad Naldurg,et al. MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications , 2014, CCS.
[39] Dan Boneh,et al. Password Managers: Attacks and Defenses , 2014, USENIX Security Symposium.
[40] Konrad Rieck,et al. Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms , 2016, CCS.
[41] Sooyong Park,et al. Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.
[42] Kim-Kwang Raymond Choo,et al. Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles , 2016, J. Netw. Comput. Appl..
[43] Jong Kim,et al. WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream , 2013, IEEE Transactions on Dependable and Secure Computing.
[44] Christopher Krügel,et al. BootStomp: On the Security of Bootloaders in Mobile Devices , 2017, USENIX Security Symposium.
[45] Wouter Joosen,et al. The Wolf of Name Street: Hijacking Domains Through Their Nameservers , 2017, CCS.
[46] Harish Kumar,et al. AuthCom: Authorship verification and compromised account detection in online social networks using AHP-TOPSIS embedded profiling based technique , 2018, Expert Syst. Appl..
[47] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[48] Mohammad S. Obaidat,et al. Authorship verification using deep belief network systems , 2017, Int. J. Commun. Syst..
[49] Peng Jiang,et al. A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..
[50] Yang Su,et al. USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs , 2017, USENIX Security Symposium.
[51] Alexander Binder,et al. An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets , 2018, ArXiv.
[52] Elie Bursztein,et al. Cloak of Visibility: Detecting When Machines Browse a Different Web , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[53] Yang Zhang,et al. Detecting Compromised Email Accounts from the Perspective of Graph Topology , 2016, CFI.
[54] Wenke Lee,et al. Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising , 2014, CCS.
[55] Mahmoud Al-Ayyoub,et al. Feature extraction and selection for Arabic tweets authorship authentication , 2017, J. Ambient Intell. Humaniz. Comput..
[56] Philipp G. Sandner,et al. Comparison of Ethereum, Hyperledger Fabric and Corda , 2017 .
[57] Moshe Koppel,et al. Authorship verification as a one-class classification problem , 2004, ICML.
[58] Magdalena Jankowska,et al. Proximity Based One-class Classification with Common N-Gram Dissimilarity for Authorship Verification Task Notebook for PAN at CLEF 2013 , 2013, CLEF.
[59] Dan Boneh,et al. T/Key: Second-Factor Authentication From Secure Hash Chains , 2017, CCS.
[60] Meng Luo,et al. Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers , 2017, CCS.
[61] Kai Chen,et al. Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews , 2017, CCS.
[62] Mengyuan Li,et al. STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves , 2017, CCS.
[63] Barbara Carminati,et al. Anomalous change detection in time-evolving OSNs , 2016, 2016 Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net).
[64] Kevin R. B. Butler,et al. ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices , 2016, CCS.
[65] Tobias Lauinger,et al. Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web , 2018, NDSS.
[66] Iuon-Chang Lin,et al. A Survey of Blockchain Security Issues and Challenges , 2017, Int. J. Netw. Secur..
[67] Michael K. Reiter,et al. Cross-Tenant Side-Channel Attacks in PaaS Clouds , 2014, CCS.