Cyberspace Safety and Security: 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings

A Crawler Guard for Quickly Blocking Unauthorized Web Robot.- Privacy Preserving for Location-Based Services Using Location Transformation.- Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux.- Multiple-Bank E-Cash without Random Oracles.- A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy.- Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics.- Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures.- Towards a Security-Enhanced Firewall Application for OpenFlow Networks.- Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method.- Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows.- Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks.- Geolocation and Verification of IP-Addresses with Specific Focus on IPv6.- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks.- Alert Correlation Algorithms: A Survey and Taxonomy.- Construction and Verification of Mobile Ad Hoc Network Protocols.- Zero-Day Traffic Identification.- Design and Implementation of a Testbed for the Security Assessment of MANETs.- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology.- Anonymous Identity-Based Broadcast Encryption with Adaptive Security.- Hierarchical Identity-Based Signature with Short Public Keys.- PeerViewer: Behavioral Tracking and Classification of P2P Malware.- Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification.- Detecting Stepping Stones by Abnormal Causality Probability.- Algebra-Based Behavior Identification of Trojan Horse.- Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards.- The Hot-Spots Problem in Windows 8 Graphical Password Scheme.- Static Detection of Dangerous Behaviors in Android Apps.- A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function.- A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing.- NetSecRadar: A Visualization System for Network Security Situational Awareness.- Security and Quantum Communications Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System.- Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN.- An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space.- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux.- Towards an Open Framework Leveraging a Trusted Execution Environment.- Secure Re-publication of Dynamic Big Data.

[1]  Srikanth Kandula,et al.  Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.

[2]  Young-Gab Kim,et al.  Web robot detection based on pattern-matching technique , 2012, J. Inf. Sci..

[3]  Michael Benedikt,et al.  VeriWeb: Automatically Testing Dynamic Web Sites , 2002 .

[4]  Marios D. Dikaiakos,et al.  Web robot detection: A probabilistic reasoning approach , 2009, Comput. Networks.

[5]  C. Lee Giles,et al.  BotSeer: An Automated Information System for Analyzing Web Robots , 2008, 2008 Eighth International Conference on Web Engineering.

[6]  Marios D. Dikaiakos,et al.  Characterizing Crawler Behavior from Web Server Access Logs , 2003, EC-Web.

[7]  Swapna S. Gokhale,et al.  Discovering New Trends in Web Robot Traffic Through Functional Classification , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.

[8]  Kang-Won Lee,et al.  Securing Web Service by Automatic Robot Detection , 2006, USENIX Annual Technical Conference, General Track.

[9]  Yusheng Ji,et al.  A Traffic Decomposition and Prediction Method for Detecting and Tracing Network-Wide Anomalies , 2009, IEICE Trans. Inf. Syst..

[10]  Lars Schmidt-Thieme,et al.  Web Robot Detection - Preprocessing Web Logfiles for Robot Detection , 2005 .

[11]  Marios D. Dikaiakos,et al.  A Probabilistic Reasoning Approach for Discovering Web Crawler Sessions , 2007, APWeb/WAIM.

[12]  Sriram Raghavan,et al.  Crawling the Hidden Web , 2001, VLDB.

[13]  Ki Hoon Kwon,et al.  Hybrid Intrusion Forecasting Framework for Early Warning System , 2008, IEICE Trans. Inf. Syst..