Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November - 1 December 2006.
IEEE 2006 BibTeX
Network and Information Security Systems (NISS)
NIS-01:
Ad-Hoc & Sensor Networks-I
- Xiaojiang Du, Yang Xiao, Sghaier Guizani, Hsiao-Hwa Chen:
An Efficient Key Management Scheme for Heterogeneous Sensor Networks.
Electronic Edition (link) BibTeX
- Bounpadith Kannhavong, Hidehisa Nakayama, Nei Kato, Yoshiaki Nemoto, Abbas Jamalipour:
A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks.
Electronic Edition (link) BibTeX
- Bo Rong, Yi Qian, Rose Qingyang Hu, Sghaier Guizani, Michel Kadoch:
Key Management for Pyramidal Security Model of Multicast Communication in Mobile Ad Hoc Networks.
Electronic Edition (link) BibTeX
- L. Abusalah, Ashfaq A. Khokhar, Mohsen Guizani:
Trust Aware Routing in Mobile Ad Hoc Networks.
Electronic Edition (link) BibTeX
- Xiaodong Lin, Haojin Zhu, Bin Lin, Pin-Han Ho, Xuemin Shen:
A Novel Voting Mechanism for Compromised Node Revocation in Wireless Ad Hoc Networks.
Electronic Edition (link) BibTeX
- Kaigui Bian, Jung Min Park, Ruiliang Chen:
Stasis Trap: Cross-Layer Stealthy Attacks in Wireless Ad Hoc Networks.
Electronic Edition (link) BibTeX
NIS-02:
Ad-Hoc & Sensor Networks-II
- Majid Khabbazian, Hugues Mercier, Vijay K. Bhargava:
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure.
Electronic Edition (link) BibTeX
- Xiaojiang Du, Sghaier Guizani, Yang Xiao, Hsiao-Hwa Chen:
A Secure Routing Protocol for Heterogeneous Sensor Networks.
Electronic Edition (link) BibTeX
- Ruiliang Chen, Michael Snow, Jung Min Park, M. Tamer Refaei, Mohamed Eltoweissy:
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks.
Electronic Edition (link) BibTeX
- Ting Zhu, Ming Yu:
A Secure Quality of Service Routing Protocol for Wireless Ad Hoc Networks.
Electronic Edition (link) BibTeX
- Chaoli Cai, Song Ci, Sghaier Guizani, Ala I. Al-Fuqaha:
Constructing an Efficient Mobility Profile of Ad-Hoc Node for Mobility-Pattern-Based Anomaly Detection in MANET.
Electronic Edition (link) BibTeX
- George Theodorakopoulos, John S. Baras:
A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users.
Electronic Edition (link) BibTeX
NIS-03:
Biometrics & Optical Networks
NIS-04:
DoS & Intrustion/Anomaly Detection
- Alberto Dainotti, Antonio Pescapè, Giorgio Ventre:
Wavelet-based Detection of DoS Attacks.
Electronic Edition (link) BibTeX
- Anestis Karasaridis, Kathleen S. Meier-Hellstern, David A. Hoeflin:
Detection of DNS Anomalies using Flow Data Analysis.
Electronic Edition (link) BibTeX
- Jieyan Fan, Dapeng Wu, Kejie Lu, Antonio Nucci:
Design of Bloom Filter Array for Network Anomaly Detection.
Electronic Edition (link) BibTeX
- Zouheir Trabelsi, Khaled Shuaib:
Man in the Middle Intrusion Detection.
Electronic Edition (link) BibTeX
- Yinan Jing, Xueping Wang, Xiaochun Xiao, Gendu Zhang:
Defending Against Meek DDoS Attacks By IP Traceback-based Rate Limiting.
Electronic Edition (link) BibTeX
- Tzu-Fang Sheu, Nen-Fu Huang, Hsiao Ping Lee:
A Time- and Memory- Efficient String Matching Algorithm for Intrusion Detection Systems.
Electronic Edition (link) BibTeX
NIS-05:
Encryption,
Authentication & Key Management-I
NIS-06:
Encryption,
Authentication & Key Management-II
- Xinyang Huang, Ming Yang:
Secure Key Management Protocol for Wireless Sensor Network Based on Dynamic Cluster.
Electronic Edition (link) BibTeX
- Mahalingam Ramkumar:
I-HARPS: An Efficient Key Predistribution Scheme for Mobile Computing Applications.
Electronic Edition (link) BibTeX
- Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bhattacharya:
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario.
Electronic Edition (link) BibTeX
- Nen-Fu Huang, Yen-Ming Chu, Yih-Jou Tzang, Jian-Lin Chen, Hsien-Wei Hun, Ming-Chang Shih, Chia-Nan Kao:
A Non-Computational Intensive Pre-filter for Pattern Matching in Network Intrusion Detection Systems.
Electronic Edition (link) BibTeX
- Danielle Liu, Dave Hoeflin, Duncan Sparrell:
Monitoring Network Data to Detect IP Security Violations.
Electronic Edition (link) BibTeX
NIS-07:
Information & Application Security
- Shashank Khanvilkar, Ashfaq A. Khokhar:
Efficient transmission of MP3 streams over VPNs.
Electronic Edition (link) BibTeX
- Bo Sun, Xing Jin, Yang Xiao, Ruhai Wang:
Enhancing Security using Mobility Profile for Cellular Mobile Networks.
Electronic Edition (link) BibTeX
- Mohamed Hamdi, Noureddine Boudriga:
Towards a Relational Calculus for Security Library Management.
Electronic Edition (link) BibTeX
- Masaru Dobashi, Hidehisa Nakayama, Nei Kato, Yoshiaki Nemoto, Abbas Jamalipour:
Traitor Tracing Technology of Streaming Contents Delivery using Traffic Pattern in Wired/Wireless Environments.
Electronic Edition (link) BibTeX
- Anjum Naveed, Salil S. Kanhere:
Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks.
Electronic Edition (link) BibTeX
- Xin Xu, Martin Tomlinson, Marcel Ambroze, Mohammed Ahmed:
Comparisons of Orthogonalisation and Writing-On-Dirty-Paper Schemes for High Capacity Watermarking.
Electronic Edition (link) BibTeX
NIS-08:
Worms & Other Issues
- Kumar Simkhada, Tarik Taleb, Yuji Waizumi, Abbas Jamalipour, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto:
A Multi-level Security Based Autonomic Parameter Selection Approach for an Effective and Early Detection of Internet Worms.
Electronic Edition (link) BibTeX
- Bo Sun, Yang Xiao, Ruhai Wang, Sghaier Guizani:
Enhancing Security using Calling Activity for Wireless Networks.
Electronic Edition (link) BibTeX
- Jin-Ho Kim, Hyogon Kim, Saewoong Bahk:
On the Effectiveness of Service Registration-Based Worm Defense.
Electronic Edition (link) BibTeX
- Slim Rekhis, Noureddine Boudriga:
Execution-based Digital Investigation on Compromised Systems with Automated Hypotheses Generation.
Electronic Edition (link) BibTeX
- Nasir Jamil, Thomas M. Chen:
Effectiveness of Rate Control in Slowing Down Worm Epidemics.
Electronic Edition (link) BibTeX
- Zhijun Liu, Guoqiang Shu, Na Li, David Lee:
Defending against Instant Messaging Worms.
Electronic Edition (link) BibTeX
NIS-P1:
Other Security Topics (Poster)
- Caimu Tang, Dapeng Oliver Wu:
A Countermeasure to Defend Against Relay Attacks in Wireless Networks.
Electronic Edition (link) BibTeX
- William Stewart, Yang Xiao, Bo Sun, Hsiao-Hwa Chen, Sghaier Guizani:
Security Issues in the IEEE 802.15.3 WPANs.
Electronic Edition (link) BibTeX
- Iven Lin, Tsern-Huei Lee:
Robust and Scalable Deterministic Packet Marking Scheme for IP Traceback.
Electronic Edition (link) BibTeX
- K. Daniel Wong:
Securing Mobile IPv6 Route Optimization.
Electronic Edition (link) BibTeX
- Ruiliang Chen, Jung Min Park, Randolph Marchany:
RIM: Router Interface Marking for IP Traceback.
Electronic Edition (link) BibTeX
- Shi Xiao, Gaoxi Xiao:
On Intentional Attacks and Protections in Complex Communication Networks.
Electronic Edition (link) BibTeX
- Lykomidis Mastroleon, Reiko Ann Miura-Ko, Nicholas Bambos:
Patching Rate Management For Controlled Service-Disruption In Data Centers.
Electronic Edition (link) BibTeX
- Waseem Ahmad, Ashfaq A. Khokhar:
Secure Aggregation in Large Scale Overlay Networks.
Electronic Edition (link) BibTeX
- Wassim Itani, Camille Gaspard, Ayman I. Kayssi, Ali Chehab:
PRIDE: Policy-Driven Web Security for Handheld Wireless Devices.
Electronic Edition (link) BibTeX
- Yoshito Kanamori, Seong-Moo Yoo, Frederick T. Sheldon:
Bank Transfer over Quantum Channel with Digital Checks.
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:13:46 2009
by Michael Ley (ley@uni-trier.de)