skip to main content
10.1145/3017971acmotherconferencesBook PagePublication PagesiccnsConference Proceedingsconference-collections
ICCNS '16: Proceedings of the 6th International Conference on Communication and Network Security
ACM2016 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICCNS '16: 6th International Conference on Communication and Network Security Singapore Singapore November 26 - 29, 2016
ISBN:
978-1-4503-4783-9
Published:
26 November 2016
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 17 Feb 2025Bibliometrics
Skip Abstract Section
Abstract

2016 the 6th International Conference on Communication and Network Security is held during November 26-29, 2016 in Nanyang Executive Centre, Singapore.

Skip Table Of Content Section
SESSION: Computer Theory and Applications
research-article
An Computer Virus Spreading Model with Delayed Quarantine in Internet

Taking into account the power-law degree distribution of Internet, a novel epidemic model with quarantine delay of computer virus is proposed. The formula of basic reproductive number for the model is presented. The global attractiveness of the virus-...

research-article
An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment

In the universal Android system, each application runs in its own sandbox, and the permission mechanism is used to enforce access control to the system APIs and applications. However, permission leak could happen when an application without certain ...

research-article
Dynamic Ordering of Firewall Rules Using a Novel Swapping Window-based Paradigm

Designing and implementing efficient firewall strategies in the age of the Internet of Things (IoT) is far from trivial. This is because, as time proceeds, an increasing number of devices will be connected, accessed and controlled on the Internet. ...

research-article
A Dynamic Access Control Model for Cloud Computing Environments

Cloud Computing allows persons and organizations to store and process their resources in data centers. It is a flexible and cost-effective solution providing various services to consumers over the internet.

The transition towards the Cloud implies ...

research-article
Comparison of Security Frameworks for Governmental Clouds between United States and European Union

Cloud computing, as an emerging computing model, can provide users with inexpensive, convenient and large scale computing. In the recent years, both government and other organizations have begun to utilize cloud computing, such as the United States and ...

research-article
An Effective Model for Anonymizing Personal Location Trajectory

Improvement of mobile computing and sensory technology has facilitated to collect and analyze the human mobility and physiological features in a real time. In this paper, we analyze the challenges of preserving the user location privacy for location ...

research-article
Channel Estimation Algorithm based on Distance Judgement and Remainder Compensation in OFDM System

Channel estimation accuracy is an important index of the communication reliability in OFDM system. This paper adopted the improved DFT estimator to get the channel frequency response (CFR) of the pilot subcarriers. After that, interpolation algorithm is ...

research-article
Design and Implementation of Automatic Vehicle Tracker System for Accidental Emergency

Road accidents constitute the major part of the accidental deaths all over the world. Most of these deaths are due to delay in medical attention. We have design a system to removing the delay of accident incidence happen in day to day life. This system ...

research-article
Eliminating Route Modifiers by Pattern Synthesis Process in Wireless Sensor Networks

In real world scenario, the viability of the sensor networks has proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches, because of their deployment in remote, distributed, ...

research-article
E-Commerce Websites/blogs - Hassles and Predicaments

A customer-to-customer oriented web-blog or a portal (e.g., Carousell and Gumtree) which indulges users in e-shopping and promoting their used product for sale over the internet. Today's E-commerce sites face quite a lot of hassles and predicaments ...

SESSION: Network and Information Security
research-article
A Safeguard against Fast Self-propagating Malware

This paper presents a detection and containment mechanism for fast self-propagating network worm malware. The detection part of the mechanism uses two categories of network host activities to identify worm behaviour in a network. Upon an identified worm ...

research-article
A Novel Approach to Evade Attacks in Online Social Networks

Anonymization of published social network data has become an important research topic nowadays. The major concern is to publish data of individuals in such a manner that the released table not only provides the essential information to be used by ...

research-article
A Novel Technique to Characterize Social Network Users: Comparative Study

In the present digital network, where people share critical information through online social networks on a daily basis, it becomes essential to identify security loopholes and vulnerabilities in social networks. Social spam has become inevitable with ...

research-article
Modbus Communication Behavior Modeling and SVM Intrusion Detection Method

The security and typical attack behavior of Modbus/TCP industrial network communication protocol are analyzed. The data feature of traffic flow is extracted through the operation mode of the depth analysis abnormal behavior, and the intrusion detection ...

research-article
Detecting Fake Sites based on HTML Structure Analysis

Fake sites are serious threats for both consumers and merchants. They mimic authentic sites and attempt to obtain money by fraud, steal personal information such as credit card numbers from consumers, ruin merchants' reputation and so on. Usually, it is ...

research-article
Fully Secure Hidden Ciphertext Policy Attribute-Based Encryption with Short Ciphertext Size

In ciphertext policy attribute-based encryption scheme, access policies are associated with ciphertext and tied to it. It is necessary to hide the access policy in the most sensitive spots such as political, medical and economic fields, that is, ...

research-article
An Anomaly-based Intrusion Detection Architecture Integrated on OpenFlow Switch

Recently, Internet-based systems need to be changed their configuration dynamically. Traditional networks have very limited ability to cope up with such frequent changes and hinder innovations management and configuration procedures. To address this ...

research-article
Public Access
PPEP: A Deployable Privacy Preserving E-Commerce Protocol for Electronic Goods

Today's e-commerce transactions reveal private information of customers whose identities are ultimately disclosed during payment. When online transactions are linked to customer's identities, private information such as their health condition, religion, ...

research-article
Improving NORMALS Using Modified Baudot-Murray Code

NORMALS or Normal Linguistic Methodology Steganography is a steganography method based on noiseless steganography paradigm or Nostega. In this method, a message is embedded into cover text by modifying the external input of a Natural Language Generation ...

research-article
An Efficient and Secure Authentication Scheme With User Anonymity for Roaming Service in Global Mobile Networks

In global mobile network, it is essential to authenticate mobile users and provide secure communication between a user, foreign agent and the home agent using session key. Designing a secure and efficient authentication protocol for roaming users in ...

Recommendations