2016 the 6th International Conference on Communication and Network Security is held during November 26-29, 2016 in Nanyang Executive Centre, Singapore.
Proceeding Downloads
An Computer Virus Spreading Model with Delayed Quarantine in Internet
Taking into account the power-law degree distribution of Internet, a novel epidemic model with quarantine delay of computer virus is proposed. The formula of basic reproductive number for the model is presented. The global attractiveness of the virus-...
An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment
In the universal Android system, each application runs in its own sandbox, and the permission mechanism is used to enforce access control to the system APIs and applications. However, permission leak could happen when an application without certain ...
Dynamic Ordering of Firewall Rules Using a Novel Swapping Window-based Paradigm
Designing and implementing efficient firewall strategies in the age of the Internet of Things (IoT) is far from trivial. This is because, as time proceeds, an increasing number of devices will be connected, accessed and controlled on the Internet. ...
A Dynamic Access Control Model for Cloud Computing Environments
Cloud Computing allows persons and organizations to store and process their resources in data centers. It is a flexible and cost-effective solution providing various services to consumers over the internet.
The transition towards the Cloud implies ...
Comparison of Security Frameworks for Governmental Clouds between United States and European Union
Cloud computing, as an emerging computing model, can provide users with inexpensive, convenient and large scale computing. In the recent years, both government and other organizations have begun to utilize cloud computing, such as the United States and ...
An Effective Model for Anonymizing Personal Location Trajectory
Improvement of mobile computing and sensory technology has facilitated to collect and analyze the human mobility and physiological features in a real time. In this paper, we analyze the challenges of preserving the user location privacy for location ...
Channel Estimation Algorithm based on Distance Judgement and Remainder Compensation in OFDM System
Channel estimation accuracy is an important index of the communication reliability in OFDM system. This paper adopted the improved DFT estimator to get the channel frequency response (CFR) of the pilot subcarriers. After that, interpolation algorithm is ...
Design and Implementation of Automatic Vehicle Tracker System for Accidental Emergency
Road accidents constitute the major part of the accidental deaths all over the world. Most of these deaths are due to delay in medical attention. We have design a system to removing the delay of accident incidence happen in day to day life. This system ...
Eliminating Route Modifiers by Pattern Synthesis Process in Wireless Sensor Networks
In real world scenario, the viability of the sensor networks has proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches, because of their deployment in remote, distributed, ...
E-Commerce Websites/blogs - Hassles and Predicaments
A customer-to-customer oriented web-blog or a portal (e.g., Carousell and Gumtree) which indulges users in e-shopping and promoting their used product for sale over the internet. Today's E-commerce sites face quite a lot of hassles and predicaments ...
A Safeguard against Fast Self-propagating Malware
This paper presents a detection and containment mechanism for fast self-propagating network worm malware. The detection part of the mechanism uses two categories of network host activities to identify worm behaviour in a network. Upon an identified worm ...
A Novel Approach to Evade Attacks in Online Social Networks
Anonymization of published social network data has become an important research topic nowadays. The major concern is to publish data of individuals in such a manner that the released table not only provides the essential information to be used by ...
A Novel Technique to Characterize Social Network Users: Comparative Study
In the present digital network, where people share critical information through online social networks on a daily basis, it becomes essential to identify security loopholes and vulnerabilities in social networks. Social spam has become inevitable with ...
Modbus Communication Behavior Modeling and SVM Intrusion Detection Method
The security and typical attack behavior of Modbus/TCP industrial network communication protocol are analyzed. The data feature of traffic flow is extracted through the operation mode of the depth analysis abnormal behavior, and the intrusion detection ...
Detecting Fake Sites based on HTML Structure Analysis
Fake sites are serious threats for both consumers and merchants. They mimic authentic sites and attempt to obtain money by fraud, steal personal information such as credit card numbers from consumers, ruin merchants' reputation and so on. Usually, it is ...
Fully Secure Hidden Ciphertext Policy Attribute-Based Encryption with Short Ciphertext Size
In ciphertext policy attribute-based encryption scheme, access policies are associated with ciphertext and tied to it. It is necessary to hide the access policy in the most sensitive spots such as political, medical and economic fields, that is, ...
An Anomaly-based Intrusion Detection Architecture Integrated on OpenFlow Switch
Recently, Internet-based systems need to be changed their configuration dynamically. Traditional networks have very limited ability to cope up with such frequent changes and hinder innovations management and configuration procedures. To address this ...
PPEP: A Deployable Privacy Preserving E-Commerce Protocol for Electronic Goods
Today's e-commerce transactions reveal private information of customers whose identities are ultimately disclosed during payment. When online transactions are linked to customer's identities, private information such as their health condition, religion, ...
Improving NORMALS Using Modified Baudot-Murray Code
NORMALS or Normal Linguistic Methodology Steganography is a steganography method based on noiseless steganography paradigm or Nostega. In this method, a message is embedded into cover text by modifying the external input of a Natural Language Generation ...
An Efficient and Secure Authentication Scheme With User Anonymity for Roaming Service in Global Mobile Networks
In global mobile network, it is essential to authenticate mobile users and provide secure communication between a user, foreign agent and the home agent using session key. Designing a secure and efficient authentication protocol for roaming users in ...