skip to main content
10.1145/3507509acmotherconferencesBook PagePublication PagesiccnsConference Proceedingsconference-collections
ICCNS '21: Proceedings of the 2021 11th International Conference on Communication and Network Security
ACM2021 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICCNS 2021: 2021 the 11th International Conference on Communication and Network Security Weihai China December 3 - 5, 2021
ISBN:
978-1-4503-8642-5
Published:
07 March 2022

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Chapter 1 - Communication Network and Information Security
research-article
The Side-Channel Vulnerability in Network Protocol

Some recent studies have found that there are some side-channel vulnerabilities in the operating system. Attackers would exploit the side-channel vulnerability for malicious purpose, such as hijack connections, denial of service attacks, etc. Currently, ...

research-article
SDNHive: A Proof-of-Concept SDN and Honeypot System for Defending Against Internal Threats

Nowadays, ransomware attacks are becoming more popular because they allow attackers to receive ransom payments from their victims. While older ransomware used to spread using social engineering means, modern ransomware tends to also be equipped with ...

research-article
TNRAS: Tor Nodes Reliability Analysis Scheme

With the rapid Internet development, the security attacks become more and more noteworthy that people have paid more concentration on personal privacy. The Onion Router (Tor), a distributed anonymous communication network, has gradually come into our ...

research-article
Strengthening the Security of Deniable Authentication Scheme Using Zero-Knowledge Proof

In an electronic voting system, authentication is used to ensure that the voter is legitimate without knowing his/her identity, while the vote collectors verify the data is received from a legitimate user without knowing the identity of the voter. One ...

research-article
Optimization of Spectrum Efficiency in UAV Cognitive Communication Network Based on Trajectory Planning

In order to solve the shortage of spectrum resources and improve the spectrum efficiency (SE) in unmanned aerial vehicle (UAV) cognitive communication network, this paper optimizes the sensing radian and UAV's real-time trajectory from the perspective ...

research-article
Security Analysis of Embedded SIM Remote Provisioning Protocol Using SPIN

Abstract: With the advent of the 5G era, embedded SIM (eSIM) technology has been created to meet the needs of M2M technology. In earlier years, the GSMA provided a detailed description of the architecture and configuration protocol of the eSIM over-the-...

research-article
Bidirectional Underwater Blue-green Laser Communication Based on OFDM Modulation

An underwater bidirectional laser wireless communication system based on orthogonal frequency division multiplexing (OFDM) is designed. High-power semiconductor lasers with 450nm and 520nm are employed as the light sources and APD is selected as the ...

research-article
Shallow Underground Space Exploration and IoT Security Monitoring

Underground space development intensity is roughly positively related to city scale. At present, underground development depth is about 20 meters in our small cities and 50-70 meters in first-tier cities. Some special projects will have deeper ...

SESSION: Chapter 2 - Modern Information Technology and Management
research-article
The Role of Financial Technology for Development of Micro, Small and Medium Enterprises (Msmes) in Indonesia

The rapid development has made financial technology/financial technology's innovations more diverse according to the needs and financial problems that arise. With the existence of financial technology (financial technology) it can also make the ...

research-article
Research on Topology Evolution of Autonomous System Network

After investigating the study about autonomous system level networks, we found that the latest data analysis used is open data provided in 2013. Thus, based on the open-source network BGP routing information provided by RouteViews from 2000 to 2020, ...

research-article
Lightweight Hybrid Detection of Data Exfiltration using DNS based on Machine Learning

Domain Name System (DNS) is a popular way to steal sensitive information from enterprise networks and maintain a covert tunnel for command and control communications with a malicious server. Due to the significant role of DNS services, enterprises ...

research-article
Mission-Oriented Networks Robustness Based on Cascade Model

In network science, network connectivity is usually used to evaluate network performance, but this does not represent the services that network systems can provide. Therefore, the robustness of the mission when the network is damaged represents the ...

research-article
Research on the Deep Integration of 5G Technology and Social Security Management of Police Department

The application of 5G technology has not only brought technical capabilities in terms of large bandwidth, low latency and wide coverage, but made the social security management of police department face a coexisted new pattern of opportunities and ...

research-article
Analysis of Software Accounting Effectiveness on Data Sales in Bliss Kitchen

The development of the increasingly advanced business world will certainly always be related to technological developments, especially in the current 4.0 era. In Indonesia, there are various types of companies such as services, manufacturing, food, and ...

Index terms have been assigned to the content through auto-classification.

Recommendations