Advertisement

Security and Privacy in Communication Networks

15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I

  • Songqing Chen
  • Kim-Kwang Raymond Choo
  • Xinwen Fu
  • Wenjing Lou
  • Aziz Mohaisen
Conference proceedings SecureComm 2019

Table of contents

  1. Front Matter
    Pages i-xvii
  2. Blockchains

    1. Front Matter
      Pages 1-1
    2. Shuyang Tang, Jilai Zheng, Yao Deng, Ziyu Wang, Zhiqiang Liu, Dawu Gu et al.
      Pages 23-38
    3. Kai Li, Yuzhe Tang, Beom Heyn (Ben) Kim, Jianliang Xu
      Pages 39-62
    4. Yaping Liu, Shuo Zhang, Haojin Zhu, Peng-Jun Wan, Lixin Gao, Yaoxue Zhang
      Pages 63-82
  3. Internet of Things

    1. Front Matter
      Pages 83-83
    2. Yifan Tian, Jiawei Yuan, Shucheng Yu, Yantian Hou, Houbing Song
      Pages 85-104
    3. Chenglong Fu, Xiaojiang Du, Longfei Wu, Qiang Zeng, Amr Mohamed, Mohsen Guizani
      Pages 105-125
    4. Kyle Denney, Enes Erdin, Leonardo Babun, Michael Vai, Selcuk Uluagac
      Pages 126-146
    5. Jianhua Sun, Kun Sun, Chris Shenefiel
      Pages 147-167
  4. Catching Malware

    1. Front Matter
      Pages 169-169
    2. Shuang Zhao, Xiaobo Ma, Wei Zou, Bo Bai
      Pages 171-190
    3. Zhiqiang Li, Jun Sun, Qiben Yan, Witawas Srisa-an, Yutaka Tsutano
      Pages 214-234
    4. Steven Gianvecchio, Christopher Burkhalter, Hongying Lan, Andrew Sillers, Ken Smith
      Pages 235-254
  5. Machine Learning

    1. Front Matter
      Pages 255-255
    2. Jiahao Ding, Sai Mounika Errapotu, Haijun Zhang, Yanmin Gong, Miao Pan, Zhu Han
      Pages 257-277
    3. Yuping Li, Jiyong Jang, Xinming Ou
      Pages 278-298
    4. Shaohua Ding, Yulong Tian, Fengyuan Xu, Qun Li, Sheng Zhong
      Pages 299-318
    5. Mengxia Luo, Can Yang, Xiaorui Gong, Lei Yu
      Pages 319-337
  6. Everything Traffic Security

    1. Front Matter
      Pages 339-339
    2. Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
      Pages 341-364
    3. Rui Zhao, Edward Chow, Chunchun Li
      Pages 365-385
    4. Tao Chen, Weiqi Cui, Eric Chan-Tin
      Pages 386-405
    5. Kris Oosthoek, Christian Doerr
      Pages 406-425
  7. Communicating Covertly

    1. Front Matter
      Pages 427-427
    2. Jiahao Cao, Kun Sun, Qi Li, Mingwei Xu, Zijie Yang, Kyung Joon Kwak et al.
      Pages 429-449
    3. Riccardo Bortolameotti, Thijs van Ede, Andrea Continella, Maarten Everts, Willem Jonker, Pieter Hartel et al.
      Pages 450-471
  8. Let’s Talk Privacy

    1. Front Matter
      Pages 509-509
    2. Dawei Chu, Jingqiang Lin, Fengjun Li, Xiaokun Zhang, Qiongxiao Wang, Guangqi Liu
      Pages 511-531
    3. Lichuan Ma, Qingqi Pei, Youyang Qu, Kefeng Fan, Xin Lai
      Pages 532-548
    4. Savio Sciancalepore, Saeif Alhazbi, Roberto Di Pietro
      Pages 549-568
    5. Tanya Khatri, Gaby G. Dagher, Yantian Hou
      Pages 569-584
  9. Back Matter
    Pages 585-587

Other volumes

  1. Security and Privacy in Communication Networks
    15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I
  2. 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23–25, 2019, Proceedings, Part II

About these proceedings

Introduction

This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2019, held in Orlando, FL, USA, in October 2019.
The 38 full and 18 short papers were carefully reviewed and selected from 149 submissions. The papers are organized in topical sections on blockchains, internet of things, machine learning, everything traffic security communicating covertly, let’s talk privacy, deep analysis, systematic theory, bulletproof defenses, blockchains and IoT, security and analytics, machine learning, private, better clouds, ATCS workshop.

Keywords

artificial intelligence authentication communication computer crime computer operating systems cryptography data mining data privacy data security internet malware network security privacy privacy preserving public key cryptography robotics security systems semantics telecommunication networks wireless telecommunication systems

Editors and affiliations

  1. 1.George Mason UniversityFairfaxUSA
  2. 2.The University of Texas at San AntonioSan AntonioUSA
  3. 3.Boston UniversityLowellUSA
  4. 4.Virginia TechBlacksburgUSA
  5. 5.University of Central FloridaOrlandoUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-37228-6
  • Copyright Information ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-37227-9
  • Online ISBN 978-3-030-37228-6
  • Series Print ISSN 1867-8211
  • Series Online ISSN 1867-822X
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Energy, Utilities & Environment
Aerospace
Engineering