2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)

12-14 Oct. 2017

Filter Results

Displaying Results 1 - 25 of 101
  • [Front cover]

    Publication Year: 2017, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2456 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2017, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2017, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • Introduction

    Publication Year: 2017, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • Message from Technical Program Chairs

    Publication Year: 2017, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Message from Steering Committee Chair

    Publication Year: 2017, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2017, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2017, Page(s):xix - xx
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2017, Page(s):xxi - xxiii
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2017, Page(s):xxiv - xxx
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SIRS Model and Stability Based on Open Cyber Ecosystem

    Publication Year: 2017, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    For an open cyber ecosystem, elements and system will face the complexity and uncertainty to satisfy collective security defense. In the paper, a novel susceptible-infected-removed-susceptible (SIRS) model is proposed based on an open cyber ecosystem. Specifically, the factors of node increasing and decreasing are introduced to the traditional SIRS model, and system dynamics equations are derived.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing the Cyber-Attack Path with the Bayesian Network Deducing Approach

    Publication Year: 2017, Page(s):5 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    It is possible that an invisible adversary can damage a physical component with the cyber-attacks such as in the Stuxnet, which plays a havoc demonstration in cyber-security. In this paper, we propose a cyber-attacks analysis model based on the Bayesian network approaches. By the construction of attack graph covering all possible atomic attacking paths, we utilize the Bayesian reasoning to deduce ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Differential Privacy Data Protection Method Based on Clustering

    Publication Year: 2017, Page(s):11 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    To enhance privacy protection and improve data availability, a differential privacy data protection method ICMD-DP is proposed. Based on insensitive clustering algorithm, ICMD-DP performs differential privacy on the results of ICMD (insensitive clustering method for mixed data). The combination of clustering and differential privacy realizes the differentiation of query sensitivity from single rec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing and Recognizing Android Malware via Semantic-Based Malware Gene

    Publication Year: 2017, Page(s):17 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    With the popularity of mobile platform, users' sensitive information and financial security are connecting closely to smartphones. An increasing number of malware samples appear in Android since it is the most popular operating system. However, there are no systematic methods to analyze and recognize those malware samples. Malware is labeled and classified in different standards. In this paper, An... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CENTRA: CENtrally Trusted Routing vAlidation for IGP

    Publication Year: 2017, Page(s):21 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    Trusted routing is a hot spot in network security. Lots of efforts have been made on trusted routing validation for Interior Gateway Protocols (IGP), e.g., using Public Key Infrastructure (PKI) to enhance the security of protocols, or routing monitoring systems. However, the former is limited by further deployment in the practical Internet, the latter depends on a complete, accurate, and fresh kno... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social Engineering and Insider Threats

    Publication Year: 2017, Page(s):25 - 34
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (450 KB) | HTML iconHTML

    This paper describes our research on the insider threats of Social engineering. Social engineering is a method using interaction between humans to get the access of a system in an illegal way. Due to staff's lack of confidentiality, the confidentiality of records is compromised, data is stolen or financial damage is done. This is insider threat. Social engineering and insider threat are two of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Differential-Privacy-Based Correlation Analysis in Railway Freight Service Applications

    Publication Year: 2017, Page(s):35 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    With the development of modern logistics industry railway freight enterprises as the main traditional logistics enterprises, the service mode is facing many problems. In the era of big data, for railway freight enterprises, coordinated development and sharing of information resources have become the requirements of the times, while how to protect the privacy of citizens has become one of the focus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating Features and Effectiveness of Secure QR Code Scanners

    Publication Year: 2017, Page(s):40 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    As QR codes become ubiquitous, there is a prominent security threat of phishing and malware attacks that can be carried out by sharing rogue URLs through such codes. Several QR code scanner apps have become available in the past few years to combat such threats. Nevertheless, limited work exists in the literature evaluating such apps in the context of security. In this paper, we have investigated ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture

    Publication Year: 2017, Page(s):50 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    In cyberspace, unknown zero-day attacks can bring safety hazards. Traditional defense methods based on signatures are ineffective. Based on the Cyberspace Mimic Defense (CMD) architecture, the paper proposes a framework to detect the attacks and respond to them. Inputs are assigned to all online redundant heterogeneous functionally equivalent modules. Their independent outputs are compared and the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resist the Database Intrusion Caused by Functional Dependency

    Publication Year: 2017, Page(s):54 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (390 KB) | HTML iconHTML

    The popularity of cloud computing enables end-users to outsource their dataset and data management needs a thirdparty service provider. The major security issue in outsourcing mode is how to protect sensitive information in the outsourced dataset. Data dependency constraints in the outsourced data can provide knowledge for the negative side and bring security vulnerabilities. In this paper, we foc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Chosen IV Statistical Attack on Grain-128a Cipher

    Publication Year: 2017, Page(s):58 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (361 KB) | HTML iconHTML

    Grain-128a is a well-known stream cipher which has resisted against all types of single-key attacks since its introduction in 2011. A chosen IV conditional differential attack was applied on Grain-128a with 177 initial rounds. It was a distinguishing attack. Another conditional differential attack was recovered 18 secret key expressions of Grain-128a with 169 initial rounds. We propose a new chose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of Turbo Code and Trellis BICM-ID on PNC over Impulsive Channel

    Publication Year: 2017, Page(s):63 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1694 KB) | HTML iconHTML

    Physical-Layer Network Coding (PNC) employed on a two-way relay channel (TWRC) is an active research area due to potential doubling of the throughput compared with traditional routing. In this paper, we investigate the effects of impulsive noise added at the relay and sink nodes of a TWRC employing link-by-link coded PNC. The Gaussian mixture model is chosen to model the impulsive noise and the pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An IPv6-based Load Balancing Strategy for Ecological Monitoring Network

    Publication Year: 2017, Page(s):72 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (514 KB) | HTML iconHTML

    Wireless sensor networks have been widely used in environmental monitoring, but one of the characteristics of the traditional IPv6 wireless sensor networks using in the environmental monitoring is traffic convergent. In the root node, the flow of collecting sensor data could be much heavy than other nodes. The overall structure of the load is unbalance. Therefore, using multiple devices at the roo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.