Posters

IEEE CNS 2017 Posters

Monday, October 9, 2017
18:30 – 20:30 Poster Session in conjunction with the Welcome Reception

 

POSTER PREPARATION:

TEMPLATE: There is no predefined template for posters, you are free to use your own template.

SIZE: You should use the typical large poster size (24” x 36” = 61cm x 91cm). You can also opt for a slightly larger size (the foam core board will be 30” x 40”). We will provide push pins for mounting your poster to the board. 

POSTER SESSION: Monday, October 9, 2017

TIME: The poster session will be held in conjunction with the welcome reception from 18:30 - 20:30.

 

ACCEPTED POSTERS

1  VulMap: Global Information Security Vulnerabilities  
Dennis Kergl, Robert Roedler and Gabi Dreo Rodosek (Universität der Bundeswehr München, Germany)
 
2  Physical Layer Authentication Based on Channel Information and Machine Learning  
Fei Pan (University of Electronic Science and Technology of China, P.R. China); Hong Wen and Run-Fa Liao (UESTC, P.R. China); Yixin Jiang (Southern Electric Power Research Institute, P.R. China); Aidong Xu (Electric Power Research Institute China Southern Power Grid, P.R. China); Kai Ouyang (UESTC, P.R. China); Xiping Zhu (University of Electronic Science and Technology of China, P.R. China)
 
3  A Physical Layer Secure Transmission Method based on Channel Prediction and QoS  
Run-Fa Liao and Hong Wen (UESTC, P.R. China); Fei Pan and Huanhuan Song (University of Electronic Science and Technology of China, P.R. China); Yixin Jiang (Southern Electric Power Research Institute, P.R. China); Feiyi Xie (University of Electronic Science and Technology of China, P.R. China); Aidong Xu (Electric Power Research Institute China Southern Power Grid, P.R. China)
 
4  Performance Analysis of Cooperative Secure Transmission System  
Huanhuan Song and Luping Zhang (University of Electronic Science and Technology of China, P.R. China); Hong Wen, Run-Fa Liao, Songlin Chen and Yi Chen (UESTC, P.R. China); Yixin Jiang (Southern Electric Power Research Institute, P.R. China)
 
5  A Model Divides the Mobile Security Level Based on SVM  
Qing Yang and Hong Wen (UESTC, P.R. China); Yixin Jiang (Southern Electric Power Research Institute, P.R. China); Aidong Xu (Electric Power Research Institute China Southern Power Grid, P.R. China)
 
6  A method of reconciling the key discrepancy by exploiting Unconditional Secure Transmission  
Wei Cheng (University Of Electronic Science And Technology Of China, P.R. China); Hong Wen (UESTC, P.R. China); Huanhuan Song (University of Electronic Science and Technology of China, P.R. China); Yixin Jiang (Southern Electric Power Research Institute, P.R. China); Aidong Xu (Electric Power Research Institute China Southern Power Grid, P.R. China); Kai Ouyang (UESTC, P.R. China); Xiping Zhu (University of Electronic Science and Technology of China, P.R. China)
 
7  The Realization of Key Extraction based on USRP and OFDM Channel Response  
Wei Cheng (University Of Electronic Science And Technology Of China, P.R. China); Hong Wen (UESTC, P.R. China); Huanhuan Song (University of Electronic Science and Technology of China, P.R. China); Yixin Jiang (Southern Electric Power Research Institute, P.R. China); Aidong Xu (Electric Power Research Institute China Southern Power Grid, P.R. China); Kai Ouyang (UESTC, P.R. China); Xiping Zhu (University of Electronic Science and Technology of China, P.R. China)
 
8  Leveraging Inter-Controller Communication to Mitigate DDoS Attacks in SDN Networks  
Jean Paul Houle and Saeed Ahmadi (Carleton University, Canada); Brent Robart (University of Ottawa, Canada); Ashraf Matrawy (Carleton University, Canada)
 
9  Naggen: a Network Attack Graph GENeration Tool  
Martín Barrère (Imperial College London, United Kingdom (Great Britain)); Emil Lupu (Imperial College, United Kingdom (Great Britain))
 
10  Time-Varying Keys for Encryption in WSN  
Elena Uchiteleva (The University of Western Ontario, Canada); Abdallah Shami (University of Western Ontario, Canada); Ahmed Refaey (Manhattan College, USA & Western University, Canada)
 
11  Cryptanalysis of Stream Cipher Using Density Evolution  
Ahmed Refaey (Manhattan College, USA & Western University, Canada); Khaled Loukhaoukha (Laval University, Canada); Adel Omar Dahmane (Universite du Quebec a Trois-Rivieres, Canada)
 
12  Security and Trust for Surveillance Cameras  
Konstantin Boyarinov and Aaron Hunter (BCIT, Canada)
 
13  Bluetooth for Decoy Systems: A Practical Study  
Ken Wong and Aaron Hunter (BCIT, Canada)
 
14  Combining FPGAs and processors for high-throughput forensics  
Franck Cornevaux-Juignet, Matthieu Arzel and Pierre-Henri Horrein (IMT Atlantique, France); Tristan Groléat (OVH, France); Christian Person (IMT Atlantique, France)
 
15  Current State of Client-side Extensions Aimed at Protecting Against CSRF-like Attacks  
Natalija Vlajic (York University, Canada)
 
16  Public Key Exchange scheme that is Addressable (PKA)  
Bilal Habib (Northern Arizona University, USA); Bertrand Cambou (Northern Arizona University & Northern Arizona University, USA); Dennis Booher and Christopher Philabaum (Northern Arizona University, USA)
 
17  Quantitative Models of Imperfect Deception in Network Security using Signaling Games with Evidence  
Jeffrey Pawlick and Quanyan Zhu (New York University, USA)
 
18  Distributed Shuffle Index: Analysis and Implementation in an Industrial Testbed  
Enrico Bacis (University of Bergamo, Italy); Alan Barnett (Dell EMC, Ireland); Andrew Byrne (DELL, Ireland); Sabrina De Capitani di Vimercati (Universita` degli Studi di Milano, Italy); Sara Foresti (Università degli Studi di Milano, Italy); Stefano Paraboschi and Marco Rosa (University of Bergamo, Italy); Pierangela Samarati (Universita' degli Studi di Milano, Italy)
 
19  Toward the SIEM Architecture for Cloud-based Security Services  
Jong-Hoon Lee, Youngsoo Kim and Jonghyun Kim (ETRI, Korea)