IEEE CNS 2017 Posters
Monday, October 9, 2017
18:30 – 20:30 Poster Session in conjunction with the Welcome Reception
POSTER PREPARATION:
TEMPLATE: There is no predefined template for posters, you are free to use your own template.
SIZE: You should use the typical large poster size (24” x 36” = 61cm x 91cm). You can also opt for a slightly larger size (the foam core board will be 30” x 40”). We will provide push pins for mounting your poster to the board.
POSTER SESSION: Monday, October 9, 2017
TIME: The poster session will be held in conjunction with the welcome reception from 18:30 - 20:30.
ACCEPTED POSTERS
1 VulMap: Global Information Security Vulnerabilities
Dennis Kergl, Robert Roedler and Gabi Dreo Rodosek (Universität der Bundeswehr München, Germany)
2 Physical Layer Authentication Based on Channel Information and Machine Learning
Fei Pan (University of Electronic Science and Technology of China, P.R. China); Hong Wen and Run-Fa Liao (UESTC, P.R. China); Yixin Jiang (Southern Electric Power Research Institute, P.R. China); Aidong Xu (Electric Power Research Institute China Southern Power Grid, P.R. China); Kai Ouyang (UESTC, P.R. China); Xiping Zhu (University of Electronic Science and Technology of China, P.R. China)
3 A Physical Layer Secure Transmission Method based on Channel Prediction and QoS
Run-Fa Liao and Hong Wen (UESTC, P.R. China); Fei Pan and Huanhuan Song (University of Electronic Science and Technology of China, P.R. China); Yixin Jiang (Southern Electric Power Research Institute, P.R. China); Feiyi Xie (University of Electronic Science and Technology of China, P.R. China); Aidong Xu (Electric Power Research Institute China Southern Power Grid, P.R. China)
4 Performance Analysis of Cooperative Secure Transmission System
Huanhuan Song and Luping Zhang (University of Electronic Science and Technology of China, P.R. China); Hong Wen, Run-Fa Liao, Songlin Chen and Yi Chen (UESTC, P.R. China); Yixin Jiang (Southern Electric Power Research Institute, P.R. China)
5 A Model Divides the Mobile Security Level Based on SVM
Qing Yang and Hong Wen (UESTC, P.R. China); Yixin Jiang (Southern Electric Power Research Institute, P.R. China); Aidong Xu (Electric Power Research Institute China Southern Power Grid, P.R. China)
6 A method of reconciling the key discrepancy by exploiting Unconditional Secure Transmission
Wei Cheng (University Of Electronic Science And Technology Of China, P.R. China); Hong Wen (UESTC, P.R. China); Huanhuan Song (University of Electronic Science and Technology of China, P.R. China); Yixin Jiang (Southern Electric Power Research Institute, P.R. China); Aidong Xu (Electric Power Research Institute China Southern Power Grid, P.R. China); Kai Ouyang (UESTC, P.R. China); Xiping Zhu (University of Electronic Science and Technology of China, P.R. China)
7 The Realization of Key Extraction based on USRP and OFDM Channel Response
Wei Cheng (University Of Electronic Science And Technology Of China, P.R. China); Hong Wen (UESTC, P.R. China); Huanhuan Song (University of Electronic Science and Technology of China, P.R. China); Yixin Jiang (Southern Electric Power Research Institute, P.R. China); Aidong Xu (Electric Power Research Institute China Southern Power Grid, P.R. China); Kai Ouyang (UESTC, P.R. China); Xiping Zhu (University of Electronic Science and Technology of China, P.R. China)
8 Leveraging Inter-Controller Communication to Mitigate DDoS Attacks in SDN Networks
Jean Paul Houle and Saeed Ahmadi (Carleton University, Canada); Brent Robart (University of Ottawa, Canada); Ashraf Matrawy (Carleton University, Canada)
9 Naggen: a Network Attack Graph GENeration Tool
Martín Barrère (Imperial College London, United Kingdom (Great Britain)); Emil Lupu (Imperial College, United Kingdom (Great Britain))
Martín Barrère (Imperial College London, United Kingdom (Great Britain)); Emil Lupu (Imperial College, United Kingdom (Great Britain))
10 Time-Varying Keys for Encryption in WSN
Elena Uchiteleva (The University of Western Ontario, Canada); Abdallah Shami (University of Western Ontario, Canada); Ahmed Refaey (Manhattan College, USA & Western University, Canada)
11 Cryptanalysis of Stream Cipher Using Density Evolution
Ahmed Refaey (Manhattan College, USA & Western University, Canada); Khaled Loukhaoukha (Laval University, Canada); Adel Omar Dahmane (Universite du Quebec a Trois-Rivieres, Canada)
12 Security and Trust for Surveillance Cameras
Konstantin Boyarinov and Aaron Hunter (BCIT, Canada)
13 Bluetooth for Decoy Systems: A Practical Study
Ken Wong and Aaron Hunter (BCIT, Canada)
14 Combining FPGAs and processors for high-throughput forensics
Franck Cornevaux-Juignet, Matthieu Arzel and Pierre-Henri Horrein (IMT Atlantique, France); Tristan Groléat (OVH, France); Christian Person (IMT Atlantique, France)
15 Current State of Client-side Extensions Aimed at Protecting Against CSRF-like Attacks
Natalija Vlajic (York University, Canada)
16 Public Key Exchange scheme that is Addressable (PKA)
Bilal Habib (Northern Arizona University, USA); Bertrand Cambou (Northern Arizona University & Northern Arizona University, USA); Dennis Booher and Christopher Philabaum (Northern Arizona University, USA)
17 Quantitative Models of Imperfect Deception in Network Security using Signaling Games with Evidence
Jeffrey Pawlick and Quanyan Zhu (New York University, USA)
18 Distributed Shuffle Index: Analysis and Implementation in an Industrial Testbed
Enrico Bacis (University of Bergamo, Italy); Alan Barnett (Dell EMC, Ireland); Andrew Byrne (DELL, Ireland); Sabrina De Capitani di Vimercati (Universita` degli Studi di Milano, Italy); Sara Foresti (Università degli Studi di Milano, Italy); Stefano Paraboschi and Marco Rosa (University of Bergamo, Italy); Pierangela Samarati (Universita' degli Studi di Milano, Italy)
19 Toward the SIEM Architecture for Cloud-based Security Services
Jong-Hoon Lee, Youngsoo Kim and Jonghyun Kim (ETRI, Korea)