A Machine Learning Based Smartphone App for GPS Spoofing Detection (Englisch)
- Neue Suche nach: Campos, Javier
- Neue Suche nach: Johnson, Kristen
- Neue Suche nach: Neeley, Jonathan
- Neue Suche nach: Roesch, Staci
- Neue Suche nach: Jahan, Farha
- Neue Suche nach: Niyaz, Quamar
- Neue Suche nach: Al Shamaileh, Khair
- Neue Suche nach: Park, Noseong
- Neue Suche nach: Sun, Kun
- Neue Suche nach: Foresti, Sara
- Neue Suche nach: Butler, Kevin
- Neue Suche nach: Saxena, Nitesh
- Neue Suche nach: Campos, Javier
- Neue Suche nach: Johnson, Kristen
- Neue Suche nach: Neeley, Jonathan
- Neue Suche nach: Roesch, Staci
- Neue Suche nach: Jahan, Farha
- Neue Suche nach: Niyaz, Quamar
- Neue Suche nach: Al Shamaileh, Khair
In:
Security and Privacy in Communication Networks
: 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II
;
Kapitel: 13
;
235-241
;
2020
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:A Machine Learning Based Smartphone App for GPS Spoofing Detection
-
Weitere Titelangaben:Lect.Notes Social.Inform.
-
Beteiligte:Park, Noseong ( Herausgeber:in ) / Sun, Kun ( Herausgeber:in ) / Foresti, Sara ( Herausgeber:in ) / Butler, Kevin ( Herausgeber:in ) / Saxena, Nitesh ( Herausgeber:in ) / Campos, Javier ( Autor:in ) / Johnson, Kristen ( Autor:in ) / Neeley, Jonathan ( Autor:in ) / Roesch, Staci ( Autor:in ) / Jahan, Farha ( Autor:in )
-
Kongress:International Conference on Security and Privacy in Communication Systems ; 2020 ; Washington, WA, USA
-
Erschienen in:Security and Privacy in Communication Networks : 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II ; Kapitel: 13 ; 235-241
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:12.12.2020
-
Format / Umfang:7 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
A Practical Machine Learning-Based Framework to Detect DNS Covert Communication in EnterprisesTang, Ruming / Huang, Cheng / Zhou, Yanti / Wu, Haoxian / Lu, Xianglin / Sun, Yongqian / Li, Qi / Li, Jinjin / Huang, Weiyao / Sun, Siyuan et al. | 2020
- 2
-
CacheLoc: Leveraging CDN Edge Servers for User GeolocationWei, Mingkui / Rabieh, Khaled / Kaleem, Faisal et al. | 2020
- 3
-
Modeling Mission Impact of Cyber Attacks on Energy Delivery SystemsHaque, Md Ariful / Shetty, Sachin / Kamhoua, Charles A. / Gold, Kimberly et al. | 2020
- 4
-
Identifying DApps and User Behaviors on Ethereum via Encrypted TrafficWang, Yu / Li, Zhenzhen / Gou, Gaopeng / Xiong, Gang / Wang, Chencheng / Li, Zhen et al. | 2020
- 5
-
TransNet: Unseen Malware Variants Detection Using Deep Transfer LearningRong, Candong / Gou, Gaopeng / Cui, Mingxin / Xiong, Gang / Li, Zhen / Guo, Li et al. | 2020
- 6
-
A Brokerage Approach for Secure Multi-Cloud Storage Resource ManagementSukmana, Muhammad Ihsan Haikal / Torkura, Kennedy Aondona / Prasetyo, Sezi Dwi Sagarianti / Cheng, Feng / Meinel, Christoph et al. | 2020
- 7
-
On the Effectiveness of Behavior-Based Ransomware DetectionHan, Jaehyun / Lin, Zhiqiang / Porter, Donald E. et al. | 2020
- 8
-
PoQ: A Consensus Protocol for Private Blockchains Using Intel SGXBashar, Golam Dastoger / Avila, Alejandro Anzola / Dagher, Gaby G. et al. | 2020
- 9
-
Share Withholding in Blockchain MiningChang, Sang-Yoon et al. | 2020
- 10
-
PEDR: A Novel Evil Twin Attack Detection Scheme Based on Phase Error Drift RangeZhang, Jiahui / Lu, Qian / Jiang, Ruobing / Qu, Haipeng et al. | 2020
- 11
-
Differentially Private Social Graph Publishing for Community DetectionMa, Xuebin / Yang, Jingyu / Guan, Shengyi et al. | 2020
- 12
-
LaaCan: A Lightweight Authentication Architecture for Vehicle Controller Area NetworkHridoy, Syed Akib Anwar / Zulkernine, Mohammad et al. | 2020
- 13
-
A Machine Learning Based Smartphone App for GPS Spoofing DetectionCampos, Javier / Johnson, Kristen / Neeley, Jonathan / Roesch, Staci / Jahan, Farha / Niyaz, Quamar / Al Shamaileh, Khair et al. | 2020
- 14
-
AOMDroid: Detecting Obfuscation Variants of Android Malware Using Transfer LearningJiang, Yu / Li, Ruixuan / Tang, Junwei / Davanian, Ali / Yin, Heng et al. | 2020
- 15
-
ML-Based Early Detection of IoT BotnetsKumar, Ayush / Shridhar, Mrinalini / Swaminathan, Sahithya / Joon Lim, Teng et al. | 2020
- 16
-
Post-Quantum Cryptography in WireGuard VPNKniep, Quentin M. / Müller, Wolf / Redlich, Jens-Peter et al. | 2020
- 17
-
Evaluating the Cost of Personnel Activities in Cybersecurity Management: A Case StudyLeszczyna, Rafał et al. | 2020
- 18
-
SGX-Cube: An SGX-Enhanced Single Sign-On System Against Server-Side Credential LeakageLiu, Songsong / Song, Qiyang / Sun, Kun / Li, Qi et al. | 2020
- 19
-
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$EW_{256357}$$\end{document}: A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications’ SecuritySen, Nilanjan / Dantu, Ram / Morozov, Kirill et al. | 2020
- 20
-
Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera SystemFan, Xinxin / Zhong, Zhi / Chai, Qi / Guo, Dong et al. | 2020
- 21
-
Private Global Generator Aggregation from Different Types of Local ModelsHan, Chunling / Xue, Rui et al. | 2020
- 22
-
Perturbing Smart Contract Execution Through the Underlying RuntimeCui, Pinchen / Umphress, David et al. | 2020
- 23
-
Blockchain Based Multi-keyword Similarity Search Scheme over Encrypted DataLi, Mingyue / Jia, Chunfu / Shao, Wei et al. | 2020
- 24
-
Using the Physical Layer to Detect Attacks on Building Automation NetworksZdziarstek, Andreas / Brekenfelder, Willi / Eibisch, Felix et al. | 2020
- 25
-
Formalizing Dynamic Behaviors of Smart Contract Workflow in Smart Healthcare Supply ChainRahman, Mohammad Saidur / Khalil, Ibrahim / Bouras, Abdelaziz et al. | 2020
- 26
-
Malware Classification Using Attention-Based Transductive Learning NetworkDeng, Liting / Wen, Hui / Xin, Mingfeng / Sun, Yue / Sun, Limin / Zhu, Hongsong et al. | 2020
- 27
-
COOB: Hybrid Secure Device Pairing Scheme in a Hostile EnvironmentKhalfaoui, Sameh / Leneutre, Jean / Villard, Arthur / Ma, Jingxuan / Urien, Pascal et al. | 2020
- 28
-
A Robust Watermarking Scheme with High Security and Low Computational ComplexityLi, Liangjia / Luo, Yuling / Liu, Junxiu / Qiu, Senhui / Li, Lanhang et al. | 2020
- 29
-
Selecting Privacy Enhancing Technologies for IoT-Based ServicesKunz, Immanuel / Banse, Christian / Stephanow, Philipp et al. | 2020
- 30
-
Khopesh - Contact Tracing Without Sacrificing PrivacyDoku, Friedrich / Doku, Ethan et al. | 2020