Accepted Posters


Note: Each poster presenter will be given a foam core boards of 30" x 40" and an easel (a wooden frame to support the board). We will provide push pins and Velcro dots for posting. In order for a poster not to be considered a "no-show" and to be submitted to IEEE Xplore, an author must present at the Welcome Reception / Poster session to talk about their work.


Accepted Poster List

  • Application-Layer DDoS in Dynamic Web-Domains: Building Defenses against Next-Generation Attack Behavior

    Natalija Vlajic (York University, Canada); Dusan Stevanovic (York University, Canada)

     

  • P2P Networks Monitoring Based On the Social Network Analysis and the Topological Potential

    Yixin Jiang (University of Waterloo, Canada); Hong Wen (UESTC, P.R. China); Bin Wu (Tianjin University, P.R. China)

     

  • Physical Layer Assist Mutual Authentication Scheme for Smart Meter System

    Yixin Jiang (University of Waterloo, Canada); Hong Wen (UESTC, P.R. China); Bin Wu (Tianjin University, P.R. China)

     

  • Radio Frequency Fingerprinting and its Challenges

    Saeed Ur Rehman (Unitec Institute of Technology, New Zealand)

     

  • DroidGraph: Discovering Android Malware by Analyzing Semantic Behavior

    Jonghoon Kwon (Korea University, Korea); Jihwan Jeong (Korea University, Korea); Jehyun Lee (Korea University, Korea); Heejo Lee (Korea University, Korea)

     

  • A MIMO Cross-layer Precoding Security Communication System

    Tang Jie (UESTC in China, P.R. China); Huan-huan Song (University of Electronic Science and Technology of China, P.R. China); Fei Pan (University of Electronic Science and Technology of China, P.R. China); Hong Wen (UESTC, P.R. China); Bin Wu (Tianjin University, P.R. China); Yixin Jiang (University of Waterloo, Canada); Xiaobin Guo (EPRI, China Southern Power Grid Co. Ltd., P.R. China)

     

  • Blind Detection Approach for LDPC, Convolutional, and Turbo Codes in Non-noisy Environment

    Ahmed Refaey (University of Western Ontario, Canada); Raheleh Niati (Mircom Technologies Ltd., Canada); Xianbin Wang (The University of Western Ontario, Canada); Jean-Yves Chouinard (Laval University, Canada)

     

  • A Multi-factor Re-authentication Framework with User Privacy

    A. Selcuk Uluagac (Florida International University, USA); Wenyi Liu (Georgia Tech, USA); Raheem Beyah (Georgia Institute of Technology, USA)

     

  • Guidelines for Vehicle Cyber Risks

    Hirofumi Onishi (Alpine Electronics Research of America, USA)

     

  • Introducing Asymmetric DC-Nets

    Fabio Borges (Technical University Darmstadt - Telecooperation Lab, Germany); Johannes Buchmann (Technical University Darmstadt, Germany); Max Muehlhaeuser (Technical University Darmstadt, Germany)

     

  • Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication

    Johannes Braun (Technical University Darmstadt, Germany)

     

  • Towards Time-varying Classification Based on Traffic Pattern

    Yiyang Shao (Tsinghua University, P.R. China); Luoshi Zhang (Harbin University of Science and Technology, P.R. China); Xiaoxian Chen (Harbin University of Science and Technology, P.R. China); Yibo Xue (Tsinghua university, P.R. China)

     

  • Physical Integrity Check in Wireless Relay Networks

    Sang Wu Kim (Iowa State University, USA)

     

  • The Greenhouse Effect Attack

    Pietro Marchetta (University of Napoli, Italy); Valerio Persico (University of Napoli, Italy); Antonio Pescape (University of Napoli Federico II, Italy)

     

  • Location Privacy for a quality of access to mobile Internet monitoring system

    Giselle Font (University of Chile, Chile); Javier Bustos-Jimenez (Universidad de Chile, Chile); Alejandro Hevia(Universidad de Chile, Chile); Sebastian Blasco (NIC Chile Research Labs, University of Chile, Chile)

     

  • Detecting anomalies in DNS protocol through passive testing and process mining

    Cecilia Saint-Pierre (Universidad Catolica de Chile, Chile); Francisco Cifuentes (Universidad de Chile, Chile); Javier Bustos-Jimenez (Universidad de Chile, Chile)

     

  • Improving Smart Grid Security using Merkle Trees

    Melesio Munoz (Cupertino Electric Inc, USA); Melody Moh (San Jose State University, USA); Teng-Sheng Moh (San Jose State University, USA)