Note: Each poster presenter will be given a foam core boards of 30" x 40" and an easel (a wooden frame to support the board). We will provide push pins and Velcro dots for posting. In order for a poster not to be considered a "no-show" and to be submitted to IEEE Xplore, an author must present at the Welcome Reception / Poster session to talk about their work.
Accepted Poster List
-
Application-Layer DDoS in Dynamic Web-Domains: Building Defenses against Next-Generation Attack Behavior
Natalija Vlajic (York University, Canada); Dusan Stevanovic (York University, Canada)
-
P2P Networks Monitoring Based On the Social Network Analysis and the Topological Potential
Yixin Jiang (University of Waterloo, Canada); Hong Wen (UESTC, P.R. China); Bin Wu (Tianjin University, P.R. China)
-
Physical Layer Assist Mutual Authentication Scheme for Smart Meter System
Yixin Jiang (University of Waterloo, Canada); Hong Wen (UESTC, P.R. China); Bin Wu (Tianjin University, P.R. China)
-
Radio Frequency Fingerprinting and its Challenges
Saeed Ur Rehman (Unitec Institute of Technology, New Zealand)
-
DroidGraph: Discovering Android Malware by Analyzing Semantic Behavior
Jonghoon Kwon (Korea University, Korea); Jihwan Jeong (Korea University, Korea); Jehyun Lee (Korea University, Korea); Heejo Lee (Korea University, Korea)
-
A MIMO Cross-layer Precoding Security Communication System
Tang Jie (UESTC in China, P.R. China); Huan-huan Song (University of Electronic Science and Technology of China, P.R. China); Fei Pan (University of Electronic Science and Technology of China, P.R. China); Hong Wen (UESTC, P.R. China); Bin Wu (Tianjin University, P.R. China); Yixin Jiang (University of Waterloo, Canada); Xiaobin Guo (EPRI, China Southern Power Grid Co. Ltd., P.R. China)
-
Blind Detection Approach for LDPC, Convolutional, and Turbo Codes in Non-noisy Environment
Ahmed Refaey (University of Western Ontario, Canada); Raheleh Niati (Mircom Technologies Ltd., Canada); Xianbin Wang (The University of Western Ontario, Canada); Jean-Yves Chouinard (Laval University, Canada)
-
A Multi-factor Re-authentication Framework with User Privacy
A. Selcuk Uluagac (Florida International University, USA); Wenyi Liu (Georgia Tech, USA); Raheem Beyah (Georgia Institute of Technology, USA)
-
Guidelines for Vehicle Cyber Risks
Hirofumi Onishi (Alpine Electronics Research of America, USA)
-
Introducing Asymmetric DC-Nets
Fabio Borges (Technical University Darmstadt - Telecooperation Lab, Germany); Johannes Buchmann (Technical University Darmstadt, Germany); Max Muehlhaeuser (Technical University Darmstadt, Germany)
-
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication
Johannes Braun (Technical University Darmstadt, Germany)
-
Towards Time-varying Classification Based on Traffic Pattern
Yiyang Shao (Tsinghua University, P.R. China); Luoshi Zhang (Harbin University of Science and Technology, P.R. China); Xiaoxian Chen (Harbin University of Science and Technology, P.R. China); Yibo Xue (Tsinghua university, P.R. China)
-
Physical Integrity Check in Wireless Relay Networks
Sang Wu Kim (Iowa State University, USA)
-
The Greenhouse Effect Attack
Pietro Marchetta (University of Napoli, Italy); Valerio Persico (University of Napoli, Italy); Antonio Pescape (University of Napoli Federico II, Italy)
-
Location Privacy for a quality of access to mobile Internet monitoring system
Giselle Font (University of Chile, Chile); Javier Bustos-Jimenez (Universidad de Chile, Chile); Alejandro Hevia(Universidad de Chile, Chile); Sebastian Blasco (NIC Chile Research Labs, University of Chile, Chile)
-
Detecting anomalies in DNS protocol through passive testing and process mining
Cecilia Saint-Pierre (Universidad Catolica de Chile, Chile); Francisco Cifuentes (Universidad de Chile, Chile); Javier Bustos-Jimenez (Universidad de Chile, Chile)
-
Improving Smart Grid Security using Merkle Trees
Melesio Munoz (Cupertino Electric Inc, USA); Melody Moh (San Jose State University, USA); Teng-Sheng Moh (San Jose State University, USA)