|
Page no. |
Using Qualia and Hierarchical Models in Malware
Detection |
247 |
Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Mark E. Oxley, and Steven K. Rogers
|
|
|
|
|
|
ACMF: Framework for modeling attack based on Capability Model
|
256 |
Navneet Kumar Pandey, S. K. Gupta and Shaveta Leekha
|
|
|
|
|
|
|
|
Analysis of User Command Behavior and Masquerade Detection |
265 |
Shou-Hsuan Stephen Huang and Han-Ching Wu
|
|
|
|
|
|
|
|
A Kernel Data Analysis Method for Detecting Flood Attacks (brief paper) |
274 |
Jaeik Cho, Manhyun Chung and Jongsub Moon
|
|
|
|
|
|
A security policy and Network Cartography based Intrusion Detection and Prevention Systems
|
279 |
Sourour Meharouech, Adel Bouhoula, Tarek Abbes
|
|
|
|
Detection of Email Worm-Infected Machines on the Local Name Servers Using Time Series Analysis |
292 |
Nikolaos Chatzis and Radu Popescu-Zeletin |
|
|
|
|
|
Automated framework for policy optimization in firewalls and security gateways |
301 |
Gianluca Maiolini, Alessio Nicotra, Paolo Tornari, and Andrea Baiocchi |
|
|
|
|
|
Abusing SIP authentication
|
311 |
Humberto Abdelnur, Tigran Avanesov, Michael Rusinowitch and Radu State |
|
|
|
|
|
|
|
Security Analysis of RBAC with Temporal Constraints – A Model Checking Approach |
319 |
Samrat Mondal and Shamik Sural |
|
|
|
|
|
|
|
A Novel Validation Method for Firewall Security Policy |
329 |
Ryma
Abbassi and Sihem Guemara El Fatmi |
|
|
|
|
|
Towards a secure E-passport protocol based on biometrics
|
338 |
Mohamed Abid and Hossam Afifi |
|
|
|
Multiple Speaker Models and their Combination in Access Control Tasks |
346 |
Donato Impedovo and Mario Refice |
|
|
|
|
|
A Security Framework and its Implementation in Fast Data Transfer Next Generation Protocol UDT |
354 |
Danilo Valeros Bernardo, Doan Hoang |
|
|
|
A Purchase Protocol with Multichannel Authentication |
361 |
Hannan Xiao, Bruce Christianson, and Ying Zhang
|
|
|
|
Formal definition and comparison of access control models |
372 |
Lionel Habib, Mathieu Jaume and Charles Morisset | |
A Model for the Study of Privacy Issues in Secure Shell Connections
|
382 |
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
|
|
|
|
|
|
|
|
Secure Connected Home: where the semantic technologies meet the device community |
390 |
Mohammad M. R. Chowdhury, Sarfraz Alam and Josef Noll
|
|
|
|
|
|
|
|
Identity Resolutionin Criminal Justice Data: An Application of NORA and SUDA |
403 |
Queen E. Booker
|
|
|
|
|
|
Privacy Compliance with Web Services
|
412 |
Peter Bodorik, Dawn Jutla, and Indermohan Dhillon
|
|
|
|
Determining the State Sequence to Maximize P(O,I│λ) on Distributed HMMs with Privacy |
422 |
Sahin Renkes, Huseyin Polat and Yusuf Oysal |
|
|
|
|
|
Geolocation-based Trust for Vanet’s Privacy |
432 |
Jetzabel Serna, Jesus Luna and Manel Medina
|
|
|
|
|
|
A Friend Mechanism for Mobile Ad Hoc Networks
|
440 |
Shukor Abd Razak, Normalia Samian, Mohd. Aizaini Ma’arof, S. M. Furnell and N. L. Clarke, P. J. Brooke
|
|
|
|
|
|
|
|
Trusted-Computing Technologies for the Protection
of Critical Information Systems |
449 |
Antonio Lioy, Gianluca Ramunno and Davide Vernizzi
|
|
|
|
|
|
|
|
Evaluating the Device Reputation through Full Observation in MANETs |
458 |
G. Bella, G. Costantino and S. Riccobene
|
|
|
|
|
|
Bidirectional Secret Communication by
Quantum Collisions
|
466 |
Fabio
Antonio Bovino
|
|
|
|
A Watermarking Technique based on
Visual Cryptography (short paper) |
470 |
B. Surekha, G.N. Swamy, K. Srinivasa Rao and A. Ravi Kumar |
|
|
|
|
|
Adapting and accelerating the Stream
Cipher Algorithm "RC4" using "Ultra Gridsec" and
"HIMAN" and use it to secure "HIMAN" Data |
474 |
Hisham
A. Kholidy and Khaled S. Alghathbar
|
|
|
|
Enhancing File Data Security in Linux
Operating System by Integrating Secure File System |
484 |
Rajesh
Kumar Pal and Indranil Sengupta
|
|
|
|
Challenges for Security Typed Web
Scripting Languages Design |
493 |
Doaa
Hassan, Sherif El- Kassas and Ibrahim Ziedan
| |
| |
|
|
Security Issues in Drinking Water
Distribution Networks |
500 |
Demetrios
G. Eliades, Marios M. Polycarpou and Bambos Charalambous
|
|
|
|
|
|
Protection of Real and Artwork
Human Objects based on a Chaotic Moments Modulation Method
|
509 |
Klimis
Ntalianis, Paraskevi Tzouveli, Stefanos Kollias and Athanasios Drigas
|
|
|
|
Security Requirements in Judicial
Information Systems: Experience from a European Project for Judicial
Cross-Border Collaboration |
519 |
George
Eleftherakis, Konstantinos Rousis, Mauro Cislaghi, Roberto Mazzilli
and Sara Ferri |
|
|
|
|
|
Secure Communication for
Hierarchical Groups |
530 |
Sigurd
Eskeland and Vladimir Oleshchuk
|
|
|
|
Time Domain Performances Analysis of
Underwater Magnetic SIMAN Systems for Port Protection |
538 |
Osvaldo
Faggioni, Maurizio Soldani, Davide Leoncini, Amleto Gabellone and
Paolo V. Maggiani
|
|
|
|
The Pushdown Attack and Attacking the
Substitution Cipher Chaining mode (SCC) |
546 |
Mohamed
Abo El-Fotouh and Klaus Diepold
| |
Usability Evaluation of Identity
Management Schemes in Three Virtual Organization Architectures
|
560 |
Ali E.
Abdallah, Ali N. Haidar
|
|
|
|
|
|
|
|
Loss of Self-Similarity Detection Using
Exact and Asymptotic Self-Similarity Models |
571 |
Mohd
Fo’ad Rohani, Mohd Aizaini Maarof, Ali Selamat and Houssain Kettani
|
|
|
|
|
|
|
|
FlexiSec: A Configurable Link Layer
Security Architecture for Wireless Sensor Networks |
582 |
Devesh
Jinwala, Dhiren Patel and Kankar Dasgupta
|
|
|
|
|
|
Statistical anomaly detection on real
e-mail traffic
|
604 |
Maurizio Aiello, Davide Chiarella and Gianluca Papaleo
|
|
|
|
Protecting
Digital Copyright in the Internet
|
612 |
Franco Frattolillo and
Federica Landolfi |
|
|
|
|
|
A
JPEG-Compliant Method for Image Authentication and Recovery |
622 |
Chiang-Lung Liu
|
|
|
|
|
|
A model with applications for data
survivability in Critical Infrastructures
|
629 |
MicheleAlbano,
StefanoChessa and Roberto Di Pietro
|
|
|
|
|
|
|
|
Automatic Verification of Firewall Configurations with
respect to Security Policy Requirements
|
640 |
Soutaro
Matsumoto and Adel Bouhoula
|
|
|
|
|
|
|
|
| |
|
|