ARES B

109 papers

YearTitle / Authors
20102-clickAuth.
Anna Vapen, David Byers, Nahid Shahmehri
2010A Complexity Based Model for Quantifying Forensic Evidential Probabilities.
Richard E. Overill, Jantje A. M. Silomon, Kam-Pui Chow
2010A Computer Architecture with Hardwarebased Malware Detection.
Klaus Hildebrandt, Igor Podebrad, Bernd Klauer
2010A Consideration of the Reliability of Registration and Attribute Exchange.
Yoshio Kakizaki, Keiichi Iwamura
2010A Continuous Authentication System Based on User Behavior Analysis.
Ines Brosso, Alessandro La Neve, Graça Bressan, Wilson Vicente Ruggiero
2010A Design Pattern for Event-Based Processing of Security-Enriched SOAP Messages.
Nils Gruschka, Meiko Jensen, Luigi Lo Iacono
2010A Formal Approach Towards Risk-Aware Service Level Analysis and Planning.
Stefan Jakoubi, Simon Tjoa, Sigrun Goluch, Gerhard Kitzler
2010A Framework to Guide the Implementation of Proactive Digital Forensics in Organisations.
Talania Grobler, C. P. Louwrens, Sebastiaan H. von Solms
2010A Function Oriented Methodology to Validate and Verify Forensic Copy Function of Digital Forensic Tools.
Yinghua Guo, Jill Slay
2010A Generic Metamodel for IT Security.
André Miede, Nedislav Nedyalkov, Christian Gottron, André König, Nicolas Repp, Ralf Steinmetz
2010A Model for Computer Profiling.
Andrew Marrington, George M. Mohay, Hasmukh Morarji, Andrew J. Clark
2010A Multi-component View of Digital Forensics.
Talania Grobler, C. P. Louwrens, Sebastiaan H. von Solms
2010A Multi-stage Methodology for Ensuring Appropriate Security Culture and Governance.
Solange Ghernaouti-Helie, Igli Tashi, David Simms
2010A National Strategy for an Effective Cybersecurity Approach and Culture.
Solange Ghernaouti-Helie
2010A New DRM Architecture with Strong Enforcement.
Sascha Müller, Stefan Katzenbeisser
2010A Novel Image Hiding Scheme Using Content Aware Seam Carving Method.
Zahra Toony, Mansour Jamzad
2010A Probabilistic Approach for On-Line Sum-Auditing.
Gerardo Canfora, Bice Cavallo
2010A Prototype for Support of Computer Forensic Analysis Combined with the Expected Knowledge Level of an Attacker to More Efficiently Achieve Investigation Results.
Maximilian Bielecki, Gerald Quirchmayr
2010A Secure and Scalable Grid-Based Content Management System.
Benjamin Aziz, Alvaro Arenas, Giovanni Cortese, Bruno Crispo, Silvio Causetti
2010A Security Decision-Reaction Architecture for Heterogeneous Distributed Network.
Christophe Feltus, Djamel Khadraoui, Jocelyn Aubert
2010A Semantic Security Architecture for Web Services.
Stefan Durbeck, Christoph Fritsch, Günther Pernul, Rolf Schillinger
2010A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems.
Alex Hai Wang, Su Yan, Peng Liu
2010A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
Lucie Langer, Axel Schmidt, Johannes Buchmann, Melanie Volkamer
2010ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland
2010Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss.
Gregory Epiphaniou, Carsten Maple, Paul Sant, Matthew Reeve
2010An Adaptive Redundancy Oriented Method to Tolerate Soft Errors in SRAM-Based FPGAs Using Unused Resources.
Somayeh Bahramnejad, Hamid R. Zarandi
2010An Analysis of Information Security Awareness within Home and Work Environments.
Shuhaili Talib, Nathan L. Clarke, Steven Furnell
2010An Improvement of Robustness Against Physical Attacks and Equipment Independence in Information Hiding Based on the Artificial Fiber Pattern.
Kitahiro Kaneda, Yuki Fujii, Keiichi Iwamura, Seiichiro Hangai
2010Analysing and Visualising Security and Usability in IRIS.
Shamal Faily, Ivan Flechais
2010Analysis of Transient Faults on a MIPS-Based Dual-Core Processor.
Iman Faraji, Moslem Didehban, Hamid R. Zarandi
2010Analytical Approach to Attack Graph Analysis for Network Security.
Phongphun Kijsanayothin, Rattikorn Hewett
2010Application and Economic Implications of an Automated Requirement-Oriented and Standard-Based Compliance Monitoring and Reporting Prototype.
Matthias Kehlenbeck, Thorben Sandner, Michael H. Breitner
2010Architecture-Aware Adaptive Deployment of Contextual Security Policies.
Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Laurent Toutain
2010Binomial-Mix-Based Location Anonymizer System with Global Dummy Generation to Preserve User Location Privacy in Location-Based Services.
Minh-Triet Tran, Isao Echizen, Anh Duc Duong
2010Blind Steganalysis: A Countermeasure for Binary Image Steganography.
Chiew Kang Leng, Josef Pieprzyk
2010Challenging IS and ISM Standardization for Business Benefits.
Juhani Anttila, Jorma Kajava
2010Choosing Authentication Techniques in E-procurement System in Serbia.
Milos Milovanovic, Marija Bogicevic, Miroslav Lazovic, Dejan B. Simic, Dusan Starcevic
2010Classification of Buffer Overflow Vulnerability Monitors.
Hossain Shahriar, Mohammad Zulkernine
2010Combining Misuse Cases with Attack Trees and Security Activity Models.
Inger Anne Tøndel, Jostein Jensen, Lillian Røstad
2010Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks.
Tanveer A. Zia, Md Zahidul Islam
2010Configuration Fuzzing for Software Vulnerability Detection.
Huning Dai, Christian Murphy, Gail E. Kaiser
2010Detection of Spyware by Mining Executable Files.
Raja Khurram Shahzad, Syed Imran Haider, Niklas Lavesson
2010Development of ICT Infrastructure for Local Socio-Economic System in Japan.
Hiroshi Nagano
2010Dual-Level Attack Detection and Characterization for Networks under DDoS.
Anjali Sardana, Ramesh Chandra Joshi
2010Enhanced Chaotic Stream Cipher for WSNs.
Rui Miguel Soares Silva, Rui Gustavo Nunes Pereira Crespo, Mário Serafim dos Santos Nunes
2010Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography.
Chiew Kang Leng, Josef Pieprzyk
2010Experimental Results on Cheon's Algorithm.
Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda
2010Extending the Gordon and Loeb Model for Information Security Investment.
Jan Willemson
2010External Insider Threat: A Real Security Challenge in Enterprise Value Webs.
Virginia N. L. Franqueira, André van Cleeff, Pascal van Eck, Roel J. Wieringa
2010FaT2D: Fault Tolerant Directed Diffusion for Wireless Sensor Networks.
Fatima-Zohra Benhamida, Yacine Challal
2010FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management.
Thorsten Höllrigl, Jochen Dinger, Hannes Hartenstein
2010Fighting Phishing with Trusted Email.
Jordan Crain, Lukasz Opyrchal, Atul Prakash
2010Formal Specification and Analysis of an E-voting System.
Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita
2010Formalization of Viruses and Malware Through Process Algebras.
Grégoire Jacob, Eric Filiol, Hervé Debar
2010From Contextual Permission to Dynamic Pre-obligation: An Integrated Approach.
Yehia Elrakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia
2010Heuristics for Detecting Botnet Coordinated Attacks.
Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, Masashi Fujiwara
2010Identifying Security Relevant Warnings from Static Code Analysis Tools through Code Tainting.
Dejan Baca
2010Improving Effectiveness of Intrusion Detection by Correlation Feature Selection.
Hai Nguyen, Katrin Franke, Slobodan Petrovic
2010Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming.
Jorge Blasco Alís, Agustín Orfila, Arturo Ribagorda
2010Information Flow Control Using the Java Virtual Machine Tool Interface (JVMTI).
Jason Howarth, Irfan Altas, Barney Dalgarno
2010Information Flow in Disaster Management Systems.
Achim D. Brucker, Dieter Hutter
2010Investigating the Limitations of Java Annotations for Input Validation.
Federico Mancini, Dag Hovland, Khalid A. Mughal
2010Katana: A Hot Patching Framework for ELF Executables.
Ashwin Ramaswamy, Sergey Bratus, Sean W. Smith, Michael E. Locasto
2010LSM-Based Secure System Monitoring Using Kernel Protection Schemes.
Takamasa Isohara, Keisuke Takemori, Yutaka Miyake, Ning Qu, Adrian Perrig
2010Large Scale Demonstration Experiments Towards Acheiving Practical Traceback on the Internet.
Ken Wakasa, Hiroaki Hazeyama, Toshifumi Kai, Akira Hashiguchi, Masaya Yamagata, Masahiko Fujinaga, Ryunosuke Ohshima, Takashi Shintani
2010Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion Detection.
Neminath Hubballi, Santosh Biswas, Sukumar Nandi
2010Log Analysis Towards an Automated Forensic Diagnosis System.
Jorge Herrerías Guerrero, Roberto Gómez Cárdenas
2010Managing the Asset Risk of SMEs.
Luis Enrique Sánchez, Carlos Ruiz, Eduardo Fernández-Medina, Mario Piattini
2010Measuring the Level of Security Introduced by Security Patterns.
Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Michael VanHilst
2010Model-Driven Application-Level Encryption for the Privacy of E-health Data.
Yun Ding, Karsten Klein
2010Model-Driven Security Patterns Application Based on Dependences among Patterns.
Yuki Shiroma, Hironori Washizaki, Yoshiaki Fukazawa, Atsuto Kubo, Nobukazu Yoshioka
2010Multi-dimensional Uncertainty Analysis in Secure and Dependable Domain.
Yudistira Asnar, Paolo Giorgini
2010Multiple Designated Verifiers Signatures Reconsidered.
Mebae Ushida, Tetsuya Izu, Masahiko Takenaka, Kazuo Ohta
2010On the Simulation of a Software Reputation System.
Martin Boldt, Anton Borg, Bengt Carlsson
2010One Size Fits None: The Importance of Detector Parameterization.
Natasha Bodorik, Nur Zincir-Heywood
2010Optimising IDS Sensor Placement.
Hao Chen, John A. Clark, Siraj A. Shaikh, Howard Chivers, Philip Nobles
2010Owner-Based Role-Based Access Control OB-RBAC.
Mohsen Saffarian, Babak Sadighi
2010Patterns for Secure Boot and Secure Storage in Computer Systems.
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
2010Pitfalls in Formal Reasoning about Security Protocols.
Nina Moebius, Kurt Stenzel, Wolfgang Reif
2010Planning Dynamic Activity and Resource Allocations Using a Risk-Aware Business Process Management Approach.
Simon Tjoa, Stefan Jakoubi, Sigrun Goluch, Gerhard Kitzler
2010Practical Experience Gained from Modeling Security Goals: Using SGITs in an Industrial Project.
Christian Jung, Frank Elberzhager, Alessandra Bagnato, Fabio Raiteri
2010Program Obfuscation by Strong Cryptography.
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
2010Quantum Detection of Wavelength Division Multiplexing Optical Coherent Signals in Lossy Channels.
Atsushi Waseda, Masahide Sasaki, Masahiro Takeoka, Mikio Fujiwara, Morio Toyoshima, Hidema Tanaka
2010Recovery of Skype Application Activity Data from Physical Memory.
Matthew Simon, Jill Slay
2010Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats.
Michael Netter, Eduardo B. Fernández, Günther Pernul
2010Rejuvenating High Available Virtualized Systems.
Arash Rezaei, Mohsen Sharifi
2010Reselling Digital Content.
Laila El Aimani, Yona Raekow
2010Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures.
Jocelyn Aubert, Thomas Schaberreiter, Christophe Incoul, Djamel Khadraoui, Benjamin Gâteau
2010Secure Bindings of SAML Assertions to TLS Sessions.
Florian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek
2010Secure Group Communication Using Fractional Public Keys.
Sigurd Eskeland, Vladimir A. Oleshchuk
2010Secure Monitoring of Service Level Agreements.
Kassidy P. Clark, Martijn Warnier, Frances M. T. Brazier, Thomas B. Quillinan
2010Secured Key Distribution Scheme for Cryptographic Key Management System.
Kyawt Kyawt Khaing, Khin Mi Mi Aung
2010Security Modeling and Tool Support Advantages.
Egil Trygve Baadshaug, Gencer Erdogan, Per Håkon Meland
2010Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism.
Ziyad S. Al-Salloum, Stephen D. Wolthusen
2010Security and Usability: Analysis and Evaluation.
Ronald Kainda, Ivan Flechais, A. W. Roscoe
2010Solving the Transitive Access Problem for the Services Oriented Architecture.
Alan H. Karp, Jun Li
2010Strategies for Reducing Risks of Inconsistencies in Access Control Policies.
Bernard Stepien, Stan Matwin, Amy P. Felty
2010Supporting Authorization Policy Modification in Agile Development of Web Applications.
Steffen Bartsch
2010The 'Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation.
Grant Osborne, Benjamin P. Turnbull, Jill Slay
2010The Road to Hell is Paved with Good Intentions: A Story of (In)secure Software Development.
Richard Sasson, Martin Gilje Jaatun, Jostein Jensen
2010Threat- and Risk-Analysis During Early Security Requirements Engineering.
Holger Schmidt
2010Towards a Privacy-Enhanced Social Networking Site.
Esma Aïmeur, Sébastien Gambs, Ai Ho
2010Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop.
Mansoor Ahmed, Amin Anjomshoaa, Muhammad Asfand-e-yar, A Min Tjoa, Abid Khan
2010Trust Based Multi Path DSR Protocol.
Poonam Gera, Kumkum Garg, Manoj Misra
2010Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography.
Byoungcheon Lee
2010Using Normalized Compression Distance for Classifying File Fragments.
Stefan Axelsson
2010Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients.
Guenther Starnberger, Lorenz Froihofer, Karl M. Göschka
2010Visualizing Past Personal Data Disclosures.
Jan Paul Kolter, Michael Netter, Günther Pernul
2010Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms.
A. A. Adekunle, S. R. Woodhead