ARES B

110 papers

YearTitle / Authors
20132013 International Conference on Availability, Reliability and Security, ARES 2013, Regensburg, Germany, September 2-6, 2013
2013A Bootstrapping Approach for Developing a Cyber-security Ontology Using Textbook Index Terms.
Arwa M. Wali, Soon Ae Chun, James Geller
2013A Classifier of Malicious Android Applications.
Gerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio
2013A Comprehensive Literature Review of File Carving.
Rainer Poisel, Simon Tjoa
2013A Generation Method of Cryptographic Keys for Enterprise Communication Systems.
Aleksandar Hudic, Elise Revell, Dimitris E. Simos
2013A Genetic Algorithm Approach for the Most Likely Attack Path Problem.
Mohammed A. Alhomidi, Martin J. Reed
2013A Grammatical Inference Approach to Language-Based Anomaly Detection in XML.
Harald Lampesberger
2013A Novel Proximity Based Trust Model for Opportunistic Networks.
Mai H. El-Sherief, Marianne A. Azer
2013A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications.
Yehia Elrakaiby, Yves Le Traon
2013A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP.
Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Angelos D. Keromytis
2013A Problem-Based Threat Analysis in Compliance with Common Criteria.
Kristian Beckers, Denis Hatebur, Maritta Heisel
2013A Reference Model of Information Assurance & Security.
Yulia Cherdantseva, Jeremy Hilton
2013A Reputation-Based Clustering Mechanism for MANET Routing Security.
Aida Ben Chehida, Ryma Abassi, Sihem Guemara El Fatmi
2013A Scalable SIEM Correlation Engine and Its Application to the Olympic Games IT Infrastructure.
Valerio Vianello, Vincenzo Gulisano, Ricardo Jiménez-Peris, Marta Patiño-Martínez, Rubén Torres, Rodrigo Diaz, Elsa Prieto
2013A Statistical Approach for Fingerprinting Probing Activities.
Elias Bou-Harb, Mourad Debbabi, Chadi Assi
2013A Usability Evaluation of the NESSoS Common Body of Knowledge.
Kristian Beckers, Maritta Heisel
2013ANANAS - A Framework for Analyzing Android Applications.
Thomas Eder, Michael Rodler, Dieter Vymazal, Markus Zeilinger
2013ARGUS 3D: Security Enhancements through Innovative Radar Technologies.
Roberta Cardinali, Enrico Anniballi, Carlo Bongioanni, Antonio Macera, Fabiola Colone, Pierfrancesco Lombardo
2013ARMORED: CPU-Bound Encryption for Android-Driven ARM Devices.
Johannes Götzfried, Tilo Müller
2013Addressing Security Issues of Electronic Health Record Systems through Enhanced SIEM Technology.
Cesario Di Sarno, Valerio Formicola, Mario Sicuranza, Giovanni Paragliola
2013An Analysis and Evaluation of Security Aspects in the Business Process Model and Notation.
Maria Leitner, Michelle Miller, Stefanie Rinderle-Ma
2013An Approach Based on Model-Driven Engineering to Define Security Policies Using OrBAC.
Denisse Muñante, Laurent Gallon, Philippe Aniorté
2013An Ontology for Malware Analysis.
David A. Mundie, David M. McIntire
2013Anonymizing Face Images by Using Similarity-Based Metric.
Tomoya Muraki, Shintaro Oishi, Masatsugu Ichino, Isao Echizen, Hiroshi Yoshiura
2013Applying the SecRAM Methodology in a CLOUD-Based ATM Environment.
Antonio Marotta, Gabriella Carrozza, Luigi Battaglia, Patrizia Montefusco, Vittorio Manetti
2013Artificial Aging of Mobile Devices Using a Simulated GSM/GPRS Network.
Rolf Stobe, Hans Höfken, Marko Schuba, Michael Breuer
2013Assessing Water Cooling System Performance: Lz-Transform Method.
Ilia Frenkel, Lev Khvatskin, Svetlana Daichman, Anatoly Lisnianski
2013Automated Synthesis and Ranking of Secure BPMN Orchestrators.
Vincenzo Ciancia, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, José Antonio Martín, Ernesto Pimentel
2013Beyond Traceability: Compared Approaches to Consistent Security Risk Assessments.
Franco Bergomi, Stéphane Paul, Bjørnar Solhaug, Raphaël Vignon-Davillier
2013Collaborative Security Management: Developing Ideas in Security Management for Air Traffic Control.
Martin Hawley, Paul Howard, Rainer Koelle, Peter Saxton
2013Collaboratively Exchanging Warning Messages between Peers While under Attack.
Mirko Haustein, Herbert Sighart, Dennis Titze, Peter Schoo
2013Conflict Management in Obligation with Deadline Policies.
Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam
2013Counteract DNS Attacks on SIP Proxies Using Bloom Filters.
Ge Zhang, Simone Fischer-Hübner
2013Cuteforce Analyzer: A Distributed Bruteforce Attack on PDF Encryption with GPUs and FPGAs.
Bianca Danczul, Jürgen Fuß, Stefan Gradinger, Bernhard Greslehner, Wolfgang Kastl, Florian Wex
2013DNSSEC: Interoperability Challenges and Transition Mechanisms.
Amir Herzberg, Haya Schulmann
2013Detecting Insider Threats: A Trust-Aware Framework.
Federica Paci, M. Carmen Fernández Gago, Francisco Moyano
2013Detection of Hidden Fraudulent URLs within Trusted Sites Using Lexical Features.
Enrico Sorio, Alberto Bartoli, Eric Medvet
2013Dynamic Certification of Cloud Services.
Iryna Windhorst, Ali Sunyaev
2013Enhancing CHASSIS: A Method for Combining Safety and Security.
Christian Raspotnig, Vikash Katta, Péter Kárpáti, Andreas L. Opdahl
2013Enhancing Security Testing via Automated Replication of IT-Asset Topologies.
Henk Birkholz, Ingo Sieverdingbeck, Nicolai Kuntze, Carsten Rudolph
2013Estimating Software Vulnerabilities: A Case Study Based on the Misclassification of Bugs in MySQL Server.
Jason L. Wright, Jason W. Larsen, Miles McQueen
2013Estimating the Value of Personal Information with SNS Utility.
Memiko Otsuki, Noboru Sonehara
2013Evaluation of Airport Security Training Programs: Perspectives and Issues.
Woohyun Shim, Fabio Massacci, Martina de Gramatica, Alessandra Tedeschi, Alessandro Pollini
2013Experiences and Challenges in Enhancing Security Information and Event Management Capability Using Unsupervised Anomaly Detection.
Stefan Asanger, Andrew Hutchison
2013FASTDD: An Open Source Forensic Imaging Tool.
Paolo Bertasi, Nicola Zago
2013Federated Identity Management and Usage Control - Obstacles to Industry Adoption.
Jostein Jensen, Åsmund Ahlmann Nyre
2013Fraud Detection in Mobile Payments Utilizing Process Behavior Analysis.
Roland Rieke, Maria Zhdanova, Jürgen Repp, Romain Giot, Chrystel Gaber
2013GVScan: Scanning Networks for Global Vulnerabilities.
Fabrizio Baiardi, Fabio Corò, Federico Tonelli, Luca Guidi
2013Genetic Algorithm and Data Mining Techniques for Design Selection in Databases.
Christos Koukouvinos, Christina Parpoula, Dimitris E. Simos
2013Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels.
Jean-François Lalande, Steffen Wendzel
2013High Availability for IPsec VPN Platforms: ClusterIP Evaluation.
Daniel Palomares, Daniel Migault, Wolfgang Velasquez, Maryline Laurent
2013ICHIGAN Security - A Security Architecture That Enables Situation-Based Policy Switching.
Hiroshi Maruyama, Kiyoshi Watanabe, Sachiko Yoshihama, Naohiko Uramoto, Yoichiro Takehora, Kazuhiro Minami
2013IT Service Continuity: Achieving Embeddedness through Planning.
Marko Niemimaa, Jonna Järveläinen
2013Isolation of Malicious External Inputs in a Security Focused Adaptive Execution Environment.
Aaron Paulos, Partha P. Pal, Richard E. Schantz, Brett Benyo, David Johnson, Mike Hibler, Eric Eide
2013Laribus: Privacy-Preserving Detection of Fake SSL Certificates with a Social P2P Notary Network.
Andrea Micheloni, Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath
2013Limiting MitM to MitE Covert-Channels.
Amir Herzberg, Haya Schulmann
2013Measuring Anonymity with Plausibilistic Entropy.
I. Goriac
2013Minimizing the Costs of Side-Channel Analysis Resistance Evaluations in Early Design Steps.
Thomas Korak, Thomas Plos, Andreas Zankl
2013Model-Assisted Access Control Implementation for Code-centric Ruby-on-Rails Web Application Development.
Seiji Munetoh, Nobukazu Yoshioka
2013Model-Based Generation of Synthetic Disk Images for Digital Forensic Tool Testing.
York Yannikos, Christian Winter
2013Modelling and Analysis of Release Order of Security Algorithms Using Stochastic Petri Nets.
Suliman A. Alsuhibany, Aad P. A. van Moorsel
2013On Secure Multi-party Computation in Bandwidth-Limited Smart-Meter Systems.
Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt
2013On Selecting Critical Security Controls.
Jakub Breier, Ladislav Hudec
2013On the Practicability of Cold Boot Attacks.
Michael Gruhn, Tilo Müller
2013Organizational Security Architecture for Critical Infrastructure.
Jonathan Blangenois, Guy Guemkam, Christophe Feltus, Djamel Khadraoui
2013Overview of Recent Advances in CCTV Processing Chain in the INDECT and INSIGMA Projects.
Andrzej Dziech, Jaroslaw Bialas, Andrzej Glowacz, Pawel Korus, Mikolaj Leszczuk, Andrzej Matiolanski, Remigiusz Baran
2013Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
Jurlind Budurushi, Stephan Neumann, Maina M. Olembo, Melanie Volkamer
2013Privacy Panel: Usable and Quantifiable Mobile Privacy.
Debmalya Biswas, Imad Aad, Gian Paolo Perrucci
2013Privacy-Preserving Publishing of Pseudonym-Based Trajectory Location Data Set.
Ken Mano, Kazuhiro Minami, Hiroshi Maruyama
2013Probabilistic Contract Compliance for Mobile Applications.
Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra
2013PyTrigger: A System to Trigger & Extract User-Activated Malware Behavior.
Dan Fleck, Arnur G. Tokhtabayev, Alex Alarif, Angelos Stavrou, Tomas Nykodym
2013Reconsidering Intrusion Monitoring Requirements in Shared Cloud Platforms.
Kahina Lazri, Sylvie Laniepce, Jalel Ben-Othman
2013Reliability Prediction for Component-Based Software Systems with Architectural-Level Fault Tolerance Mechanisms.
Thanh-Trung Pham, Xavier Défago
2013Reputation-Controlled Business Process Workflows.
Benjamin Aziz, Geoff W. Hamilton
2013Requirements Management in a Combined Process for Safety and Security Assessments.
Vikash Katta, Christian Raspotnig, Péter Kárpáti, Tor Stålhane
2013Resource Pool Oriented Trust Management for Cloud Infrastructure.
Gansen Zhao, Haiyu Wang, Chunming Rong, Yong Tang
2013Revisiting Circuit Clogging Attacks on Tor.
Eric Chan-Tin, Jiyoung Shin, Jiangmin Yu
2013Run-Time Risk Management in Adaptive ICT Systems.
Mike Surridge, Bassem I. Nasser, Xiaoyu Chen, Ajay Chakravarthy, Panos Melas
2013SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting.
Thomas Unger, Martin Mulazzani, Dominik Fruhwirt, Markus Huber, Sebastian Schrittwieser, Edgar R. Weippl
2013Scope of Security Properties of Sanitizable Signatures Revisited.
Hermann de Meer, Henrich Christopher Pöhls, Joachim Posegga, Kai Samelin
2013Secure Engineering and Modelling of a Metering Devices System.
José Fran. Ruiz, Marcos Arjona, Antonio Mana, Niklas Carstens
2013Secure Profile Provisioning Architecture for Embedded UICC.
Jaemin Park, Kiyoung Baek, Cheoloh Kang
2013Security Blind Spots in the ATM Safety Culture.
Howard Chivers, John Hird
2013Shared Crowds: A Token-Ring Approach to Hide the Receiver.
Raphael Wigoutschnigg, Peter Schartner, Stefan Rass
2013Sink or SWIM: Information Security Requirements in the Sky.
Martin Gilje Jaatun, Tor Erlend Fægri
2013Social Issues of Big Data and Cloud: Privacy, Confidentiality, and Public Utility.
Koichiro Hayashi
2013Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution.
Hongzhe Li, Taebeom Kim, Munkhbayar Bat-Erdene, Heejo Lee
2013Some General Properties of Multi-state Physical Models.
Paolo Rocchi, Gurami Tsitsiashvili
2013Statistical Inference for Multi-state Systems: The Weibull Case.
Andreas Makrides, Alex Karagrigoriou
2013Structured Pattern-Based Security Requirements Elicitation for Clouds.
Kristian Beckers, Maritta Heisel, Isabelle Côté, Ludger Goeke, Selim Güler
2013TRESCCA - Trustworthy Embedded Systems for Secure Cloud Computing.
Gunnar Schomaker, Andreas Herrholz, Guillaume Duc, Renaud Pacalet, Salvatore Raho, Miltos D. Grammatikakis, Marcello Coppola, Ignacio Garcia Vega
2013Taxonomy for Port Security Systems.
Tove Gustavi, Pontus Svenson
2013Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User Control.
Christian Richthammer, Michael Netter, Moritz Riesner, Günther Pernul
2013The Big Four - What We Did Wrong in Advanced Persistent Threat Detection?
Nikos Virvilis, Dimitris Gritzalis
2013The Common Limes Security Model for Asset Flow Control in Decentralized, Insecure Systems.
Eckehard Hermann, Rüdiger Grimm
2013The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems.
Igor V. Kotenko, Olga Polubelova, Igor Saenko, Elena Doynikova
2013The Scourge of Internet Personal Data Collection.
Esma Aïmeur, Manuel Lafond
2013The Transitivity-of-Trust Problem in Android Application Interaction.
Steffen Bartsch, Bernhard J. Berger, Michaela Bunke, Karsten Sohr
2013The Trusted Attribute Aggregation Service (TAAS) - Providing an Attribute Aggregation Layer for Federated Identity Management.
David W. Chadwick, George Inman
2013The Use and Usefulness of Threats in Goal-Oriented Modelling.
Per Håkon Meland, Erlend Andreas Gjære, Stéphane Paul
2013Towards Harmonising the Legislative, Regulatory, and Standards-Based Framework for ATM Security: Developing a Software Support Tool.
Rainer Koelle, Walter Strijland, Stefan Roels
2013Towards Web-Based Biometric Systems Using Personal Browsing Interests.
Lukasz Olejnik, Claude Castelluccia
2013Towards a Risk Based Assessment of QoS Degradation for Critical Infrastructure.
Moussa Ouedraogo, Manel Khodja, Djamel Khadraoui
2013Towards an Ontology for Cloud Security Obligations.
Karin Bernsmed, Astrid Undheim, Per Håkon Meland, Martin Gilje Jaatun
2013Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures.
Zeeshan Bilal, Keith Martin
2013Universal Peer-to-Peer Network Investigation Framework.
Mark Scanlon, M. Tahar Kechadi
2013User Interface Harmonization for IT Security Management: User-Centered Design in the PoSecCo Project.
Beatriz Gallego-Nicasio Crespo
2013Using Twitter's Mentions for Efficient Emergency Message Propagation.
Kelly Y. Itakura, Noboru Sonehara
2013Validating Security Design Patterns Application Using Model Testing.
Takanori Kobashi, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Yoshiaki Fukazawa
2013iOS Forensics: How Can We Recover Deleted Image Files with Timestamp in a Forensically Sound Manner?
Aswami Ariffin, Christian D'Orazio, Kim-Kwang Raymond Choo, Jill Slay