ARES B

79 papers

YearTitle / Authors
2014A Comparative Study of Control Charts for Zero-Inflated Binomial Processes.
Athanasios C. Rakitzis, Petros E. Maravelakis, Philippe Castagliola
2014A Formal Model and Analysis of the MQ Telemetry Transport Protocol.
Benjamin Aziz
2014A Model-Based Security Toolkit for the Internet of Things.
Ricardo Neisse, Igor Nai Fovino, Gianmarco Baldini, Vera Stavroulaki, Panagiotis Vlacheas, Raffaele Giaffreda
2014A New Access Control Scheme for Facebook-Style Social Networks.
Jun Pang, Yang Zhang
2014A Proposal for a Unified Identity Card for Use in an Academic Federation Environment.
Felipe Coral Sasso, Ricardo Alexandre Reinaldo De Moraes, Jean Everson Martina
2014A Relative Cost-Benefit Approach for Evaluating Alternative Airport Security Policies.
Woohyun Shim, Fabio Massacci, Alessandra Tedeschi, Alessandro Pollini
2014A Resource-Optimized Approach to Efficient Early Detection of Mobile Malware.
Jelena Milosevic, Andreas Dittrich, Alberto Ferrante, Miroslaw Malek
2014A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure.
Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen
2014A Trust Management Based Security Mechanism against Collusion Attacks in a MANET Environment.
Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi
2014A Usable Android Application Implementing Distributed Cryptography for Election Authorities.
Stephan Neumann, Oksana Kulyk, Melanie Volkamer
2014A k-anonymity method based on search engine query statistics for disaster impact statements.
Hidenobu Oguri, Noboru Sonehara
2014AES-SEC: Improving Software Obfuscation through Hardware-Assistance.
Sebastian Schrittwieser, Stefan Katzenbeisser, Georg Merzdovnik, Peter Kieseberg, Edgar R. Weippl
2014An Efficient Intrinsic Authorship Verification Scheme Based on Ensemble Learning.
Oren Halvani, Martin Steinebach
2014An Enhanced Linkable Anonymous Access Protocol of the Distributed Electronic Patient Records.
Rima Addas, Ning Zhang
2014An Improved Role-Based Access to Android Applications with JCHR.
Stefano Bistarelli, Gianpiero Costantino, Fabio Martinelli, Francesco Santini
2014Analysis of Algorithms for Computation of Direct Partial Logic Derivatives in Multiple-Valued Decision Diagrams.
Jozef Kostolny, Miroslav Kvassay, Elena N. Zaitseva
2014BitTorrent Sync: Network Investigation Methodology.
Mark Scanlon, Jason Farina, M. Tahar Kechadi
2014Building Sustainable Software by Preemptive Architectural Design Using Tactic-Equipped Patterns.
Dae-Kyoo Kim, Jungwoo Ryoo, Suntae Kim
2014Challenges of Composing XACML Policies.
Bernard Stepien, Amy P. Felty, Stan Matwin
2014Complete SIP Message Obfuscation: PrivaSIP over Tor.
Georgios Karopoulos, Alexandros Fakis, Georgios Kambourakis
2014Concurrent Queries in Location Based Services.
Emad Elabd, Mohand-Said Hacid
2014Continuous and Non-intrusive Reauthentication of Web Sessions Based on Mouse Dynamics.
Eric Medvet, Alberto Bartoli, Francesca Boem, Fabiano Tarlao
2014Defining Malicious Behavior.
Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato
2014Design-In Security for Air Traffic Control.
Martin Hawley, Karol Gotz, John Hird, Chris Machin
2014Divide-and-Conquer: Why Android Malware Cannot Be Stopped.
Dominik Christian Maier, Tilo Müller, Mykola Protsenko
2014DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android.
Siegfried Rasthofer, Steven Arzt, Enrico Lovat, Eric Bodden
2014EM Leakage of RFID Devices - Comparison of Two Measurement Approaches.
Thomas Korak, Thomas Plos
2014EMFASE - An Empirical Framework for Security Design and Economic Trade-off.
Fabio Massacci, Federica Paci, Bjørnar Solhaug, Alessandra Tedeschi
2014Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisation.
Haruno Kataoka, Yohei Ogawa, Isao Echizen, Tetsuji Kuboyama, Hiroshi Yoshiura
2014Efficient Cropping-Resistant Robust Image Hashing.
Martin Steinebach, Huajian Liu, York Yannikos
2014EmailCloak: A Practical and Flexible Approach to Improve Email Privacy.
Italo Dacosta, Andreas Put, Bart De Decker
2014Enhanced Configuration Generation Approach for Highly Available COTS Based Systems.
Parsa Pourali, Ferhat Khendek, Maria Toeroe
2014Evaluating the Effectiveness of ISO 27001: 2013 Based on Annex A.
Bahareh Shojaie, Hannes Federrath, Iman Saberi
2014Fast Monte Carlo Simulation Methods Adapted to Simple Petri Net Models.
Maïder Estecahandy, Stéphane Collas, Laurent Bordes, Christian Paroissin
2014Fighting Botnets with Cyber-Security Analytics: Dealing with Heterogeneous Cyber-Security Information in New Generation SIEMs.
Beatriz Gallego-Nicasio Crespo, Alan Garwood
2014Healthcare Services in the Cloud - Obstacles to Adoption, and a Way Forward.
Karin Bernsmed, Daniela S. Cruzes, Martin Gilje Jaatun, Børge Haugset, Erlend Andreas Gjære
2014Increasing the Resilience and Trustworthiness of OpenID Identity Providers for Future Networks and Services.
Diego Kreutz, Eduardo Feitosa, Hugo Cunha, Heiko Niedermayer, Holger Kinkelin
2014Learn to SWIM.
Matias Krempel, Martin Gilje Jaatun
2014LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow Analysis.
Sanjay Rawat, Laurent Mounier, Marie-Laure Potet
2014Lobotomy: An Architecture for JIT Spraying Mitigation.
Martin Jauernig, Matthias Neugschwandtner, Christian Platzer, Paolo Milani Comparetti
2014Mathematical Modelling in Air Traffic Management Security.
Denis Kolev, Evgeniy Morozov
2014Monte-Carlo Based Reliability Modelling of a Gas Network Using Graph Theory Approach.
Pavel Praks, Vytis Kopustinskas
2014Network Security Analysis Using Behavior History Graph.
Mirko Sailio, Matti Mantere, Sami Noponen
2014Network Security Monitoring in a Small-Scale Smart-Grid Laboratory.
Matti Mantere, Sami Noponen, Pia Olli, Jarno Salonen
2014Ninth International Conference on Availability, Reliability and Security, ARES 2014, Fribourg, Switzerland, September 8-12, 2014
2014No Smurfs: Revealing Fraud Chains in Mobile Money Transfers.
Maria Zhdanova, Jürgen Repp, Roland Rieke, Chrystel Gaber, Baptiste Hemery
2014On Availability Comparison of Reservation Modes for Multi-state Air Conditioning Systems Using Markov Approach.
Lev Khvatskin, Ilia Frenkel
2014On Sensitivity of Reliability Models to the Shape of Life and Repair Time Distributions.
Vladimir Rykov, Dmitry Efrosinin, Vladimir M. Vishnevskiy
2014Optimizing the Availability and the Operational Cost of a Periodically Inspected Multi-state Deteriorating System with Condition Based Maintenance Policies.
Sonia Malefaki, Vasilis P. Koutras, Agapios N. Platis
2014Organizing On-Site Volunteers: An App-Based Approach.
Stefan Sackmann, Marlen Hofmann, Hans Betke
2014Palpable Privacy through Declarative Information Flows Tracking for Smart Buildings.
François Lesueur, Sabina Surdu, Romuald Thion, Yann Gripay, Meriam Ben-Ghorbel-Talbi
2014Performance Determination for MSS Manufacturing System by Lz-Transform and Stochastic Processes Approach.
Ilia Frenkel, Svetlana Daichman, Lev Khvatskin, Neta Avraham, Oshrit Zihry, Anatoly Lisnianski
2014Performance Measures of Behavior-Based Signatures: An Anti-malware Solution for Platforms with Limited Computing Resource.
Kelly Hughes, Yanzhen Qu
2014PhiGARo: Automatic Phishing Detection and Incident Response Framework.
Martin Husák, Jakub Cegan
2014Phishdentity: Leverage Website Favicon to Offset Polymorphic Phishing Website.
Jeffrey Choo Soon Fatt, Kang-Leng Chiew, San-Nah Sze
2014Practical Applications of Advanced Statistical Models in Reliability Data Analysis.
Vasiliy V. Krivtsov, Olexandr Yevkin
2014Practical Attack on Bilinear Pairings to Disclose the Secrets of Embedded Devices.
Thomas Unterluggauer, Erich Wenger
2014Privacy Dashboards: Reconciling Data-Driven Business Models and Privacy.
Christian Zimmermann, Rafael Accorsi, Günter Müller
2014Privacy Preservation in Location-Based Mobile Applications: Research Directions.
Asma Patel, Esther Palomar
2014Qualified Electronic Signature via SIM Card Using JavaCard 3 Connected Edition Platform.
Jakub Breier, Adam Pomothy
2014Quality Matters: Systematizing Quality Deficiencies in the Documentation of Business Security Requirements.
Christian Sillaber, Ruth Breu
2014Real-Time Screen Watermarking Using Overlaying Layer.
Maciej Piec, Andreas Rauber
2014Rethread: A Low-Cost Transient Fault Recovery Scheme for Multithreaded Processors.
Jian Fu, Qiang Yang, Raphael Poss, Chris R. Jesshope, Chunyuan Zhang
2014Risk-Aware Design and Management of Resilient Networks.
Piotr Cholda
2014Security Situation Management: Towards Developing a Time-Critical Decision Making Capability for SESAR.
Rainer Koelle
2014Semi-Markov Modelling for Multi-state Systems.
Vlad Stefan Barbu, Alex Karagrigoriou, Andreas Makrides
2014Statistical Inference for Heavy-Tailed Distributions in Technical Systems.
Alex Karagrigoriou, Ilia Vonta
2014Stochastic Model for Medical Image Segmentation.
Zeev Barzily, Mingyue Ding, Zeev Volkovich
2014Supporting Security Automation for Multi-chassis Link Aggregation Groups via the Interconnected-Asset Ontology.
Henk Birkholz, Ingo Sieverdingbeck
2014The SMM Rootkit Revisited: Fun with USB.
Joshua Schiffman, David Kaplan
2014The Social Acceptance of the Passivation of Misused Aircraft.
Ana P. G. Martins
2014Towards a Hardware Trojan Detection Cycle.
Adrian Dabrowski, Heidelinde Hobel, Johanna Ullrich, Katharina Krombholz, Edgar R. Weippl
2014Using Assurance Cases to Develop Iteratively Security Features Using Scrum.
Lotfi Ben Othmane, Pelin Angin, Bharat K. Bhargava
2014Verifying Implementation of Security Design Patterns Using a Test Template.
Masatoshi Yoshizawa, Takanori Kobashi, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
2014Visualization of Recovery Situation in Disaster Area by Using Web Reservation Data.
Yu Ichifuji, Noboru Sonehara
2014Visualization of Security Metrics for Cyber Situation Awareness.
Igor V. Kotenko, Evgenia Novikova
2014Visualizing Transaction Context in Trust and Reputation Systems.
Johannes Sänger, Günther Pernul
2014Vulnerability-Based Security Pattern Categorization in Search of Missing Patterns.
Priya Anand, Jungwoo Ryoo, Rick Kazman
2014What Does the Fox Say? On the Security Architecture of Firefox OS.
Marta Piekarska, Bhargava Shastry, Ravishankar Borgaonkar