ARES B

97 papers

YearTitle / Authors
20150-Day Vulnerabilities and Cybercrime.
Jart Armin, Paolo Foti, Marco Cremonini
201510th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, August 24-27, 2015
20152020 Cybercrime Economic Costs: No Measure No Solution.
Jart Armin, Bryn Thompson, Davide Ariu, Giorgio Giacinto, Fabio Roli, Piotr Kijewski
2015A Framework for the Discovery, Analysis, and Retrieval of Multimedia Homemade Explosives Information on the Web.
Theodora Tsikrika, George Kalpakis, Stefanos Vrochidis, Ioannis Kompatsiaris, Iraklis Paraskakis, Isaak Kavasidis, Jonathan Middleton, Una Williamson
2015A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients.
Yi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye, Fenlin Liu
2015A Landmark Calibration Based IP Geolocation Approach.
Jingning Chen, Fenlin Liu, Xiangyang Luo, Fan Zhao, Guang Zhu
2015A Lightweight Framework for Cold Boot Based Forensics on Mobile Devices.
Benjamin Taubmann, Manuel Huber, Sascha Wessel, Lukas Heim, Hans Peter Reiser, Georg Sigl
2015A Model Implementing Certified Reputation and Its Application to TripAdvisor.
Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera
2015A Model for Specification and Validation of a Trust Management Based Security Scheme in a MANET Environment.
Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi
2015A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting.
Dejan Baca, Martin Boldt, Bengt Carlsson, Andreas Jacobsson
2015A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters.
Marc Antoine Gosselin-Lavigne, Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani
2015A Secure Integrated Platform for Rapdily Formed Multiorganisation Collaborations.
John Zic, Nerolie Oakes, Dongxi Liu, Jane Li, Chen Wang, Shiping Chen
2015A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic.
Elias Bou-Harb, Mourad Debbabi, Chadi Assi
2015Accountable Redactable Signatures.
Henrich Christopher Pöhls, Kai Samelin
2015Advanced Attribute-Based Key Management for Mobile Devices in Hybrid Clouds.
Jaemin Park, Eunchan Kim, Sungjin Park, Cheoloh Kang
2015Advanced Identity and Access Policy Management Using Contextual Data.
Matthias Hummer, Michael Kunz, Michael Netter, Ludwig Fuchs, Günther Pernul
2015All-Solution Satisfiability Modulo Theories: Applications, Algorithms and Benchmarks.
Quoc-Sang Phan, Pasquale Malacaria
2015An Active Testing Tool for Security Testing of Distributed Systems.
Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli
2015An Empirical Study of Click Fraud in Mobile Advertising Networks.
Geumhwan Cho, Junsung Cho, Youngbae Song, Hyoungshick Kim
2015An Open Source Code Analyzer and Reviewer (OSCAR) Framework.
Simon Tjoa, Patrick Kochberger, Christoph Malin, Andreas Schmoll
2015AnonCall: Making Anonymous Cellular Phone Calls.
Eric Chan-Tin
2015Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P Networks.
Noora Al Mutawa, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington
2015Challenges of Data Provenance for Cloud Forensic Investigations.
Victoria M. Katilu, Virginia N. L. Franqueira, Olga Angelopoulou
2015Cold Boot Attacks on DDR2 and DDR3 SDRAM.
Simon Lindenlauf, Hans Höfken, Marko Schuba
2015Color Image Stegananalysis Using Correlations between RGB Channels.
Hasan Abdulrahman, Marc Chaumont, Philippe Montesinos, Baptiste Magnier
2015Complexity Estimates of a SHA-1 Near-Collision Attack for GPU and FPGA.
Jürgen Fuß, Stefan Gradinger, Bernhard Greslehner-Nimmervoll, Robert Kolmhofer
2015Composition-Malware: Building Android Malware at Run Time.
Gerardo Canfora, Francesco Mercaldo, Giovanni Moriano, Corrado Aaron Visaggio
2015Comprehensive Approach to Increase Cyber Security and Resilience.
Michal Choras, Rafal Kozik, Maria Pilar Torres Bruna, Artsiom Yautsiukhin, Andrew Churchill, Iwona Maciejewska, Irene Eguinoa, Adel Jomni
2015Concept Detection in Multimedia Web Resources About Home Made Explosives.
George Kalpakis, Theodora Tsikrika, Fotini Markatopoulou, Nikiforos Pittaras, Stefanos Vrochidis, Vasileios Mezaris, Ioannis Patras, Ioannis Kompatsiaris
2015Countermeasures for Covert Channel-Internal Control Protocols.
Jaspreet Kaur, Steffen Wendzel, Michael Meier
2015Cross-Domain Attribute Conversion for Authentication and Authorization.
Stefan Thaler, Jerry den Hartog, Dhouha Ayed, Dieter Sommer, Michael Hitchens
2015Deploying Honeypots and Honeynets: Issue of Privacy.
Pavol Sokol, Martin Husák, Frantiek Liptak
2015Don't Brick Your Car: Firmware Confidentiality and Rollback for Vehicles.
Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes
2015Dynamic Self-Protection and Tamperproofing for Android Apps Using Native Code.
Mykola Protsenko, Sebastien Kreuter, Tilo Müller
2015Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware.
Gerardo Canfora, Andrea De Lorenzo, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio
2015Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen
2015Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks.
Shane S. Clark, Aaron Paulos, Brett Benyo, Partha P. Pal, Richard E. Schantz
2015Enabling Constraints and Dynamic Preventive Access Control Policy Enforcement in the Cloud.
Somchart Fugkeaw, Hiroyuki Sato
2015Error/Intrusion Target Identification on the Physical Layer over a BICM Scheme.
Sihem Châabouni, Amel Meddeb-Makhlouf
2015Evaluation of a Sector-Hash Based Rapid File Detection Method for Monitoring Infrastructure-as-a-Service Cloud Platforms.
Manabu Hirano, Hayate Takase, Koki Yoshida
2015Event Prediction with Community Leaders.
Jun Pang, Yang Zhang
2015Fair Fingerprinting Protocol for Attesting Software Misuses.
Raphael C. S. Machado, Davidson R. Boccardo, Vinícius Gusmão Pereira de Sá, Jayme Luiz Szwarcfiter
2015Generation of Local and Expected Behaviors of a Smart Card Application to Detect Software Anomaly.
Germain Jolly, Baptiste Hemery, Christophe Rosenberger
2015Gradually Improving the Forensic Process.
Sebastian Neuner, Martin Mulazzani, Sebastian Schrittwieser, Edgar R. Weippl
2015Hardware Security Evaluation Using Assurance Case Models.
Henrique Kawakami, Roberto Gallo, Ricardo Dahab, Erick Nascimento
2015How Much Cloud Can You Handle?
Martin Gilje Jaatun, Inger Anne Tøndel
2015Image Watermarking with Biometric Data for Copyright Protection.
Morgan Barbier, Jean-Marie Le Bars, Christophe Rosenberger
2015Impacts of Tourist Accommodations as Temporal Shelter on Evacuee Overflow for the Reassignment of Shelters Jurisdiction.
Yu Ichifuji, Noriaki Koide, Noboru Sonehara
2015Incremental Development of RBAC-Controlled E-Marking System Using the B Method.
Nasser Al-Hadhrami, Benjamin Aziz, Shantanu Sardesai, Lotfi Ben Othmane
2015Independent Security Testing on Agile Software Development: A Case Study in a Software Company.
Jesus Choliz, Julian Vilas, José Moreira
2015Integrating Human Behavior Into the Development of Future Cyberterrorism Scenarios.
Max Kilger
2015Intensifying State Surveillance of Electronic Communications: A Legal Solution in Addressing Extremism or Not?
Murdoch Watney
2015Literature Review of the Challenges of Developing Secure Software Using the Agile Approach.
Hela Oueslati, Mohammad Masudur Rahman, Lotfi Ben Othmane
2015Malicious Insiders with Ties to the Internet Underground Community.
Jason W. Clark, Matt Collins, Jeremy R. Strozer
2015Markov Process Based Retrieval for Encrypted JPEG Images.
Hang Cheng, Xinpeng Zhang, Jiang Yu, Fengyong Li
2015Method Selection and Tailoring for Agile Threat Assessment and Mitigation.
Stephan Renatus, Clemens Teichmann, Jörn Eichler
2015Modeling Fraud Prevention of Online Services Using Incident Response Trees and Value at Risk.
Dan Gorton
2015Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment.
Bertrand Mathieu, Guillaume Doyen, Wissam Mallouli, Thomas Silverston, Olivier Bettan, François-Xavier Aguessy, Thibault Cholez, Abdelkader Lahmadi, Patrick Truong, Edgardo Montes de Oca
2015Network Security Challenges in Android Applications.
Damjan Buhov, Markus Huber, Georg Merzdovnik, Edgar R. Weippl, Vesna Dimitrova
2015Network-Based HTTPS Client Identification Using SSL/TLS Fingerprinting.
Martin Husák, Milan Cermák, Tomás Jirsík, Pavel Celeda
2015Nomad: A Framework for Developing Mission-Critical Cloud-Based Applications.
Mamadou H. Diallo, Michael August, Roger Hallman, Megan Kline, Henry Au, Vic Beach
2015Novel Method of Hiding Information in IP Telephony Using Pitch Approximation.
Artur Janicki
2015On Reconnaissance with IPv6: A Pattern-Based Scanning Approach.
Johanna Ullrich, Peter Kieseberg, Katharina Krombholz, Edgar R. Weippl
2015On the Isofunctionality of Network Access Control Lists.
Malek Belhaouane, Joaquín García-Alfaro, Hervé Debar
2015Optimizing IT Service Costs with Respect to the Availability Service Level Objective.
Sascha Bosse, Matthias Splieth, Klaus Turowski
2015Overview of the Forensic Investigation of Cloud Services.
Jason Farina, Mark Scanlon, Nhien-An Le-Khac, M. Tahar Kechadi
2015PALPAS - PAssword Less PAssword Synchronization.
Moritz Horsch, Andreas Hülsing, Johannes Buchmann
2015PScore: A Framework for Enhancing Privacy Awareness in Online Social Networks.
Georgios Petkos, Symeon Papadopoulos, Yiannis Kompatsiaris
2015Personal Agent for Services in ITS.
Shinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Tatsuhiko Hirabayashi
2015Physically Secure Code and Data Storage in Autonomously Booting Systems.
Johannes Götzfried, Johannes Hampel, Tilo Müller
2015Privacy and Trust in Smart Camera Sensor Networks.
Michael Loughlin, Asma Adnane
2015Publicly Verifiable Private Aggregation of Time-Series Data.
Bence Gabor Bakondi, Andreas Peter, Maarten H. Everts, Pieter H. Hartel, Willem Jonker
2015QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes.
Katharina Krombholz, Peter Frühwirt, Thomas Rieder, Ioannis Kapsalis, Johanna Ullrich, Edgar R. Weippl
2015Risk Assessment of Public Safety and Security Mobile Service.
Matti J. Peltola, Pekka Kekolahti
2015Securing Web Applications with Better "Patches": An Architectural Approach for Systematic Input Validation with Security Patterns.
Jung-Woo Sohn, Jungwoo Ryoo
2015Security Monitoring in the Cloud: An SLA-Based Approach.
Valentina Casola, Alessandra De Benedictis, Massimiliano Rak
2015Security Monitoring of HTTP Traffic Using Extended Flows.
Martin Husák, Petr Velan, Jan Vykopal
2015Steg Blocks: Ensuring Perfect Undetectability of Network Steganography.
Wojciech Fraczek, Krzysztof Szczypiorski
2015Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse Positions.
Hui Tian, Yanpeng Wu, Yongfeng Huang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai
2015Structural Weaknesses in the Open Smart Grid Protocol.
Klaus Kursawe, Christiane Peters
2015TEAR: A Multi-purpose Formal Language Specification for TEsting at Runtime.
Jorge López, Stéphane Maag, Gerardo Morales
2015The Effects of Cultural Dimensions on the Development of an ISMS Based on the ISO 27001.
Bahareh Shojaie, Hannes Federrath, Iman Saberi
2015The Measurement of Data Locations in the Cloud.
Bernd Jäger, Reiner Kraft, Sebastian Luhn, Annika Selzer, Ulrich Waldmann
2015The Role and Security of Firewalls in IaaS Cloud Computing.
Jordan Cropper, Johanna Ullrich, Peter Frühwirt, Edgar R. Weippl
2015Towards Abuse Detection and Prevention in IaaS Cloud Computing.
Jens Lindemann
2015Towards Black Box Testing of Android Apps.
Yury Zhauniarovich, Anton Philippov, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci
2015Towards a CERT-Communication Model as Basis to Software Assurance.
Otto Hellwig, Gerald Quirchmayr, Edith Huber, Timo Mischitz, Markus Huber
2015Towards a Process-Centered Resilience Framework.
Richard M. Zahoransky, Christian Brenig, Thomas G. Koslowski
2015Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive Wiretaps.
Hessel Schut, Mark Scanlon, Jason Farina, Nhien-An Le-Khac
2015Trust Negotiation Based Approach to Enforce MANET Routing Security.
Aida Ben Chehida Douss, Samiha Ayed, Ryma Abassi, Nora Cuppens, Sihem Guemara El Fatmi
2015Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems.
Tariq Fadai, Sebastian Schrittwieser, Peter Kieseberg, Martin Mulazzani
2015Uncovering Use-After-Free Conditions in Compiled Code.
David Dewey, Bradley Reaves, Patrick Traynor
2015Using Facebook for Image Steganography.
Jason Hiney, Tejas Dakve, Krzysztof Szczypiorski, Kris Gaj
2015Video Spatio-Temporal Filtering Based on Cameras and Target Objects Trajectories - Videosurveillance Forensic Framework.
Dana Codreanu, André Péninou, Florence Sèdes
2015Virtual Machine Introspection: Techniques and Applications.
Yacine Hebbal, Sylvie Laniepce, Jean-Marc Menaud
2015Watch What You Wear: Preliminary Forensic Analysis of Smart Watches.
Ibrahim M. Baggili, Jeff Oduro, Kyle Anthony, Frank Breitinger, Glenn McGee
2015Yet Another Cybersecurity Roadmapping Methodology.
Davide Ariu, Luca Didaci, Giorgio Fumera, Enrico Frumento, Federica Freschi, Giorgio Giacinto, Fabio Roli