ARES B

108 papers

YearTitle / Authors
2016'CTRL_S' - A Security Tool for SESAR's Design-In Security Approach.
Karol Gotz, Martin Hawley, Chris Machin, John Hird
201611th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria, August 31 - September 2, 2016
2016A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment.
Saad Alqahtany, Nathan L. Clarke, Steven Furnell, Christoph Reich
2016A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events.
Alexandr Vasenev, Lorena Montoya, Andrea Ceccarelli
2016A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow.
Mehdi Nobakht, Vijay Sivaraman, Roksana Boreli
2016A Log-Structured Block Preservation and Restoration System for Proactive Forensic Data Collection in the Cloud.
Manabu Hirano, Hiromu Ogawa
2016A Model-Based Approach for Aviation Cyber Security Risk Assessment.
Tobias Kiesling, Matias Krempel, Josef Niederl, Jürgen Ziegler
2016A New Vision for ATM Security Management: The Security Management Platform.
Claudio Porretti, Raoul Lahaije, Denis Kolev
2016A Peek under the Hood of iOS Malware.
Laura García, Ricardo J. Rodríguez
2016A Recommender-Based System for Assisting Non-technical Users in Managing Android Permissions.
Arnaud Oglaza, Romain Laborde, Abdelmalek Benzekri, François Barrère
2016A Security Game Model for Remote Software Protection.
Nicola Basilico, Andrea Lanzi, Mattia Monga
2016A Type System for Quantified Information-Flow Security in Java-Like Languages.
Gohar Shakoori, Mehran S. Fallah, Zeinab Iranmanesh
2016ARTIST: The Android Runtime Instrumentation Toolkit.
Lukas Dresel, Mykolai Protsenko, Tilo Müller
2016Access Control and Data Separation Metrics in Cloud Infrastructures.
Bernd Jäger, Reiner Kraft, Sebastian Luhn, Annika Selzer, Ulrich Waldmann
2016Addressing Security in the ATM Environment: From Identification to Validation of Security Countermeasures with Introduction of New Security Capabilities in the ATM System Context.
Patrizia Montefusco, Rosana Casar, Rainer Koelle, Tim H. Stelkens-Kobsch
2016Agile Team Members Perceptions on Non-functional Testing: Influencing Factors from an Empirical Study.
Cristina Rosa Camacho, Sabrina Marczak, Daniela S. Cruzes
2016Air Traffic Management Security Research in SESAR.
John Hird, Martin Hawley, Chris Machin
2016An Empirical Study on GSN Usage Intention: Factors Influencing the Adoption of Geo-Social Networks.
Esma Aïmeur, Sébastien Gambs, Cheu Yien Yep
2016An Empirical Study on the Relationship between Software Security Skills, Usage and Training Needs in Agile Settings.
Tosin Daniel Oyetoyan, Daniela Soares Cruzes, Martin Gilje Jaatun
2016Authentication in the Context of E-Participation: Current Practice, Challenges and Recommendations.
Maria Leitner, Arndt Bonitz
2016Automated Issuance of Digital Certificates through the Use of Federations.
Thaís Bardini Idalino, Marina Coelho, Jean Everson Martina
2016Byzantine Set-Union Consensus Using Efficient Set Reconciliation.
Florian Dold, Christian Grothoff
2016CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing.
Felix Hörandner, Stephan Krenn, Andrea Migliavacca, Florian Thiemer, Bernd Zwattendorfer
2016Caller-Centrality: Identifying Telemarketers in a VoIP Network.
Muhammad Ajmal Azad, Syed Khurram Rizvi
2016Case Study of Security Development in an Agile Environment: Building Identity Management for a Government Agency.
Kalle Rindell, Sami Hyrynsalmi, Ville Leppänen
2016Classification of Short Messages Initiated by Mobile Malware.
Marián Kühnel, Ulrike Meyer
2016Co-creating Security-and-Privacy-by-Design Systems.
Sauro Vicini, Francesco Alberti, Nicolás Notario, Alberto Crespo, Juan Ramón Troncoso-Pastoriza, Alberto Sanna
2016Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers.
Mario Faiella, Fabio Martinelli, Paolo Mori, Andrea Saracino, Mina Sheikhalishahi
2016Computational, Communicative, and Legal Conditions for Using Social Media in Disaster Management in Germany.
Sabine Gründer-Fahrer, Christian Berger, Antje Schlaf, Gerhard Heyer
2016Cryptographically Enforced Four-Eyes Principle.
Arne Bilzhause, Manuel Huber, Henrich C. Pöhls, Kai Samelin
2016Cyber Security Incident Management in the Aviation Domain.
Martin Gilje Jaatun, Rainer Koelle
2016Detecting Packed Executable File: Supervised or Anomaly Detection Method?
Neminath Hubballi, Himanshu Dogra
2016Development of an AUTOSAR Compliant Cryptographic Library on State-of-the-Art Automotive Grade Controllers.
Pal-Stefan Murvay, Alexandru Matei, Cristina Solomon, Bogdan Groza
2016Digital Forensic Artifacts of the Cortana Device Search Cache on Windows 10 Desktop.
Patrício Domingues, Miguel Frade
2016Disaster-Related Public Speeches: The Role of Emotions.
Maria Spyropoulou, Khurshid Ahmad
2016Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System.
Denise Demirel, Stephan Krenn, Thomas Lorünser, Giulia Traverso
2016Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services.
Prosanta Gope, Ruei-Hau Hsu, Jemin Lee, Tony Q. S. Quek
2016Ensuring Security of Data and Information Flow in Emergency Response Decision Support.
Damian Jackson, Paul Hayes
2016Ensuring the Authenticity and Fidelity of Captured Photos Using Trusted Execution and Mobile Application Licensing Capabilities.
Kostantinos Papadamou, Riginos Samaras, Michael Sirivianos
2016Exploring the Usage of Topic Modeling for Android Malware Static Analysis.
Eric Medvet, Francesco Mercaldo
2016Extraction and Analysis of Volatile Memory in Android Systems: An Approach Focused on Trajectory Reconstruction Based on NMEA 0183 Standard.
Joao Paulo Claudino de Sousa, João José Costa Gondim
2016FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication.
Luigi Stammati, Claudio Pisa, Tooska Dargahi, Alberto Caponi, Giuseppe Bianchi
2016Geographic Localization of an Anonymous Social Network Message Data Set.
Alexander Böhm, Benjamin Taubmann, Hans P. Reiser
2016Hand Dynamics for Behavioral User Authentication.
Fuensanta Torres Garcia, Katharina Krombholz, Rudolf Mayer, Edgar R. Weippl
2016How Secure are Web Servers? An Empirical Study of Slow HTTP DoS Attacks and Detection.
Nikhil Tripathi, Neminath Hubballi, Yogendra Singh
2016Hybrid Focused Crawling for Homemade Explosives Discovery on Surface and Dark Web.
Christos Iliou, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris
2016HyperCrypt: Hypervisor-Based Encryption of Kernel and User Space.
Johannes Götzfried, Nico Dorr, Ralph Palutke, Tilo Müller
2016IFCaaS: Information Flow Control as a Service for Cloud Security.
Marwa Elsayed, Mohammad Zulkernine
2016Identification and Analysis of Email and Contacts Artefacts on iOS and OS X.
Kenneth M. Ovens, Gordon Morison
2016Introducing Proxy Voting to Helios.
Oksana Kulyk, Karola Marky, Stephan Neumann, Melanie Volkamer
2016Involving End Users into Collaborative Software Development: The Showcase of CloudTeams.
Sebastian Franken, Sabine Kolvenbach, Wolfgang Gräther
2016Law Enforcement Access to Password Protected and/or Encrypted Mobile Data.
Murdoch Watney
2016Legal Implications of Using Social Media Data in Emergency Response.
Christian Berger, Paolo de Stefani, Taiwo A. Oriola
2016Lightweight Encryption for Smart Home.
Sanaah Al Salami, Joonsang Baek, Khaled Salah, Ernesto Damiani
2016Major Challenges in Structuring and Institutionalizing CERT-Communication.
Otto Hellwig, Gerald Quirchmayr, Edith Huber, Gernot Goluch, Franz Vock, Bettina Pospisil
2016Malware in Pirated Software: Case Study of Malware Encounters in Personal Computers.
Svrana Kumar, Logesh Madhavan, Mangalam Nagappan, Biplab Sikdar
2016Misuse, Abuse and Reuse: Economic Utility Functions for Characterising Security Requirements.
Chad Heitzenrater, Andrew C. Simpson
2016No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large.
Wilfried Mayer, Aaron Zauner, Martin Schmiedecker, Markus Huber
2016Notary-Assisted Certificate Pinning for Improved Security of Android Apps.
Georg Merzdovnik, Damjan Buhov, Artemios G. Voyiatzis, Edgar R. Weippl
2016On Analyzing Program Behavior under Fault Injection Attacks.
Jakub Breier
2016POTR: Practical On-the-Fly Rejection of Injected and Replayed 802.15.4 Frames.
Konrad-Felix Krentz, Christoph Meinel, Maxim Schnjakin
2016PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services.
Thomas Lorünser, Daniel Slamanig, Thomas Länger, Henrich C. Pöhls
2016Privacy Impact Assessment Template for Provenance.
Jenni Reuben, Leonardo A. Martucci, Simone Fischer-Hübner, Heather S. Packer, Hans Hedbom, Luc Moreau
2016Privacy Preserving Computations for Viral Marketing: The Case of Rational Players.
Rica Gonen, Tamir Tassa
2016Protecting Sensitive Information in the Volatile Memory from Disclosure Attacks.
Stefanos Malliaros, Christoforos Ntantogian, Christos Xenakis
2016Provable User Authentication Scheme in Telecare Medicine Information System Using Elliptic Curve Cryptosystem.
Toan-Thinh Truong, Duong-Tien Phan, Minh-Triet Tran, Anh Duc Duong, Isao Echizen
2016Ransomware Inside Out.
Francesco Mercaldo, Vittoria Nardone, Antonella Santone
2016Recognizing Time-Efficiently Local Botnet Infections - A Case Study.
Tanja Heuer, Ina Schiering, Frank Klawonn, Alexander Gabel, Martin Seeger
2016Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical Attacks.
Jose Rubio-Hernan, Luca De Cicco, Joaquín García-Alfaro
2016Role Mining with Missing Values.
Sokratis Vavilis, Alexandru Ionut Egner, Milan Petkovic, Nicola Zannone
2016SPARER: Secure Cloud-Proof Storage for e-Health Scenarios.
Gabriela Gheorghe, Muhammad Rizwan Asghar, Jean Lancrenon, Sankalp Ghatpande
2016SecDevOps: Is It a Marketing Buzzword? - Mapping Research on Security in DevOps.
Vaishnavi Mohan, Lotfi Ben Othmane
2016Security Risk Assessment and Risk Treatment for Integrated Modular Communication.
Hamid Asgari, Sarah Haines, Adrian Waller
2016Security Testing with Controller-Pilot Data Link Communications.
Doris di Marco, Alessandro Manzo, Marco Ivaldi, John Hird
2016Selection of Mitigation Actions Based on Financial and Operational Impact Assessments.
Gustavo Gonzalez Granadillo, Alexander Motzek, Joaquín García-Alfaro, Hervé Debar
2016SmartNet: Secure Content Sharing for Peer-to-Peer Smart Group Spaces.
Brian Greaves, Marijke Coetzee
2016Social Analytics in an Enterprise Context: From Manufacturing to Software Development.
Evangelos Arvanitakis, Michael Petychakis, Evmorfia Biliri, Ariadni Michalitsi-Psarrou, Panagiotis Kokkinakos, Fenareti Lampathaki, Dimitrios Askounis
2016Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features.
Alberto Ferrante, Eric Medvet, Francesco Mercaldo, Jelena Milosevic, Corrado Aaron Visaggio
2016Stopping Amplified DNS DDoS Attacks through Distributed Query Rate Sharing.
Saurabh Verma, Ali Hamieh, Jun Ho Huh, Henrik Holm, Siva Raj Rajagopalan, Maciej Korczynski, Nina H. Fefferman
2016Synchronous One Time Biometrics with Pattern Based Authentication.
Patrick Lacharme, Christophe Rosenberger
2016Tackling the Cloud Adoption Dilemma - A User Centric Concept to Control Cloud Migration Processes by Using Machine Learning Technologies.
Michael Diener, Leopold Blessing, Nina Rappel
2016The Application of Social Media Image Analysis to an Emergency Management System.
Min Jing, Bryan W. Scotney, Sonya A. Coleman, T. Martin McGinnity
2016The Case for RAID 4: Cloud-RAID Integration with Local Storage.
Christopher Hansen, James K. Archibald
2016The Landscape of Domain Name Typosquatting: Techniques and Countermeasures.
Jeffrey Spaulding, Shambhu J. Upadhyaya, Aziz Mohaisen
2016The Perfect Storm: The Privacy Paradox and the Internet-of-Things.
Meredydd Williams, Jason R. C. Nurse, Sadie Creese
2016The Slandail Monitor: Real-Time Processing and Visualisation of Social Media Data for Emergency Management.
Xiubo Zhang, Stephen Kelly, Khurshid Ahmad
2016The Value of Online Users: Empirical Evaluation of the Price of Personalized Ads.
Miriam Marciel, José González Cabañas, Yonas Mitike Kassa, Roberto Gonzalez, Mohamed Ahmed
2016Threat Modelling Service Security as a Security Ceremony.
Taciane Martimiano, Jean Everson Martina
2016Threat from Within: Case Studies of Insiders Who Committed Information Technology Sabotage.
Jason W. Clark
2016Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing Side Channels.
Johannes Bauer, Felix C. Freiling
2016Towards Digital Investigation in Virtual Networks: A Study of Challenges and Open Problems.
Daniel Spiekermann, Tobias Eggendorfer
2016Towards Effective Security Assurance for Incremental Software Development the Case of Zen Cart Application.
Lotfi Ben Othmane, Azmat Ali
2016Towards Secure Collaboration in Federated Cloud Environments.
Bojan Suzic, Andreas Reiter
2016Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks.
Lyes Bayou, Nora Cuppens-Boulahia, David Espes, Frédéric Cuppens
2016Towards a Complex Systems Approach to Legal and Economic Impact Analysis of Critical Infrastructures.
Thomas Schaberreiter, Gerald Quirchmayr, Anna-Maija Juuso, Moussa Ouedraogo, Juha Röning
2016Towards a Metamodel for SABSA Conceptual Architecture Descriptions.
Patrick Pleinevaux
2016Towards a Systemic Approach for Information Security Risk Management.
Yannick Naudet, Nicolas Mayer, Christophe Feltus
2016Towards a Unified Secure Cloud Service Development and Deployment Life-Cycle.
Aleksandar Hudic, Matthias Flittner, Thomas Lorünser, Philipp M. Radl, Roland Bless
2016Usable Privacy-Aware Logging for Unstructured Log Entries.
Christof Rath
2016Using Crowdsourced and Anonymized Personas in the Requirements Elicitation and Software Development Phases of Software Engineering.
Iosif Alvertis, Dimitris Papaspyros, Sotiris Koussouris, Spyros Mouzakitis, Dimitris Askounis
2016Using Expert Systems to Statically Detect "Dynamic" Conflicts in XACML.
Bernard Stepien, Amy P. Felty
2016V-DIFT: Vector-Based Dynamic Information Flow Tracking with Application to Locating Cryptographic Keys for Reverse Engineering.
Antonio M. Espinoza, Jeffrey Knockel, Pedro Comesaña Alfaro, Jedidiah R. Crandall
2016VoIP Profiler: Profiling Voice over IP User Communication Behavior.
Sainath Batthala, Mayank Swarnkar, Neminath Hubballi, Maitreya Natu
2016What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware.
Enrico Mariconti, Jeremiah Onaolapo, Gordon J. Ross, Gianluca Stringhini
2016Your Cloud in My Company: Modern Rights Management Services Revisited.
Martin Grothe, Christian Mainka, Paul Rösler, Johanna Jupke, Jan Kaiser, Jörg Schwenk
2016Your Data in the Eyes of the Beholders: Design of a Unified Data Valuation Portal to Estimate Value of Personal Information from Market Perspective.
Yonas Mitike Kassa, José González Cabañas, Ángel Cuevas, Rubén Cuevas Rumín, Miriam Marciel, Roberto Gonzalez
2016k-Times Full Traceable Ring Signature.
Xavier Bultel, Pascal Lafourcade
2016pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling Approach.
Pontus Johnson, Alexandre Vernotte, Mathias Ekstedt, Robert Lagerström