| 2010 | A case analysis of a Contextual Model of Trust for digital identities using UML 2.0 and context graph algorithms. Sean S. E. Thorpe |
| 2010 | A causal model for information security risk assessment. Suleyman Kondakci |
| 2010 | A comparison of the standardized versions of ECIES. Victor Gayoso Martínez, Fernando Hernández Álvarez, Luis Hernández Encinas, Carmen Sánchez Ávila |
| 2010 | A distributed and cooperative user authentication framework. Chris G. Hocking, Steven M. Furnell, Nathan L. Clarke, Paul L. Reynolds |
| 2010 | A framework for cyber surveillance of unlawful activities for critical infrastructure using computational grids. Václav Snásel, Ajith Abraham, Khalid Saeed, Hameed Al-Qaheri |
| 2010 | A framework for integrated risk management process using survival analysis approach in information security. Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail |
| 2010 | A hierarchical access authentication in network. He Liu, Man-Gui Liang, Gao-Liang Qi, Xiaowei Chen |
| 2010 | A hybrid Authentication and authorization process for control system networks. David O. Manz, Thomas W. Edgar, Glenn Allen Fink |
| 2010 | A naming system applied to a RESERVOIR cloud. Antonio Celesti, Massimo Villari, Antonio Puliafito |
| 2010 | A semantic based methodology to classify and protect sensitive data in medical records. Flora Amato, Valentina Casola, Antonino Mazzeo, Sara Romano |
| 2010 | A structured approach to anomaly detection for in-vehicle networks. Michael Müter, André Groll, Felix C. Freiling |
| 2010 | A two-tiered authentication and encryption scheme in secure healthcare sensor networks. Mohammed Raza Kanjee, Kalyani Divi, Hong Liu |
| 2010 | Anonymous communication system using probabilistic choice of actions and multiple loopbacks. Kazuhiro Kono, Yoshimichi Ito, Noboru Babaguchi |
| 2010 | Anonymous service access for Vehicular Ad hoc Networks. Hesiri Weerasinghe, Huirong Fu, Supeng Leng |
| 2010 | Assurance in identity management systems. Maya I. Chehab, Ali E. Abdallah |
| 2010 | Audited credential delegation - a user-centric identity management solution for computational grid environments. Ali Nasrat Haidar, Stefan J. Zasada, Peter V. Coveney, Ali E. Abdallah, Bruce Beckles |
| 2010 | Automatic semantic annotation of images based on Web data. Guiguang Ding, Na Xu |
| 2010 | Benchmarking IP blacklists for financial botnet detection. David Oro, Jesus Luna, Toni Felguera, Marc Vilanova, Jetzabel M. Serna |
| 2010 | CARMA: Composable-Adaptive Resource Management Authorization for ubiquitous environments. Roberto Morales, Jetzabel M. Serna, Manel Medina, Jesus Luna |
| 2010 | Comparison of real-time DSP-based edge detection techniques for license plate detection. Zuwena Musoromy, Faycal Bensaali, Soodamani Ramalingam, Georgios Pissanidis |
| 2010 | Cooperative access control for the Grid. Alessio Merlo, Alessandro Armando |
| 2010 | Data aggregation for information authentication in VANETs. Jezabel Molina-Gil, Pino Caballero-Gil, Candelaria Hernández-Goya, Cándido Caballero-Gil |
| 2010 | Detect multi-hop stepping-stone pairs with clock skew. Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Christopher Hill |
| 2010 | Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards. Eugen Leontie, Olga Gelbart, Bhagirath Narahari, Rahul Simha |
| 2010 | Discriminative multinomial Naïve Bayes for network intrusion detection. Mrutyunjaya Panda, Ajith Abraham, Manas Ranjan Patra |
| 2010 | Efficient defense strategies to minimize attackers' success probabilities in honeynet. Frank Yeong-Sung Lin, Yu-Shun Wang, Po-Hao Tsang |
| 2010 | End-to-end security policy description and management for collaborative system. Ziyi Su, Frédérique Biennier |
| 2010 | Extending the definition of guesswork. Reine Lundin, Stefan Lindskog |
| 2010 | Fast intrusion detection system based on Flexible Neural Tree. Tomás Novosád, Jan Platos, Václav Snásel, Ajith Abraham |
| 2010 | Fault attack on AES with single-bit induced faults. Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi |
| 2010 | Fuzzified Aho-Corasick search automata. Zdenek Horak, Václav Snásel, Ajith Abraham, Aboul Ella Hassanien |
| 2010 | Identity federation in cloud computing. Valentina Casola, Massimiliano Rak, Umberto Villano |
| 2010 | Inconsistency detection method for access control policies. Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski |
| 2010 | Insider threat discovery using automatic detection of mission critical data based on content. Jonathan White, Brajendra Panda |
| 2010 | Integrated security risk management for IT-intensive organizations. Jeffrey Mounzer, Tansu Alpcan, Nicholas Bambos |
| 2010 | Integrating a network IDS into an open source Cloud Computing environment. Claudio Mazzariello, Roberto Bifulco, Roberto Canonico |
| 2010 | Intelligent response system to mitigate the success likelihood of ongoing attacks. Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, Antony Martin |
| 2010 | Link suggestions in terrorists networks using Semi Discrete Decomposition. Václav Snásel, Zdenek Horak, Ajith Abraham |
| 2010 | Novel algorithmic countermeasures for Differential Power Analysis attacks on smart cards. Hanan A. Mahmoud, Khaled Alghathbar |
| 2010 | Novel technique for steganography in fingerprints images: Design and implementation. Hanan A. Mahmoud, Hanan Saad Al-Hulaibah, Sarah A. Al-Naeem, Suha Ali Al-Qhatani, Aljoharah Al-Dawood, Buthaina Saleh Al-Nassar, Dhay Yousef Al-Salman |
| 2010 | Optimum fusion of visual and thermal face images for recognition. Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu |
| 2010 | Patient's perception of health information security: The case of selected public and private hospitals in Addis Ababa. Tibebe Tesema, Dawn Medlin, Ajith Abraham |
| 2010 | Quantifying authentication Levels of Assurance in grid environments. Li Yao, Ning Zhang |
| 2010 | RAPID: Reputation based approach for improving intrusion detection effectiveness. Ashley Thomas |
| 2010 | Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment. Hanieh Azkia, Nora Cuppens-Boulahia, Frédéric Cuppens, Gouenou Coatrieux |
| 2010 | Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform. Mohamed El-Hadedy, Martin Margala, Danilo Gligoroski, Svein J. Knapskog |
| 2010 | Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework. Zahri Yunos, Syahrul Hafidz Suid, Rabiah Ahmad, Zuraini Ismail |
| 2010 | Scaling IDS construction based on Non-negative Matrix factorization using GPU computing. Jan Platos, Pavel Krömer, Václav Snásel, Ajith Abraham |
| 2010 | Secure Universal Plug and Play network. Vesa Pehkonen, Juha Koivisto |
| 2010 | Secure architecture for healthcare Wireless Sensor Networks. Kalyani Divi, Mohammed Raza Kanjee, Hong Liu |
| 2010 | Secure protocol for ad hoc transportation system. Johnson P. Thomas, Vinay Abburi, Mathews Thomas, Ajith Abraham |
| 2010 | Securing a tiered re-taskable sensing system. Alessandra De Benedictis, Andrea Gaglione, Nicola Mazzocca |
| 2010 | Security preferences specification and implementation in a service-based workflow. Wendpanga Francis Ouedraogo, Frédérique Biennier, Nicolas Salatgé |
| 2010 | Sixth International Conference on Information Assurance and Security, IAS 2010, Atlanta, GA, USA, August 23-25, 2010 |
| 2010 | Specification of attribute relations for access control policies and constraints using Policy Machine. Vincent C. Hu, David F. Ferraiolo, Serban I. Gavrila |
| 2010 | The five modes AES applications in sounds and images. Chi-Wu Huang, Chien-Lun Yen, Che-Hao Chiang, Kuo-Huang Chang, Chi-Jeng Chang |
| 2010 | The number of the isomorphism classes of hyperelliptic curves of genus four over finite fields. Lin You, Fugeng Zeng |
| 2010 | Threat modeling approaches and tools for securing architectural designs of an e-banking application. Caroline Moeckel, Ali E. Abdallah |
| 2010 | Towards intrusion detection by information retrieval and genetic programming. Pavel Krömer, Jan Platos, Václav Snásel, Ajith Abraham |
| 2010 | Two tier detection model for misbehavior of low-power nodes in virtual MIMO based wireless networks. Yang Liu, Yue Wu, Junhua Tang |
| 2010 | UDT -Authentication Option field: An approach. Danilo Valeros Bernardo |
| 2010 | Using vulnerability information and attack graphs for intrusion detection. Sebastian Roschke, Feng Cheng, Christoph Meinel |