| 2011 | 7th International Conference on Information Assurance and Security, IAS 2011, Melacca, Malaysia, December 5-8, 2011 |
| 2011 | A DRM framework towards preventing digital piracy. Ravi Sankar Veerubhotla, Ashutosh Saxena |
| 2011 | A SLA-based interface for security management in cloud and GRID integrations. Massimiliano Rak, Loredana Liccardo, Rocco Aversa |
| 2011 | A common key encryption algorithm using N-dimensional Hilbert curves. Sei-ichiro Kamata |
| 2011 | A comparative study of feature extraction using PCA and LDA for face recognition. Erwin Hidayat, Nur A. Fajrian, Azah Kamilah Muda, Yun-Huoy Choo, Sabrina Ahmad |
| 2011 | A cooperative intrusion detection scheme for clustered mobile ad hoc networks. Hajar Al-Hujailan, Mznah Al-Rodhaan, Abdullah Al-Dhelaan |
| 2011 | A fast eavesdropping attack against touchscreens. Federico Maggi, Simone Gasparini, Giacomo Boracchi |
| 2011 | A new approach to evaluating security assurance. Moussa Ouedraogo, Haralambos Mouratidis, Artur Hecker, Cédric Bonhomme, Djamel Khadraoui, Eric Dubois, David Preston |
| 2011 | A novel intrusion detection framework for Wireless Sensor Networks. Murad A. Rassam, Mohd Aizaini Maarof, Anazida Binti Zainal |
| 2011 | A novel system for fingerprint privacy protection Sheng Li, Alex C. Kot |
| 2011 | A secure joint wavelet based steganography and secret sharing method. Mohammad Javad Khosravi, Samaneh Ghandali |
| 2011 | A security analysis of smartphone data flow and feasible solutions for lawful interception. Mithun Paul, Nitin Singh Chauhan, Ashutosh Saxena |
| 2011 | A semantic analysis approach to manage IDS alerts flooding. Sherif Saad, Issa Traoré |
| 2011 | A two-tier energy-efficient secure routing protocol for Wireless Sensor Networks. Aly Mohamed El-Semary, Mohamed Mostafa A. Azim |
| 2011 | AES-512: 512-bit Advanced Encryption Standard algorithm design and evaluation. Abidalrahman Moh'd, Yaser Jararweh, Lo'ai Ali Tawalbeh |
| 2011 | AES: Current security and efficiency analysis of its alternatives. Herman Isa, Iskandar Bahari, Hasibah Sufian, Muhammad Reza Z'aba |
| 2011 | Access control taxonomy for social networks. Adnan Ahmad, Brian Whitworth |
| 2011 | Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection. Yuxin Meng, Lam-for Kwok |
| 2011 | An SIR model for the propagation of topology-aware active worms considering the join and leave of hosts. Ahmad Jafarabadi, Mohammad Abdollahi Azgomi |
| 2011 | An extended rights expression model supporting dynamic digital rights management. Dongyang Xu, Zhi Tang, Yinyan Yu |
| 2011 | An identity based beta cryptosystem. Chandrashekhar Meshram, Suchitra A. Meshram |
| 2011 | Analysis on Lightweight Block Cipher, KTANTAN. Nik Azura Nik Abdullah, Norul Hidayah Lot Ahmad Zawawi, Hazlin Abdul Rani |
| 2011 | Biometric driven initiative system for passive continuous authentication. Muhammad Khurram Khan, Pei-Wei Tsai, Jeng-Shyang Pan, Bin-Yih Liao |
| 2011 | Black hole effect mitigation method in AODV routing protocol. Zaid Ahmad, Kamarularifin Abd. Jalil, Jamalul-lail Ab Manan |
| 2011 | Comparison of digital audio watermarking techniques for the security of VOIP communications. Fusun Citak Er, Ensar Gul |
| 2011 | Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields. Simona Samardjiska, Yanling Chen, Danilo Gligoroski |
| 2011 | Cryptanalysis of the full CHAIN cipher. Wun-She Yap, Sze Ling Yeo, Chee Hoo Yian |
| 2011 | Developing a grand strategy for Cyber War. Andrew M. Colarik, Lech J. Janczewski |
| 2011 | Distributed access control for social networks. Adnan Ahmad, Brian Whitworth |
| 2011 | Efficient iris recognition system based on dual boundary detection using robust variable learning rate Multilayer Feed Forward neural network. Mohtashim Baqar, Sohaib Azhar, Zeeshan Iqbal, Irfan Shakeel, Laeeq Ahmed, Muhammad Moinuddin |
| 2011 | Energy efficient delay leap routing in multicast using feed back neural networks. Mohammad Uruj Jaleel, Mohammad Asghar Jamil, Kashiful Haq |
| 2011 | Enhance hardware security using FIFO in pipelines. Kuan Jen Lin, Chih Ping Weng, Tsai Kun Hou |
| 2011 | Enhanced sharing and privacy in distributed information sharing environments. Ahmad Kamran Malik, Schahram Dustdar |
| 2011 | Ensemble based categorization and adaptive model for malware detection. Muhammad Najmi Ahmad Zabidi, Mohd Aizaini Maarof, Anazida Binti Zainal |
| 2011 | Examining CSCF entity attacks scenarios and vulnerabilities in IP Multimedia Subsystems. Elham Nosrati, S. Navid Hashemi Tonekaboni, S. Majid Hashemi Tonekaboni |
| 2011 | Extending Dempster Shafer method by multilayer decision template in classifier fusion. Mehdi Salkhordeh Haghighi, Abedin Vahedian, Hadi Sadoghi Yazdi |
| 2011 | Fixed size encoding scheme for software watermarking. Azyan Yusra Kapi, Subariah Ibrahim |
| 2011 | Guesswork changes in multi-processor attacks. Reine Lundin, Stefan Lindskog |
| 2011 | H.264/AVC digital fingerprinting based on content adaptive embedding. Karima Ait Saadi, Ahmed Bouridane, Abdelrazek Guessoum |
| 2011 | High capacity and inaudibility audio steganography scheme. Haider Ismael Shahadi, Razali Jidin |
| 2011 | Holistic analysis of mix protocols. Giampaolo Bella, Denis Butin, David Gray |
| 2011 | Hybrid Intelligent Decision Support System for credit risk assessment. Hamid Reza Taremian, Mahdi Pakdaman Naeini |
| 2011 | Hybrid of rough set theory and Artificial Immune Recognition System as a solution to decrease false alarm rate in intrusion detection system. Fatin Norsyafawati Mohd Sabri, Norita Md Norwawi, Kamaruzzaman Seman |
| 2011 | Information security awareness in university: Maintaining learnability, performance and adaptability through roles of responsibility. Abdul Rahman Ahlan, Muharman Lubis |
| 2011 | Integrating OAuth with Information card systems. Haitham S. Al-Sinani |
| 2011 | Intrusion detection based on k-means clustering and OneR classification. Zaiton Muda, Warusia Yassin, Md Nasir Sulaiman, Nur Izura Udzir |
| 2011 | Investigation of bypassing malware defences and malware detections. Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir |
| 2011 | Key based bit level genetic cryptographic technique (KBGCT). Subhranil Som, Niladri Shekhar Chatergee, J. K. Mandal |
| 2011 | Multifactor graphical passwords: An assessment of end-user performance. Mohd Zalisham Jali, Steven Furnell, Paul Dowland |
| 2011 | On the capacity of fingerprinting codes against unknown size of colluders. Gou Hosoya, Hideki Yagi, Manabu Kobayashi, Shigeichi Hirasawa |
| 2011 | OpenID authentication as a service in OpenStack. Rasib Hassan Khan, Jukka Ylitalo, Abu Shohel Ahmed |
| 2011 | Preventing data leakage in service orchestration. Thomas Demongeot, Eric Totel, Yves Le Traon |
| 2011 | Pulse Active Mean (PAM): A PIN supporting feature extraction algorithm for doubly secure authentication. Sairul Izwan Safie, John J. Soraghan, Lykourgos Petropoulakis |
| 2011 | Reversible watermarking using Residue Number System. Atta-ur-Rahman, Muhammad Tahir Naseem, Ijaz Mansoor Qureshi, Muhammad Zeeshan Muzaffar |
| 2011 | Robust video watermarking against JPEG compression in 3D-DWT domain. Yadollah Zamanidoost, Antonio Navarro, Zhinoos Razavi Hesabi, Nima Rahimi Froshani, Fatemeh Farnia |
| 2011 | Secure Vault: A privacy preserving reliable architecture for Secure Social Networking. Siddharth Malik, Anjali Sardana |
| 2011 | Slow port scanning detection. Mehiar Dabbagh, Ali J. Ghandour, Kassem Fawaz, Wassim El-Hajj, Hazem M. Hajj |
| 2011 | State convergence and the effectiveness of time-memory-data tradeoffs. Sui-Guan Teo, Kenneth Koon-Ho Wong, Ed Dawson, Leonie Simpson |
| 2011 | State of the art: Signature verification system. Tee Wilkin, Shih Yin Ooi |
| 2011 | Strategic approach for high performance object tracking in a network of surveillance cameras. H. H. Weerasena, P. B. S. Bandara, J. R. B. Kulasekara, B. M. B. Dassanayake, U. A. A. Niroshika, P. R. Wijenayake |
| 2011 | Surveying the Wireless Body Area Network in the realm of wireless communication. Sofia Najwa Ramli, Rabiah Ahmad |
| 2011 | The new services in Nagios: Network bandwidth utility, email notification and sms alert in improving the network performance. Mohammad Ali Arsyad bin Mohd Shuhaimi, Zaheera binti Zainal Abidin, Irda binti Roslan, Syarulnaziah binti Anawar |
| 2011 | Time and energy cost analysis of Kerberos security protocol in Wireless Sensor Networks. Farshad Amin, Amir Hossein Jahangir |
| 2011 | Towards data centric mobile security. Ali Dehghantanha, Nur Izura Udzir, Ramlan Mahmod |
| 2011 | Trusted anonymizer-based RFID system with integrity verification. Mohd Faizal Mubarak, Jamalul-lail Ab Manan, Saadiah Yahya |
| 2011 | Understanding vulnerabilities by refining taxonomy. Nurul Haszeli Ahmad, Syed Ahmad Aljunid, Jamalul-lail Ab Manan |
| 2011 | What is Green Security? Luca Caviglione, Alessio Merlo, Mauro Migliardi |