IAS C

22 papers

YearTitle / Authors
20139th International Conference on Information Assurance and Security, IAS 2013, Gammarth, Tunisia, December 4-6, 2013
2013A professional view on ebanking authentication: Challenges and recommendations.
Jorge Aguila Vila, Jetzabel Serna-Olvera, Luis Fernandez, Manel Medina, Andreas Sfakianakis
2013A secured model for Indian e-health system.
Shilpa Srivastava, Namrata Agarwal, Millie Pant, Ajith Abraham
2013A survey on digital tracing traitors schemes.
Faten Chaabane, Maha Charfeddine, Chokri Ben Amar
2013A system of abnormal behaviour detection in aerial surveillance.
Ahlem Walha, Ali Wali, Adel M. Alimi
2013A wavelet network speech recognition system to control an augmented reality object.
Dhekra Bousnina, Ridha Ejbali, Mourad Zaied, Chokri Ben Amar
2013ARMLCC: Adaptive and recovery-based Multi-Layer Connected Chain Mechanism for Multicast Source Authentication.
Hamdi Eltaief, Ali El Kamel, Habib Youssef
2013An intelligent system for video events detection.
Yassine Aribi, Ali Wali, Adel M. Alimi
2013Detecting stepping-stones under the influence of packet jittering.
Wei Ding, Khoa Le, Shou-Hsuan Stephen Huang
2013Developing ECC applications in Java Card.
V. Gayoso Martínez, Luis Hernández Encinas
2013Enhanced P2P botnets detection framework architecture with hybrid analyzer: Host-based and network-based.
Raihana Syahirah Abdullah, Mohd Faizal Abdollah, Zul Azri Muhamad Noh, Siti Rahayu Selamat, Mohd Zaki Mas'ud, Shahrin Sahib
2013Finger verification Using SVD features.
Ala Balti, Mounir Sayadi, Farhat Fnaiech
2013Flexibility vs. security in linked enterprise data access control graphs.
Markus Graube, Patricia Órtiz, Manuel Carnerero, Óscar Lázaro, Mikel Uriarte, Leon Urbas
2013Hierarchical object log format for normalisation of security events.
Andrey Sapegin, David Jaeger, Amir Azodi, Marian Gawron, Feng Cheng, Christoph Meinel
2013How to grant less permissions to facebook applications.
Gianpiero Costantino, Fabio Martinelli, Daniele Sgandurra
2013Information flow policies vs malware.
Radoniaina Andriatsimandefitra, Thomas Saliou
2013Privacy preserving processing of data decision tree based on sample selection and Singular Value Decomposition.
Priyank Jain, Neelam Pathak, Pratibha Tapashetti, A. S. Umesh
2013Profiling mobile malware behaviour through hybrid malware analysis approach.
Mohd Zaki Mas'ud, Shahrin Sahib, Mohd Faizal Abdollah, Siti Rahayu Selamat, Robiah Yusof, Rabiah Ahmad
2013Quantitative penetration testing with item response theory.
Florian Arnold, Wolter Pieters, Mariëlle Stoelinga
2013The state of the art of risk assessment and management for information systems.
Lulu Liang, Wang Ren, Jing Song, Huaming Hu, Qiang He, Shuo Fang
2013Towards enforcing on-the-fly policies in BYOD environments.
Gianpiero Costantino, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra
2013Trusted integration of cloud-based NFC transaction players.
Pardis Pourghomi, Muhammad Qasim Saeed, Gheorghita Ghinea