CRiSIS C

13 papers

YearTitle / Authors
2010A multi-view approach for embedded information system security.
Manuel Munier
2010A new payment protocol over the Internet.
Pierre Girard, Karine Villegas, Jean-Louis Lanet, Aude Plateaux
2010An intruder model for trust negotiation.
Philippe Balbiani, Yannick Chevalier, Marwa El Houri
2010CRiSIS 2010, Proceedings of the Fifth International Conference on Risks and Security of Internet and Systems, Montreal, QC, Canada, October 10-13, 2010
2010Host-based anomaly detection for pervasive medical systems.
Biniyam Asfaw, Dawit Bekele, Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam
2010Insights from the analysis of the Mariposa botnet.
Prosenjit Sinha, Amine Boukhtouta, Victor Heber Belarde, Mourad Debbabi
2010Mitigation of topology control traffic attacks in OLSR networks.
Gimer Cervera, Michel Barbeau, Joaquín García-Alfaro, Evangelos Kranakis
2010Not so fast flux networks for concealing scam servers.
Theodore O. Cochran, James Cannady
2010Performance assessment of a distributed intrusion detection system in a real network scenario.
Salvatore D'Antonio, Valerio Formicola, Claudio Mazzariello, Francesco Oliviero, Simon Pietro Romano
2010SAFE-OS: A secure and usable desktop operating system.
François Lesueur, Ala Rezmerita, Thomas Hérault, Sylvain Peyronnet, Sébastien Tixeuil
2010Satisfiability of general intruder constraints with a set constructor.
Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani
2010Solution to the wireless evil-twin transmitter attack.
Payal Bhatia, Christine Laurendeau, Michel Barbeau
2010Towards Internet voting security: A threat tree for risk assessment.
John Harold Pardue, Alec Yasinsac, Jeffrey P. Landry