CRiSIS C

23 papers

YearTitle / Authors
20127th International Conference on Risks and Security of Internet and Systems, CRiSIS 2012, Cork, Ireland, October 10-12, 2012
Fabio Martinelli, Jean-Louis Lanet, William M. Fitzgerald, Simon N. Foley
2012A honeypot for arbitrary malware on USB storage devices.
Sebastian Poeplau, Jan Gassen
2012A vector based model approach for defining trust in Multi-Organization Environments.
Khalifa Toumi, César Andrés, Ana R. Cavalli, Mazen El Maarabani
2012Anomaly analysis for Physical Access Control security configuration.
William M. Fitzgerald, Fatih Turkmen, Simon N. Foley, Barry O'Sullivan
2012Attacks against smart cards: Hands on session.
Jean-Louis Lanet
2012Browser function calls modeling for banking malware detection.
Manuel García-Cervigón, Manel Medina Llinàs
2012CRiSIS 2012 security standards tutorial.
Stephen Farrell
2012Detecting attacks against data in web applications.
Romaric Ludinard, Eric Totel, Frederic Tronel, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy
2012Distributed e-voting using the Smart Card Web Server.
Lazaros Kyrillidis, Sheila Cobourne, Keith Mayes, Song Dong, Konstantinos Markantonakis
2012Don't work. Can't work? Why it's time to rethink security warnings.
Kat Krol, Matthew Moroz, Martina Angela Sasse
2012Evasion-resistant malware signature based on profiling kernel data structure objects.
Ahmed F. Shosha, Chen-Ching Liu, Pavel Gladyshev, Marcus Matten
2012Hash pile ups: Using collisions to identify unknown hash functions.
R. Joshua Tobin, David Malone
2012Improving the detection of on-line vertical port scan in IP traffic.
Yousra Chabchoub, Christine Fricker, Philippe Robert
2012Investigating the dark cyberspace: Profiling, threat-based analysis and correlation.
Claude Fachkha, Elias Bou-Harb, Amine Boukhtouta, Son Dinh, Farkhund Iqbal, Mourad Debbabi
2012Managing and accessing data in the cloud: Privacy risks and approaches.
Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati
2012Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments.
Siwar Kriaa, Marc Bouissou, Ludovic Piètre-Cambacédès
2012Partitioning the Internet.
Matthias Wachs, Christian Grothoff, Ramakrishna Thurimella
2012Privacy-by-design based on quantitative threat modeling.
Jesus Luna Garcia, Neeraj Suri, Ioannis Krontiris
2012Security-related vulnerability life cycle analysis.
Géraldine Vache Marconato, Vincent Nicomette, Mohamed Kaâniche
2012Semantic matching of web services security policies.
Monia Ben Brahim, Tarak Chaari, Maher Ben Jemaa, Mohamed Jmaiel
2012Semiring-based constraint models and frameworks for security-related scenarios.
Stefano Bistarelli, Francesco Santini
2012Towards efficient access control in a mobile agent based wireless sensor network.
Estanislao Mercadal, Guillermo Navarro-Arribas, Simon N. Foley, Joan Borrell
2012Trust-based delegation for Ad Hoc QoS enhancing.
Ryma Abassi, Sihem Guemara El Fatmi