CRiSIS C

23 papers

YearTitle / Authors
2015Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers
Javier López, Indrajit Ray, Bruno Crispo
2014Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms.
Alexander Schaub, Emmanuel Schneider, Alexandros Hollender, Vinicius Calasans, Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guilley, Olivier Rioul
2014Automated Detection of Logical Errors in Programs.
George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis
2014Context-Awareness Using Anomaly-Based Detectors for Smart Grid Domains.
Cristina Alcaraz, Lorena Cazorla, Gerardo Fernandez
2014Data Anonymization.
Josep Domingo-Ferrer, Jordi Soria-Comas
2014Detecting Anomalies in Printed Intelligence Factory Network.
Matti Mantere, Mirko Sailio, Sami Noponen
2014Evaluation of Dynamic Instantiation in CPRM-Based Systems.
Ana Nieto
2014How Robust is the Internet? - Insights from Graph Analysis.
Annika Baumann, Benjamin Fabian
2014ISER: A Platform for Security Interoperability of Multi-source Systems.
Khalifa Toumi, Fabien Autrel, Ana R. Cavalli, Sammy Haddad
2014Inter-technology Conflict Analysis for Communication Protection Policies.
Cataldo Basile, Daniele Canavese, Antonio Lioy, Fulvio Valenza
2014Key Extraction Attack Using Statistical Analysis of Memory Dump Data.
Yuto Nakano, Anirban Basu, Shinsaku Kiyomoto, Yutaka Miyake
2014Latent Semantic Analysis for Privacy Preserving Peer Feedback.
Mouna Selmi, Hicham Hage, Esma Aïmeur
2014Location-Aware RBAC Based on Spatial Feature Models and Realistic Positioning.
Philipp Marcus, Lorenz Schauer, Claudia Linnhoff-Popien
2014Managing Heterogeneous Access Control Models Cross-Organization.
Samira Haguouche, Zahi Jarir
2014Online Privacy: Risks, Challenges, and New Trends.
Esma Aïmeur
2014Practical Attacks on Virtual Worlds.
Graham Hili, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis
2014Privacy Issues in Geosocial Networks.
Zakaria Sahnoune, Cheu Yien Yep, Esma Aïmeur
2014Regularity Based Decentralized Social Networks.
Zhe Wang, Naftaly H. Minsky
2014Security of the Android Operating System.
Yury Zhauniarovich
2014SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks.
Andrea Burattin, Giuseppe Cascavilla, Mauro Conti
2014TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks.
Hana Fahim-Hashemi, Mohammad Zulkernine, Komminist Weldemariam
2014Towards a Full Support of Obligations in XACML.
Donia El Kateb, Yehia Elrakaiby, Tejeddine Mouelhi, Iram Rubab, Yves Le Traon
2014Two-Level Automated Approach for Defending Against Obfuscated Zero-Day Attacks.
Ratinder Kaur, Maninder Singh