CRiSIS C

19 papers

YearTitle / Authors
2016Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers
Costas Lambrinoudakis, Alban Gabillon
2015A Literature Survey and Classifications on Data Deanonymisation.
Dalal Al-Azizy, David E. Millard, Iraklis Symeonidis, Kieron O'Hara, Nigel Shadbolt
2015A Meta-model for Assisting a Cloud Forensics Process.
Stavros Simou, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis
2015A Single Key Scheduling Based Compression Function.
Jiageng Chen, Rashed Mazumder, Atsuko Miyaji
2015Addressing Privacy and Trust Issues in Cultural Heritage Modelling.
Michalis Pavlidis, Haralambos Mouratidis, Cesar Gonzalez-Perez, Christos Kalloniatis
2015An Intensive Analysis of Security and Privacy Browser Add-Ons.
Nikolaos Tsalis, Alexios Mylonas, Dimitris Gritzalis
2015An Ontology Regulating Privacy Oriented Access Controls.
Maherzia Belaazi, Hanene Boussi Rahmouni, Adel Bouhoula
2015Attack Volume Model: Geometrical Approach and Application.
Gustavo Gonzalez Granadillo, Grégoire Jacob, Hervé Debar
2015Context Aware Intrusion Response Based on Argumentation Logic.
Tarek Bouyahia, Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens
2015Countermeasure Selection Based on the Attack and Service Dependency Graphs for Security Incident Management.
Elena Doynikova, Igor V. Kotenko
2015Exploring a Controls-Based Assessment of Infrastructure Vulnerability.
Oliver J. Farnan, Jason R. C. Nurse
2015Improving Users' Trust Through Friendly Privacy Policies: An Empirical Study.
Oluwa Lawani, Esma Aïmeur, Kimiz Dalkir
2015MBotCS: A Mobile Botnet Detection System Based on Machine Learning.
Xin Meng, George Spanoudakis
2015MPLS Policy Target Recognition Network.
Abdulrahman Al-Mutairi, Stephen D. Wolthusen
2015POR-2P: Network Coding-Based POR for Data Provision-Payment System.
Kazumasa Omote, Tran Phuong Thao
2015Quantifying Security in Web ETL Processes.
Salma Dammak, Faiza Ghozzi Jedidi, Faïez Gargouri
2015Quantitative Risk, Statistical Methods and the Four Quadrants for Information Security.
Gaute Wangen, Andrii Shalaginov
2015Security Issue of WirelessHART Based SCADA Systems.
Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens
2015Toward Securing MANET Against the Energy Depletion Attack.
Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi