NSS B

90 papers

YearTitle / Authors
2009A Comparison Between Rule Based and Association Rule Mining Algorithms.
Mohammed Md. Mazid, A. B. M. Shawkat Ali, Kevin S. Tickle
2009A Context-Aware Access Control Model for Pervasive Environments.
Sumayah Al-Rwais, Jalal Al-Muhtadi
2009A Cryptographically t-Private Auction System.
Markus Hinkelmann, Andreas Jakoby, Nina Moebius, Tiark Rompf, Peer Stechert
2009A Data Mining Approach for Detection of Self-Propagating Worms.
Mohd Fadzli Marhusin, Chris Lokan, Henry Larkin, David Cornforth
2009A Hierarchical Model for Cross-Domain Communication of Health Care Units.
Dimitris Geneiatakis, Costas Lambrinoudakis, Stefanos Gritzalis
2009A Messaging-Based System for Remote Server Administration.
Marco Ramilli, Marco Prandini
2009A Modified PSO Algorithm for Constrained Multi-objective Optimization.
Lily D. Li, Xinghuo Yu, Xiaodong Li, William W. Guo
2009A Multi-agent Security Architecture.
Rossilawati Sulaiman, Dharmendra Sharma, Wanli Ma, Dat Tran
2009A New Particle Swarm Optimization Algorithm for Neural Network Optimization.
Sai-Ho Ling, Hung T. Nguyen, Kit Yan Chan
2009A New Similarity Measure for the Anomaly Intrusion Detection.
Ahmed Belkhirat, Abdelghani Bouras, Abdelkader Belkhir
2009A Novel Fuzzy Identity-Based Signature with Dynamic Threshold.
Wei Chen, Li Zhu, Xiaomei Cao, Yang Geng
2009A Novel Grid Trust Model Based on Fuzzy Theory.
Shaomin Zhang, Yue Zou, Baoyi Wang
2009A Novel Quad-band Internal Antenna with Ni/Ag/Ni Structure for Wireless Mobile Handset.
Book-Sung Park, Dan Qi, Yanli Liu, Bolormaa Khurelbaatar, Chul-Ju Kim
2009A Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc Networks.
Yining Liu, Keqiu Li, Yong Zhang, Wenyu Qu
2009A Pseudonym-Based Signature Scheme for Dynamic Clusters in Ad Hoc Networks.
Yang Zhang
2009A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network Protocols.
Qin Li, Qingkai Zeng
2009A Self-Reflection Model for Autonomic Computing Systems Based on p-Calculus.
Huiqiang Wang, Hongwu Lv, Guangsheng Feng
2009A System for Distributed SELinux Policy Management.
Pedro Chávez Lugo, Juan Manuel Garcia Garcia, Juan J. Flores
2009ACSIS: Agents for Cooperative Secured Information Systems.
Leslie Huin, Danielle Boulanger, Eric Disson
2009An Approach to Leak Detection in Pipe Networks Using Analysis of Monitored Pressure Values by Support Vector Machine.
John Mashford, Dhammika De Silva, Donavan Marney, Stewart Burn
2009An Efficient Certificateless Encryption Scheme in the Standard Model.
Hua Guo, Xiyong Zhang, Yi Mu, Zhoujun Li
2009An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography.
Tohari Ahmad, Jiankun Hu, Song Han
2009An Evaluation of Secure Real-Time Transport Protocol (SRTP) Performance for VoIP.
Andre L. Alexander, Alexander L. Wijesinha, Ramesh K. Karne
2009An Extension of Differential Fault Analysis on AES.
Wei Li, Dawu Gu, Yong Wang, Juanru Li, Zhiqiang Liu
2009An Information Filtering Approach.
Nasim Vatani, Amir Masoud Rahmani, Mohammad Ebrahim Shiri
2009Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols.
Raphael C.-W. Phan, Wei-Chuen Yau, Bok-Min Goi
2009Architecture Design of High Efficient and Non-memory AES Crypto Core for WPAN.
Rong-Jian Chen, Yu-Cheng Peng, Jui-Lin Lai, Shi-Jinn Horng
2009Authentication in Peer-to-Peer Network: Survey and Research Directions.
Zhongwen Li, Xiaochen Xu, Liang Shi, Jian Liu, Chen Liang
2009Automatic Network Protocol Automaton Extraction.
Ming-Ming Xiao, Shun-Zheng Yu, Yu Wang
2009Building a SCADA Security Testbed.
Carlos Queiroz, Abdun Naser Mahmood, Jiankun Hu, Zahir Tari, Xinghuo Yu
2009Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network.
Piyi Yang, Zhenfu Cao, Xiaolei Dong
2009Changing Network Behavior.
Robert Koch
2009Characterising the Evolution in Scanning Activity of Suspicious Hosts.
Alif Wahid, Christopher Leckie, Chenfeng Vincent Zhou
2009Contextual Analysis Methods Capturing Knowledge Representation Related to the Reputation.
Miho Itoh
2009DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks.
Thaier Hayajneh, Prashant Krishnamurthy, David Tipper
2009Design of a Secure Router System for Next-Generation Networks.
Tilman Wolf, Russell Tessier
2009Determining Supply Chain Flexibility Using Statistics and Nueral Networks: A Comparative Study.
Ananda Jeeva, William W. Guo
2009Discovery of Exceptions: A Step towards Perfection.
Saroj Ratnoo, Kamal Kant Bharadwaj
2009Discriminating DDoS Flows from Flash Crowds Using Information Distance.
Shui Yu, Theerasak Thapngam, Jianwen Liu, Su Wei, Wanlei Zhou
2009Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics.
Ke Li, Wanlei Zhou, Ping Li, Jing Hai, Jianwen Liu
2009Distributed Agent Architecture for Intrusion Detection Based on New Metrics.
Farah Barika Ktata, Nabil El-Kadhi, Khaled Ghédira
2009Distributed Detection of Attacks in Mobile Ad Hoc Networks Using Learning Vector Quantization.
James Cannady
2009Early Breast Cancer Identification: Which Way to Go? Microarray or Image Based Computer Aided Diagnosis!.
Jesmin Nahar, Kevin S. Tickle, A. B. M. Shawkat Ali, Yi-Ping Phoebe Chen
2009Effective Attacks in the Tor Authentication Protocol.
Yang Zhang
2009Enhancing RFID Tag Resistance against Cloning Attack.
Jemal H. Abawajy
2009Enhancing Trust on e-Government: A Decision Fusion Module.
Bruno Lage Srur, Vallipuram Muthukkumarasamy
2009Enhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'.
Muhammad Khurram Khan
2009Error Correction of Noisy Block Cipher Using Cipher and Plaintext Characteristics.
Nabil M. K. Mirza, Ziad Osman, Rached N. Zantout, Mohamed El-Sayed
2009Exploit Kashida Adding to Arabic e-Text for High Capacity Steganography.
Ahmed Al-Nazer, Adnan Abdul-Aziz Gutub
2009Extended K-Anonymity Models Against Attribute Disclosure.
Xiaoxun Sun, Hua Wang, Lili Sun
2009F-TAD: Traffic Anomaly Detection for Sub-networks Using Fisher Linear Discriminant.
Hyunhee Park, Meejoung Kim, Chul-Hee Kang
2009FSS2-Id/A Fast Safe Identity-Based Multi Signature Scheme.
Sami Harari
2009Flexible Wireless Trust Through Ontology-Based Mapping and Its Attendant Semantic Limitations.
Robert Steele, Kyongho Min
2009Framework for Identification of Power System Operating Security Regions.
Mohamed A. El-Kady, Essam A. Al-Ammar
2009Functional Characteristics and Proposed Deployment Infrastructure of an Industrial Decision Support System within a Sugar Mill Crystallisation Stage.
Roland Dodd, Andrew Chiou, Xinghuo Yu, Ross Broadfoot
2009Generating Hierarchical Association Rules with the Use of Bayesian Network.
Khalid Iqbal, Sohail Asghar
2009Grid of Security: A New Approach of the Network Security.
Olivier Flauzac, Florent Nolot, Cyril Rabat, Luiz Angelo Steffenel
2009Guided Navigation Using Query Log Mining through Query Expansion.
Burcu Yurekli, Gökhan Çapan, Baris Yilmazel, Özgür Yilmazel
2009Hardware Trojan Horse Device Based on Unintended USB Channels.
John Clark, Sylvain P. Leblanc, Scott Knight
2009Harnessing the Power of P2P Systems for Fast Attack Signature Validation.
Spyros Antonatos, Quang Hieu Vu
2009HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing.
W. Y. Chin, Evangelos P. Markatos, Spyros Antonatos, Sotiris Ioannidis
2009Honeypot Traces Forensics: The Observation Viewpoint Matters.
Van-Hau Pham, Marc Dacier
2009If Cross-Functional Teams are the Answer, What is the Question?.
W. K. Daniel Pun, Ricardo Santa
2009Implementation and Analysis of Sensor Security Protocols in a Home Health Care System.
Kalvinder Singh, Vallipuram Muthukkumarasamy
2009Incentive-Based Self-Organized Public Key Management for Mobile Ad Hoc Networks.
Dakila Reyes II, Cedric Angelo M. Festin, Susan Pancho-Festin
2009Industrial Process Model Integration Using a Blackboard Model within a Pan Stage Decision Support System.
Roland Dodd, Andrew Chiou, Xinghuo Yu, Ross Broadfoot
2009Integrating Palmprint and Fingerprint for Identity Verification.
Yong Jian Chin, Thian Song Ong, Michael Kah Ong Goh, Bee Yan Hiew
2009Intrusion Detection System Using Self-Organizing Maps.
Mansour M. Alsulaiman, Aasem N. Alyahya, Raed A. Alkharboush, Nasser S. Alghafis
2009MagicNET: Security System for Development, Validation and Adoption of Mobile Agents.
Muhammad Awais Shibli, Sead Muftic, Alessandro Giambruno, Antonio Lioy
2009Novel Approaches for Detecting Frauds in Energy Consumption.
Fábio Fabris, Leticia Rosetti Margoto, Flávio Miguel Varejão
2009On Role Mappings for RBAC-Based Secure Interoperation.
Jinwei Hu, Ruixuan Li, Zhengding Lu
2009Policy-Driven Patch Management for Distributed Environments.
Jan Muhammad, Richard O. Sinnott
2009Practical Implementations for Securing VoIP Enabled Mobile Devices.
Chan Yeob Yeun, Salman Mohammed Al-Marzouqi
2009Property Based Attestation and Trusted Computing: Analysis and Challenges.
Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Eimear Gallery
2009Putting Simple Hierarchy into Ant Foraging: Cluster-Based Soft-Bots.
Wei Peng, Qingmai Wang, Bin Wang, Xinghuo Yu
2009Real-Time Data Mining Methodology and a Supporting Framework.
Xiong Deng, Moustafa Ghanem, Yike Guo
2009Scalable RFID Pseudonym Protocol.
Boyeon Song, Chris J. Mitchell
2009Secure Authenticated Key Establishment Protocol for Ad Hoc Networks.
A. John Prakash, V. Rhymend Uthariaraj
2009Secure Mobile Agents with Designated Hosts.
Qi Zhang, Yi Mu, Minjie Zhang, Robert Huijie Deng
2009Securing Roaming and Vertical Handover in Fourth Generation Networks.
Neila Krichene, Noureddine Boudriga
2009Self-Protection Model Based on Intelligent Agent.
Bing Sun, Ya-Ping Zhang, Ning Zhang
2009Significance of Computional Intelligence Method in Computer Networks.
Reginald Lal, Andrew Chiou
2009Speaker Verification Based on Different Vector Quantization Techniques with Gaussian Mixture Models.
Sheeraz Memon, Margaret Lech, Namunu Chinthaka Maddage
2009Speech Recognition Enhancement Using Beamforming and a Genetic Algorithm.
Kit Yan Chan, Siow Yong Low, Sven Nordholm, Ka Fai Cedric Yiu, Sai-Ho Ling
2009State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition.
Matús Harvan, Alexander Pretschner
2009Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009
Yang Xiang, Javier López, Haining Wang, Wanlei Zhou
2009Trusted Network Access Control in the Eduroam Federation.
Fernando Bernal-Hidalgo, Manuel Sánchez, Gabriel López, Antonio Fernandez Gómez-Skarmeta, Óscar Cánovas Reverte
2009Visualizing Global Patterns in Huge Digraphs.
Noel Henry Patson
2009Weakness on Cryptographic Schemes Based on Chained Codes.
Omessaad Hamdi, Ammar Bouallegue, Sami Harari
2009xDUCON: Coordinating Usage Control Policies in Distributed Domains.
Giovanni Russello, Naranker Dulay