| 2010 | A Dynamic Mutual RFID Authentication Model Preventing Unauthorized Third Party Access. Matthieu-P. Schapranow, Alexander Zeier, Hasso Plattner |
| 2010 | A Flexible and Efficient Alert Correlation Platform for Distributed IDS. Sebastian Roschke, Feng Cheng, Christoph Meinel |
| 2010 | A Framework for Monitoring SIP Enterprise Networks. Mohamed Nassar, Radu State, Olivier Festor |
| 2010 | A Node-based Trust Management Scheme for Mobile Ad-Hoc Networks. Raihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar |
| 2010 | A Novel Anonymization Technique to Trade Off Location Privacy and Data Integrity in Participatory Sensing Systems. M. Manzur Murshed, Tishna Sabrina, Anindya Iqbal, Kh Mahmudul Alam |
| 2010 | A Novel Approach to Dynamic ID-Based Remote User Authentication Scheme for Multi-server Environment. Min-Hua Shao, Ying-Chih Chin |
| 2010 | A Novel Threat Assessment Method for DDoS Early Warning Using Network Vulnerability Analysis. Qiang Liu, Jianping Yin, Zhiping Cai, Ming Zhu |
| 2010 | A Pivot-Based Distributed Pseudo Facial Image Retrieval in Manifold Spaces: An Efficiency Study. Yi Zhuang |
| 2010 | A Purpose Based Access Control in XML Databases System. Lili Sun, Hua Wang, Raj Jururajin, Sri Sriprakash |
| 2010 | A Query Processing Strategy for Conceptual Queries Based on Object-Role Modeling. António Rosado, João M. P. Cardoso |
| 2010 | A Rights Management Approach to Securing Data Distribution in Coalitions. Farzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini |
| 2010 | A Smoothing Evolutionary Algorithm with Circle Search for Global Optimization. Yuping Wang, Lei Fan |
| 2010 | A Software Watermarking Algorithm Based on Stack-State Transition Graph. Jinchao Xu, Guosun Zeng |
| 2010 | A Three-Factor Authenticated Key Agreement Scheme for SIP on Elliptic Curves. Eun-Jun Yoon, Kee-Young Yoo |
| 2010 | A Two-Step Mutual Authentication Protocol Based on Randomized Hash-Lock for Small RFID Networks. Kaleb Lee |
| 2010 | A View Based Access Control Model for SPARQL. Alban Gabillon, Léo Letouzey |
| 2010 | Adaptive Clustering with Feature Ranking for DDoS Attacks Detection. Lifang Zi, John Yearwood, Xinwen Wu |
| 2010 | Agent-Based Trusted On-Demand Routing Protocol for Mobile Ad Hoc Networks. Islam Tharwat Abdel-Halim, Hossam M. A. Fahmy, Ayman M. Bahaa El-Din, Mohamed H. El-Shafey |
| 2010 | An Approach to Specify Knowledge in Multi-agent Systems Using Petri Nets. Eder Mateus Nunes Gonçalves |
| 2010 | An Efficient and Effective Duplication Detection Method in Large Database Applications. Ji Zhang |
| 2010 | An Efficient and High Scalable Key Distribution Scheme for Mobile Ad Hoc Network through Mining Traffic Meta-data Patterns. Ahmad Jabas, Wael Abdulal, Ramachandram Sirandas |
| 2010 | An Improved PageRank Algorithm: Immune to Spam. Bing-Yuan Pu, Ting-Zhu Huang, Chun Wen |
| 2010 | An Improved Wavelet Analysis Method for Detecting DDoS Attacks. Liang Fu Lu, Mao Lin Huang, Mehmet A. Orgun, Jiawan Zhang |
| 2010 | Analysis of Credential Stealing Attacks in an Open Networked Environment. Aashish Sharma, Zbigniew Kalbarczyk, Ravishankar K. Iyer, James Barlow |
| 2010 | Automatic Generation of Assertions to Detect Potential Security Vulnerabilities in C Programs That Use Union and Pointer Types. Shamsul Kamal Ahmad Khalid, Jacob Zimmermann, Diane Corney, Colin J. Fidge |
| 2010 | Breaking Tor Anonymity with Game Theory and Data Mining. Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel, Alexandre Dulaunoy |
| 2010 | Business Process-Based Information Security Risk Assessment. Kobra Khanmohammadi, Siv Hilde Houmb |
| 2010 | CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd. Sheng Wen, Weijia Jia, Wei Zhou, Wanlei Zhou, Chuan Xu |
| 2010 | Certificateless Proxy Signature and Its Extension to Blind Signature. Raylin Tso, Xun Yi |
| 2010 | Cluster Based Rule Discovery Model for Enhancement of Government's Tobacco Control Strategy. Md. Shamsul Huda, John Yearwood, Ron Borland |
| 2010 | Command Evaluation in Encrypted Remote Sessions. Robert Koch, Gabi Dreo Rodosek |
| 2010 | Comparative Analysis of HTTP Anomaly Detection Algorithms: DFA vs N-Grams. Li Lin, Christopher Leckie, Chenfeng Vincent Zhou |
| 2010 | Computational Intelligence Utilisation in Simulation of Congestion Control in TCP/IP Edge Network. Reginald Lal, Andrew Chiou |
| 2010 | Credit Spread Option Pricing by Dynamic Copulas. Ping Li, Guangdong Huang |
| 2010 | DIPLOMA: Distributed Policy Enforcement Architecture for MANETs. Mansoor Alicherry, Angelos D. Keromytis |
| 2010 | Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network. Chaabane Abdelberi, Pere Manils, Mohamed Ali Kâafar |
| 2010 | Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features. Girija Chetty, Monica Biswas, Rashmi Singh |
| 2010 | Dynamic Trust Model for Federated Identity Management. Hao Gao, Jun Yan, Yi Mu |
| 2010 | Efficient Ideal Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR Operations. Chunli Lv, Xiaoqi Jia, Lijun Tian, Jiwu Jing, Mingli Sun |
| 2010 | Efficient Proof of Validity of Votes in Homomorphic E-Voting. Kun Peng, Feng Bao |
| 2010 | Energy Friendly Integrity for Network Coding in Wireless Sensor Networks. Anya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Claire Goursaud, Cédric Lauradoux, Marine Minier |
| 2010 | Exploratory Study to Explore the Role of ICT in the Process of Knowledge Management in an Indian Business Environment. Abdul Hafeez-Baig, Raj Gururajan, Heng-Sheng Tsai, Prema Sankaran |
| 2010 | Face Gender Recognition Based on 2D Principal Component Analysis and Support Vector Machine. Len Bui, Dat Tran, Xu Huang, Girija Chetty |
| 2010 | Fast IPTV Channel Switching Using Hot-View and Personalized Channel Preload over IEEE 802.16e. Chih-Lun Chou, Gwo-Jiun Horng, Sheng-Tzong Cheng |
| 2010 | Fingerprint Reference Point Determination Based on Orientation Features. Shan Juan Xie, Sook Yoon, Hui Gong, Jin Wook Shin, Dong Sun Park |
| 2010 | Five Criteria for Web-Services Security Architecture. Ronald G. Addie, Alan W. Colman |
| 2010 | Forensic Analysis of DoS Attack Traffic in MANET. Yinghua Guo, Ivan Lee |
| 2010 | Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010 Yang Xiang, Pierangela Samarati, Jiankun Hu, Wanlei Zhou, Ahmad-Reza Sadeghi |
| 2010 | Getting the Real-Time Precise Round-Trip Time for Stepping Stone Detection. Ping Li, Wanlei Zhou, Yini Wang |
| 2010 | Global Detection of Flooding-Based DDoS Attacks Using a Cooperative Overlay Network. Thaneswaran Velauthapillai, Aaron Harwood, Shanika Karunasekera |
| 2010 | HTTPSLock: Enforcing HTTPS in Unmodified Browsers with Cached Javascript. Adonis P. H. Fung, K. W. Cheung |
| 2010 | Hybrid Wrapper-Filter Approaches for Input Feature Selection Using Maximum Relevance and Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA). Md. Shamsul Huda, John Yearwood, Andrew Stranieri |
| 2010 | Identifying Legitimate Clients under Distributed Denial-of-Service Attacks. Steven Simpson, Adam T. Lindsay, David Hutchison |
| 2010 | Identity Based Self Delegated Signature - Self Proxy Signatures. S. Sharmila Deva Selvi, S. Sree Vivek, S. Gopi Nath, C. Pandu Rangan |
| 2010 | Ignorant Experts: Computer and Network Security Support from Internet Service Providers. Patryk Szewczyk, Craig Valli |
| 2010 | Improving Fuzz Testing Using Game Theory. Sheila Becker, Humberto J. Abdelnur, Jorge Lucángeli Obes, Radu State, Olivier Festor |
| 2010 | Information-Theoretic Detection of Masquerade Mimicry Attacks. Juan E. Tapiador, John A. Clark |
| 2010 | Luth: Composing and Parallelizing Midpoint Inspection Devices. Ion Alberdi, Vincent Nicomette, Philippe Owezarski |
| 2010 | Monitoring Heavy-Hitter Flows in High-Speed Network Concurrently. Fengyu Wang, Bin Gong, Shanqing Guo, Xiaofeng Wang |
| 2010 | Network Forensics in MANET: Traffic Analysis of Source Spoofed DoS Attacks. Yinghua Guo, Matthew Simon |
| 2010 | New Families of 2D & 3D Arrays for Sub-image Watermarking. Oscar Moreno, Andrew Z. Tirkel, Ron G. van Schyndel, Parampalli Udaya |
| 2010 | Novel Multi-bit Bitwise Adaptive Embedding Algorithms with Minimum Error for Data Hiding. Rong-Jian Chen, Yu-Cheng Peng, Jun-Jian Lin, Jui-Lin Lai, Shi-Jinn Horng |
| 2010 | On the Security of Identity Based Threshold Unsigncryption Schemes. S. Sharmila Deva Selvi, S. Sree Vivek, Chandrasekaran Pandu Rangan, S. Priti |
| 2010 | OntoPsic: Leveraging the Knowledge in the Treatment and Diagnosis of Telepsychiatry. Fabrício da Costa Dias, Ryan Ribeiro de Azevedo, Cleyton Mário de Oliveira Rodrigues, Eric Rommel Dantas Galvão, Guilherme Ataíde Dias, Roberto Souto Maior de Barros |
| 2010 | Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders' Knowledgebase. Qussai Yaseen, Brajendra Panda |
| 2010 | Overcoming Reputation and Proof-of-Work Systems in Botnets. Andrew White, Alan Tickle, Andrew J. Clark |
| 2010 | Password Entropy and Password Quality. Wanli Ma, John Campbell, Dat Tran, Dale Kleeman |
| 2010 | Privacy-Preserving Protocols for String Matching. Yonglong Luo, Lei Shi, Caiyun Zhang, Ji Zhang |
| 2010 | Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange. Xu Huang, Pritam Gajkumar Shah, Dharmendra Sharma |
| 2010 | RF-DNA Fingerprinting for Airport WiMax Communications Security. McKay D. Williams, Sheldon A. Munns, Michael A. Temple, Michael J. Mendenhall |
| 2010 | Reasoning about Relation Based Access Control. Alessandro Artale, Bruno Crispo, Fausto Giunchiglia, Fatih Turkmen, Rui Zhang |
| 2010 | Resource Selection from Distributed Semantic Web Stores. Ahmad Ali Iqbal, Maximilian Ott, Aruna Seneviratne |
| 2010 | Risk-Aware Framework for Activating and Deactivating Policy-Based Response. Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus |
| 2010 | Router and Link Admittance Control in the Optimized Link State Routing Protocol Version 2 (OLSRv2). Thomas H. Clausen, Ulrich Herberg |
| 2010 | Scalar Multiplication of a Dynamic Window with Fuzzy Controller for Elliptic Curve Cryptography. Xu Huang, John Campbell, Frank Gao |
| 2010 | Secure Communication in 802.11 Networks with a Novel Protocol Using Quantum Cryptography. Xu Huang, Shirantha Wijesekera, Dharmendra Sharma |
| 2010 | Securing Emergency Response Operations Using Distributed Trust Decisions. Peter Danner, Daniel M. Hein, Stefan Kraxberger |
| 2010 | Security Analysis of Yang et al.'s Practical Password-Based Two-Server Authentication and Key Exchange System. Xun Yi |
| 2010 | Security-Oriented Workflows for the Social Sciences. Richard O. Sinnott, Sardar Hussain |
| 2010 | Spatio-temporal Knowledge Discovery in Very Large METOC Data Sets. D. Marks, Elias Ioup, John Sample, Mahdi Abdelguerfi, Fady Qaddoura |
| 2010 | Specifying Usage Control Model with Object Constraint Language. Min Li, Hua Wang |
| 2010 | Systematic Clustering-Based Microaggregation for Statistical Disclosure Control. Md. Enamul Kabir, Hua Wang |
| 2010 | The Convergences of Multisplitting Parallel Methods for Non-Hermitian Positive Definite Systems. Chuan-Long Wang, Yan-Ping Wang |
| 2010 | The Design of Real-Time Adaptive Forensically Sound Secure Critical Infrastructure. Ray Hunt, Jill Slay |
| 2010 | The Enablers and Implementation Model for Mobile KMS in Australian Healthcare. Heng-Sheng Tsai, Raj Gururajan |
| 2010 | The Mobile Phone as a Multi OTP Device Using Trusted Computing. Mohammed Al Zomai, Audun Jøsang |
| 2010 | The PU-Tree: A Partition-Based Uncertain High-Dimensional Indexing Algorithm. Yi Zhuang |
| 2010 | Towards Identify Anonymization in Large Survey Rating Data. Xiaoxun Sun, Hua Wang |
| 2010 | Trust-Involved Access Control in Collaborative Open Social Networks. Hua Wang, Lili Sun |
| 2010 | Validating Denial of Service Vulnerabilities in Web Services. Suriadi Suriadi, Andrew J. Clark, Desmond Allan Schmidt |
| 2010 | vESP: A Video-Enabled Enterprise Search Platform. Pål Halvorsen, Dag Johansen, Bjørn Olstad, Tomas Kupka, Sverre Tennøe |