NSS B

91 papers

YearTitle / Authors
2010A Dynamic Mutual RFID Authentication Model Preventing Unauthorized Third Party Access.
Matthieu-P. Schapranow, Alexander Zeier, Hasso Plattner
2010A Flexible and Efficient Alert Correlation Platform for Distributed IDS.
Sebastian Roschke, Feng Cheng, Christoph Meinel
2010A Framework for Monitoring SIP Enterprise Networks.
Mohamed Nassar, Radu State, Olivier Festor
2010A Node-based Trust Management Scheme for Mobile Ad-Hoc Networks.
Raihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar
2010A Novel Anonymization Technique to Trade Off Location Privacy and Data Integrity in Participatory Sensing Systems.
M. Manzur Murshed, Tishna Sabrina, Anindya Iqbal, Kh Mahmudul Alam
2010A Novel Approach to Dynamic ID-Based Remote User Authentication Scheme for Multi-server Environment.
Min-Hua Shao, Ying-Chih Chin
2010A Novel Threat Assessment Method for DDoS Early Warning Using Network Vulnerability Analysis.
Qiang Liu, Jianping Yin, Zhiping Cai, Ming Zhu
2010A Pivot-Based Distributed Pseudo Facial Image Retrieval in Manifold Spaces: An Efficiency Study.
Yi Zhuang
2010A Purpose Based Access Control in XML Databases System.
Lili Sun, Hua Wang, Raj Jururajin, Sri Sriprakash
2010A Query Processing Strategy for Conceptual Queries Based on Object-Role Modeling.
António Rosado, João M. P. Cardoso
2010A Rights Management Approach to Securing Data Distribution in Coalitions.
Farzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini
2010A Smoothing Evolutionary Algorithm with Circle Search for Global Optimization.
Yuping Wang, Lei Fan
2010A Software Watermarking Algorithm Based on Stack-State Transition Graph.
Jinchao Xu, Guosun Zeng
2010A Three-Factor Authenticated Key Agreement Scheme for SIP on Elliptic Curves.
Eun-Jun Yoon, Kee-Young Yoo
2010A Two-Step Mutual Authentication Protocol Based on Randomized Hash-Lock for Small RFID Networks.
Kaleb Lee
2010A View Based Access Control Model for SPARQL.
Alban Gabillon, Léo Letouzey
2010Adaptive Clustering with Feature Ranking for DDoS Attacks Detection.
Lifang Zi, John Yearwood, Xinwen Wu
2010Agent-Based Trusted On-Demand Routing Protocol for Mobile Ad Hoc Networks.
Islam Tharwat Abdel-Halim, Hossam M. A. Fahmy, Ayman M. Bahaa El-Din, Mohamed H. El-Shafey
2010An Approach to Specify Knowledge in Multi-agent Systems Using Petri Nets.
Eder Mateus Nunes Gonçalves
2010An Efficient and Effective Duplication Detection Method in Large Database Applications.
Ji Zhang
2010An Efficient and High Scalable Key Distribution Scheme for Mobile Ad Hoc Network through Mining Traffic Meta-data Patterns.
Ahmad Jabas, Wael Abdulal, Ramachandram Sirandas
2010An Improved PageRank Algorithm: Immune to Spam.
Bing-Yuan Pu, Ting-Zhu Huang, Chun Wen
2010An Improved Wavelet Analysis Method for Detecting DDoS Attacks.
Liang Fu Lu, Mao Lin Huang, Mehmet A. Orgun, Jiawan Zhang
2010Analysis of Credential Stealing Attacks in an Open Networked Environment.
Aashish Sharma, Zbigniew Kalbarczyk, Ravishankar K. Iyer, James Barlow
2010Automatic Generation of Assertions to Detect Potential Security Vulnerabilities in C Programs That Use Union and Pointer Types.
Shamsul Kamal Ahmad Khalid, Jacob Zimmermann, Diane Corney, Colin J. Fidge
2010Breaking Tor Anonymity with Game Theory and Data Mining.
Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel, Alexandre Dulaunoy
2010Business Process-Based Information Security Risk Assessment.
Kobra Khanmohammadi, Siv Hilde Houmb
2010CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd.
Sheng Wen, Weijia Jia, Wei Zhou, Wanlei Zhou, Chuan Xu
2010Certificateless Proxy Signature and Its Extension to Blind Signature.
Raylin Tso, Xun Yi
2010Cluster Based Rule Discovery Model for Enhancement of Government's Tobacco Control Strategy.
Md. Shamsul Huda, John Yearwood, Ron Borland
2010Command Evaluation in Encrypted Remote Sessions.
Robert Koch, Gabi Dreo Rodosek
2010Comparative Analysis of HTTP Anomaly Detection Algorithms: DFA vs N-Grams.
Li Lin, Christopher Leckie, Chenfeng Vincent Zhou
2010Computational Intelligence Utilisation in Simulation of Congestion Control in TCP/IP Edge Network.
Reginald Lal, Andrew Chiou
2010Credit Spread Option Pricing by Dynamic Copulas.
Ping Li, Guangdong Huang
2010DIPLOMA: Distributed Policy Enforcement Architecture for MANETs.
Mansoor Alicherry, Angelos D. Keromytis
2010Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network.
Chaabane Abdelberi, Pere Manils, Mohamed Ali Kâafar
2010Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features.
Girija Chetty, Monica Biswas, Rashmi Singh
2010Dynamic Trust Model for Federated Identity Management.
Hao Gao, Jun Yan, Yi Mu
2010Efficient Ideal Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR Operations.
Chunli Lv, Xiaoqi Jia, Lijun Tian, Jiwu Jing, Mingli Sun
2010Efficient Proof of Validity of Votes in Homomorphic E-Voting.
Kun Peng, Feng Bao
2010Energy Friendly Integrity for Network Coding in Wireless Sensor Networks.
Anya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Claire Goursaud, Cédric Lauradoux, Marine Minier
2010Exploratory Study to Explore the Role of ICT in the Process of Knowledge Management in an Indian Business Environment.
Abdul Hafeez-Baig, Raj Gururajan, Heng-Sheng Tsai, Prema Sankaran
2010Face Gender Recognition Based on 2D Principal Component Analysis and Support Vector Machine.
Len Bui, Dat Tran, Xu Huang, Girija Chetty
2010Fast IPTV Channel Switching Using Hot-View and Personalized Channel Preload over IEEE 802.16e.
Chih-Lun Chou, Gwo-Jiun Horng, Sheng-Tzong Cheng
2010Fingerprint Reference Point Determination Based on Orientation Features.
Shan Juan Xie, Sook Yoon, Hui Gong, Jin Wook Shin, Dong Sun Park
2010Five Criteria for Web-Services Security Architecture.
Ronald G. Addie, Alan W. Colman
2010Forensic Analysis of DoS Attack Traffic in MANET.
Yinghua Guo, Ivan Lee
2010Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010
Yang Xiang, Pierangela Samarati, Jiankun Hu, Wanlei Zhou, Ahmad-Reza Sadeghi
2010Getting the Real-Time Precise Round-Trip Time for Stepping Stone Detection.
Ping Li, Wanlei Zhou, Yini Wang
2010Global Detection of Flooding-Based DDoS Attacks Using a Cooperative Overlay Network.
Thaneswaran Velauthapillai, Aaron Harwood, Shanika Karunasekera
2010HTTPSLock: Enforcing HTTPS in Unmodified Browsers with Cached Javascript.
Adonis P. H. Fung, K. W. Cheung
2010Hybrid Wrapper-Filter Approaches for Input Feature Selection Using Maximum Relevance and Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA).
Md. Shamsul Huda, John Yearwood, Andrew Stranieri
2010Identifying Legitimate Clients under Distributed Denial-of-Service Attacks.
Steven Simpson, Adam T. Lindsay, David Hutchison
2010Identity Based Self Delegated Signature - Self Proxy Signatures.
S. Sharmila Deva Selvi, S. Sree Vivek, S. Gopi Nath, C. Pandu Rangan
2010Ignorant Experts: Computer and Network Security Support from Internet Service Providers.
Patryk Szewczyk, Craig Valli
2010Improving Fuzz Testing Using Game Theory.
Sheila Becker, Humberto J. Abdelnur, Jorge Lucángeli Obes, Radu State, Olivier Festor
2010Information-Theoretic Detection of Masquerade Mimicry Attacks.
Juan E. Tapiador, John A. Clark
2010Luth: Composing and Parallelizing Midpoint Inspection Devices.
Ion Alberdi, Vincent Nicomette, Philippe Owezarski
2010Monitoring Heavy-Hitter Flows in High-Speed Network Concurrently.
Fengyu Wang, Bin Gong, Shanqing Guo, Xiaofeng Wang
2010Network Forensics in MANET: Traffic Analysis of Source Spoofed DoS Attacks.
Yinghua Guo, Matthew Simon
2010New Families of 2D & 3D Arrays for Sub-image Watermarking.
Oscar Moreno, Andrew Z. Tirkel, Ron G. van Schyndel, Parampalli Udaya
2010Novel Multi-bit Bitwise Adaptive Embedding Algorithms with Minimum Error for Data Hiding.
Rong-Jian Chen, Yu-Cheng Peng, Jun-Jian Lin, Jui-Lin Lai, Shi-Jinn Horng
2010On the Security of Identity Based Threshold Unsigncryption Schemes.
S. Sharmila Deva Selvi, S. Sree Vivek, Chandrasekaran Pandu Rangan, S. Priti
2010OntoPsic: Leveraging the Knowledge in the Treatment and Diagnosis of Telepsychiatry.
Fabrício da Costa Dias, Ryan Ribeiro de Azevedo, Cleyton Mário de Oliveira Rodrigues, Eric Rommel Dantas Galvão, Guilherme Ataíde Dias, Roberto Souto Maior de Barros
2010Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders' Knowledgebase.
Qussai Yaseen, Brajendra Panda
2010Overcoming Reputation and Proof-of-Work Systems in Botnets.
Andrew White, Alan Tickle, Andrew J. Clark
2010Password Entropy and Password Quality.
Wanli Ma, John Campbell, Dat Tran, Dale Kleeman
2010Privacy-Preserving Protocols for String Matching.
Yonglong Luo, Lei Shi, Caiyun Zhang, Ji Zhang
2010Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange.
Xu Huang, Pritam Gajkumar Shah, Dharmendra Sharma
2010RF-DNA Fingerprinting for Airport WiMax Communications Security.
McKay D. Williams, Sheldon A. Munns, Michael A. Temple, Michael J. Mendenhall
2010Reasoning about Relation Based Access Control.
Alessandro Artale, Bruno Crispo, Fausto Giunchiglia, Fatih Turkmen, Rui Zhang
2010Resource Selection from Distributed Semantic Web Stores.
Ahmad Ali Iqbal, Maximilian Ott, Aruna Seneviratne
2010Risk-Aware Framework for Activating and Deactivating Policy-Based Response.
Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus
2010Router and Link Admittance Control in the Optimized Link State Routing Protocol Version 2 (OLSRv2).
Thomas H. Clausen, Ulrich Herberg
2010Scalar Multiplication of a Dynamic Window with Fuzzy Controller for Elliptic Curve Cryptography.
Xu Huang, John Campbell, Frank Gao
2010Secure Communication in 802.11 Networks with a Novel Protocol Using Quantum Cryptography.
Xu Huang, Shirantha Wijesekera, Dharmendra Sharma
2010Securing Emergency Response Operations Using Distributed Trust Decisions.
Peter Danner, Daniel M. Hein, Stefan Kraxberger
2010Security Analysis of Yang et al.'s Practical Password-Based Two-Server Authentication and Key Exchange System.
Xun Yi
2010Security-Oriented Workflows for the Social Sciences.
Richard O. Sinnott, Sardar Hussain
2010Spatio-temporal Knowledge Discovery in Very Large METOC Data Sets.
D. Marks, Elias Ioup, John Sample, Mahdi Abdelguerfi, Fady Qaddoura
2010Specifying Usage Control Model with Object Constraint Language.
Min Li, Hua Wang
2010Systematic Clustering-Based Microaggregation for Statistical Disclosure Control.
Md. Enamul Kabir, Hua Wang
2010The Convergences of Multisplitting Parallel Methods for Non-Hermitian Positive Definite Systems.
Chuan-Long Wang, Yan-Ping Wang
2010The Design of Real-Time Adaptive Forensically Sound Secure Critical Infrastructure.
Ray Hunt, Jill Slay
2010The Enablers and Implementation Model for Mobile KMS in Australian Healthcare.
Heng-Sheng Tsai, Raj Gururajan
2010The Mobile Phone as a Multi OTP Device Using Trusted Computing.
Mohammed Al Zomai, Audun Jøsang
2010The PU-Tree: A Partition-Based Uncertain High-Dimensional Indexing Algorithm.
Yi Zhuang
2010Towards Identify Anonymization in Large Survey Rating Data.
Xiaoxun Sun, Hua Wang
2010Trust-Involved Access Control in Collaborative Open Social Networks.
Hua Wang, Lili Sun
2010Validating Denial of Service Vulnerabilities in Web Services.
Suriadi Suriadi, Andrew J. Clark, Desmond Allan Schmidt
2010vESP: A Video-Enabled Enterprise Search Platform.
Pål Halvorsen, Dag Johansen, Bjørn Olstad, Tomas Kupka, Sverre Tennøe