SIN C

51 papers

YearTitle / Authors
2009A UML profile for role-based access control.
Çagdas Cirit, Feza Buzluca
2009A model of mandatory access for current database management systems.
Alexandr S. Basan, Lyudmila K. Babenko, Oleg B. Makarevich
2009A scalable multi-core aware software architecture for high-performance network monitoring.
Mahdi Dashtbozorgi, Mohammad Abdollahi Azgomi
2009A secure architecture for P2PSIP-based communication systems.
Xianghan Zheng, Vladimir A. Oleshchuk
2009A semantic-based access control mechanism using semantic technologies.
Moussa Amir Ehsan, Morteza Amini, Rasool Jalili
2009A simple yet effective spam blocking method.
Gökhan Dalkiliç, Devrim Sipahi, Mehmet Hilal Özcanhan
2009AWGN based seed for random noise generator in ParseKey+.
Atilla Elçi, Behnam Rahnama
2009Adaptability infrastructure for bridging IT security evaluation and options theory.
Haider Abbas, Louise Yngström, Ahmed Hemani
2009An architectural approach for assessing system trust based on security policy specifications and security mechanisms.
Serif Bahtiyar, Murat Cihan, Mehmet Ufuk Çaglayan
2009An efficient and secure protocol for DTV broadcasts.
Ashutosh Saxena
2009An information security ontology incorporating human-behavioural implications.
Simon Edward Parkin, Aad P. A. van Moorsel, Robert Coles
2009An integrated approach to detect phishing mail attacks: a case study.
R. Suriya, K. Saravanan, Arunkumar Thangavelu
2009Application of artificial neural network in detection of DOS attacks.
Iftikhar Ahmad, Azween B. Abdullah, Abdullah Sharaf Alghamdi
2009Artificial immune system based intrusion detection system.
Vadim D. Kotov, Vladimir I. Vasilyev
2009Assured information sharing: concepts and issues.
Elisa Bertino
2009BEAN: a lightweight stream cipher.
Naveen Kumar, Shrikant Ojha, Kritika Jain, Sangeeta Lal
2009Buyer seller watermarking protocol for digital rights management.
Vijay Laxmi, Mudassar N. Khan, Sarath S. Kumar, Manoj Singh Gaur
2009DFA-based and SIMD NFA-based regular expression matching on cell BE for fast network traffic filtering.
Feodor Kulishov
2009Danger theory based SYN flood attack detection in autonomic network.
Sanjay Rawat, Ashutosh Saxena
2009Deployed sensor networks and their security challenges in practice.
Erdal Cayirci
2009Design of a zigbee-based RFID network for industry applications.
Sumi M., Ebrahim A. Soujeri, Rahim Rajan, Harikrishnan A. I.
2009Digital sound card identification based on recording path imperfections.
Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich, Anatolij Chumachenko
2009Effective pair-wise key establishment scheme for wireless sensor networks.
Somanath Tripathy
2009Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit.
Kazim Yumbul, Erkay Savas
2009Embedded systems for IT security applications: properties and design considerations.
Sorin Alexander Huss
2009Ensuring information security controls for the Russian banking organizations.
Andrey P. Kurilo, Natalia G. Miloslavskaya, Svetlana Tolstaya
2009Evolution and challenges in trust and security in information system infrastructures.
Vijay Varadharajan
2009Extended electronic signature policies.
Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda
2009Fortifying the dalì attack on digital signature.
Francesco Buccafurri, Gianluca Caminiti, Gianluca Lax
2009Hill cipher modification based on eigenvalues HCM-EE.
Ahmed Y. Mahmoud, Alexander G. Chefranov
2009Improving risk assessment methodology: a statistical design of experiments approach.
Anand Singh, David J. Lilja
2009Information security incident management process.
Anna Kostina, Natalia G. Miloslavskaya, Alexander I. Tolstoy
2009Modeling network security competence for certification.
Tomi O. Kelo, Jukka A. Koskinen
2009New approach to evaluate the effectiveness of the audio information protection for determining the identity of virtual speech images.
Vladimir Kotenko, Alexey Evseev, Stas Kotenko, Konstantin E. Rumyantsev
2009Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009
Atilla Elçi, Oleg B. Makarevich, Mehmet A. Orgun, Alexander G. Chefranov, Josef Pieprzyk, Yuri Anatolievich Bryukhomitsky, Siddika Berna Örs
2009Pure e-learning course in information security.
Jukka A. Koskinen, Tomi O. Kelo
2009Pushing the limits of one-time signatures.
Kemal Bicakci
2009Research and Education Activities of the Department of Security of Information Technologies of Taganrog Institute of Technology of the Southern Federal University in the Field of Information Security.
Oleg B. Makarevich, Lyudmila K. Babenko
2009Resiliency of open-source firewalls against remote discovery of last-matching rules.
Khaled Salah, Karim Sattar, Zubair A. Baig, Mohammed H. Sqalli, Prasad Calyam
2009Secure many to many routing for wireless sensor and actuator networks.
Erdal Cayirci, Son Thanh Nguyen, Chunming Rong
2009Security against DOS attack in mobile IP communication.
Sazia Parvin, Shohrab Ali, Song Han, Tharam S. Dillon
2009Spam filter optimality based on signal detection theory.
Kuldeep Singh, Audun Jøsang, Md Sadek Ferdous, Ravishankar Borgaonkar
2009Static CFG analyzer for metamorphic Malware code.
Vinod P. Nair, Vijay Laxmi, Manoj Singh Gaur, G. V. S. S. Phani Kumar, Yadvendra S. Chundawat
2009The hush cryptosystem.
Sari Haj Hussein
2009The method of interval estimation in risk-analysis system.
Vladimir Mikhailovich Shishkin, Sergey Vitalievich Savkov
2009Trace and revoke systems with short ciphertexts.
Lie Liu, Chun Yuan
2009TrueIP: prevention of IP spoofing attacks using identity-based cryptography.
Christian Schridde, Matthew Smith, Bernd Freisleben
2009Trust based traffic monitoring approach for preventing denial of service attacks.
Jayashree Padmanabhan, K. S. Easwarakumar, Gokul B., Harishankar S.
2009Turkish national electronic identity card.
Mücahit Mutlugün, Oktay Adalier
2009Weakening the Dolev-Yao model through probability.
Riccardo Bresciani, Andrew Butterfield
2009XML-based policy specification framework for spatiotemporal access control.
Samrat Mondal, Shamik Sural