| 2010 | A DSL for intrusion detection based on constraint programming. Pedro D. Salgueiro, Salvador Abreu |
| 2010 | A calculus for the qualitative risk assessment of policy override authorization. Steffen Bartsch |
| 2010 | A collusion attack detection method for OLSR-based MANETS employing scruple packets. P. Lalith Suresh, Rajbir Kaur, Manoj Singh Gaur, Vijay Laxmi |
| 2010 | A distributed multi-approach intrusion detection system for web services. Meisam S. A. Najjar, Mohammad Abdollahi Azgomi |
| 2010 | A mobile IP based WLAN security management framework with reconfigurable hardware acceleration. Soumya Maity, Padmalochan Bera, Soumya Kanti Ghosh |
| 2010 | A novel defense mechanism against sybil attacks in VANET. Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi |
| 2010 | A trust quantification method based on grey fuzzy theory. Shunan Ma, Jingsha He, Feng Gao, Yuqiang Zhang |
| 2010 | An application of integral engineering technique to information security standards analysis and refinement. Dmitry V. Cheremushkin, Alexander V. Lyubimov |
| 2010 | Analysis of privacy in online social networks of runet. Slava Kisilevich, Florian Mansmann |
| 2010 | Automated method for constructing of network traffic filtering rules. Evgeny Sergeevich Abramov, Denis Valerievich Mordvin, Oleg B. Makarevich |
| 2010 | Bachelor of information security: ("automated systems security profile"). Alexander I. Tolstoy, Natalia G. Miloslavskaya |
| 2010 | Cyber security quantification model. M. Asif Khan, Mureed Hussain |
| 2010 | Design and implementation of robust embedded processor for cryptographic applications. Kazim Yumbul, Serdar Süer Erdem, Erkay Savas |
| 2010 | Differential analysis of GOST encryption algorithm. Lyudmila K. Babenko, Evgeniya Ishchukova |
| 2010 | Digital camera identification based on rotated images. Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich |
| 2010 | Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing. Abdulkadir Akin, Aydin Aysu, Onur Can Ulusel, Erkay Savas |
| 2010 | Elgamal public key cryptosystem and signature scheme in GU(m, p, n). Alexander G. Chefranov, Ahmed Y. Mahmoud |
| 2010 | Estimation of influence of error correction and privacy amplification on keys generation rate in QKD systems. Dmitry M. Golubchikov, Konstantin E. Rumiantsev |
| 2010 | Evil maid goes after PGP whole disk encryption. Alexander Tereshkin |
| 2010 | Evolution of cryptographic hashing. Josef Pieprzyk |
| 2010 | FPGA based programmable embedded intrusion detection system. Taner Tuncer, Yetkin Tatar |
| 2010 | Homogeneity analysis of power consumption for information security purposes. Tatiana V. Stepanova, Maxim O. Kalinin, Peter Baranov, Dmitry P. Zegzhda |
| 2010 | Immune model based approach for network intrusion detection. Vadim D. Kotov, Vladimir I. Vasilyev |
| 2010 | Implementation and performance evaluation of the RSEP protocol on ARM and intel platforms. Suleyman Kondakci, Gökhan Yilmaz |
| 2010 | Improving first order differential power attacks through digital signal processing. Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia |
| 2010 | Integral engineering technique for information security methodologies. Alexander V. Lyubimov |
| 2010 | Key management with host mobility in dynamic groups. Said Gharout, Abdelmadjid Bouabdallah, Mounir Kellil, Yacine Challal |
| 2010 | MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API. Vinod P. Nair, Harshit Jain, Yashwant K. Golecha, Manoj Singh Gaur, Vijay Laxmi |
| 2010 | Ontological approach toward cybersecurity in cloud computing. Takeshi Takahashi, Youki Kadobayashi, Hiroyuki Fujiwara |
| 2010 | Ontology-based analysis of information security standards and capabilities for their harmonization. Vladimir I. Vorobiev, Ludmila N. Fedorchenko, Vadim P. Zabolotsky, Alexander V. Lyubimov |
| 2010 | Permanent protection of information systems with method of automated security and integrity control. Maxim O. Kalinin |
| 2010 | Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010 Oleg B. Makarevich, Atilla Elçi, Mehmet A. Orgun, Sorin A. Huss, Ludmila K. Babenko, Alexander G. Chefranov, Vijay Varadharajan |
| 2010 | Protecting user privacy with multi-field anonymisation of ip addresses. Carsten Schmoll, Nikolaos Chatzis, Christian Henke |
| 2010 | Rating the raters: a reputation system for wiki-like domains. Alexis Velarde Pantola, Susan Pancho-Festin, Florante Salvador |
| 2010 | Reinforcement learning intellectual agent of protection for adapting to surrounding environment. Iryna Borysivna Tregubenko |
| 2010 | Review of european patents for methods of security system design. Alexander Sergeevich Mosolov, Olga Viktorovna Grafova |
| 2010 | Securing RFID-based authentication systems using ParseKey+. Behnam Rahnama, Atilla Elçi, Selcuk Celik |
| 2010 | The development of information security operational management system based on the intelligent technologies. Irina V. Mashkina, Timur Kh. Tukhvatshin, Murat B. Guzairov |
| 2010 | The weak and the strong password preferences: a case study on turkish users. Ilker Korkmaz, Mehmet Emin Dalkiliç |
| 2010 | Towards a system-wide and transparent security mechanism using language-level information flow control. Mohammad Reza Azadmanesh, Mohsen Sharifi |
| 2010 | Trust based multi-path routing for end to end secure data delivery in manets. Poonam Gera, Kumkum Garg, Manoj Misra |