SIN C

41 papers

YearTitle / Authors
2010A DSL for intrusion detection based on constraint programming.
Pedro D. Salgueiro, Salvador Abreu
2010A calculus for the qualitative risk assessment of policy override authorization.
Steffen Bartsch
2010A collusion attack detection method for OLSR-based MANETS employing scruple packets.
P. Lalith Suresh, Rajbir Kaur, Manoj Singh Gaur, Vijay Laxmi
2010A distributed multi-approach intrusion detection system for web services.
Meisam S. A. Najjar, Mohammad Abdollahi Azgomi
2010A mobile IP based WLAN security management framework with reconfigurable hardware acceleration.
Soumya Maity, Padmalochan Bera, Soumya Kanti Ghosh
2010A novel defense mechanism against sybil attacks in VANET.
Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi
2010A trust quantification method based on grey fuzzy theory.
Shunan Ma, Jingsha He, Feng Gao, Yuqiang Zhang
2010An application of integral engineering technique to information security standards analysis and refinement.
Dmitry V. Cheremushkin, Alexander V. Lyubimov
2010Analysis of privacy in online social networks of runet.
Slava Kisilevich, Florian Mansmann
2010Automated method for constructing of network traffic filtering rules.
Evgeny Sergeevich Abramov, Denis Valerievich Mordvin, Oleg B. Makarevich
2010Bachelor of information security: ("automated systems security profile").
Alexander I. Tolstoy, Natalia G. Miloslavskaya
2010Cyber security quantification model.
M. Asif Khan, Mureed Hussain
2010Design and implementation of robust embedded processor for cryptographic applications.
Kazim Yumbul, Serdar Süer Erdem, Erkay Savas
2010Differential analysis of GOST encryption algorithm.
Lyudmila K. Babenko, Evgeniya Ishchukova
2010Digital camera identification based on rotated images.
Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich
2010Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing.
Abdulkadir Akin, Aydin Aysu, Onur Can Ulusel, Erkay Savas
2010Elgamal public key cryptosystem and signature scheme in GU(m, p, n).
Alexander G. Chefranov, Ahmed Y. Mahmoud
2010Estimation of influence of error correction and privacy amplification on keys generation rate in QKD systems.
Dmitry M. Golubchikov, Konstantin E. Rumiantsev
2010Evil maid goes after PGP whole disk encryption.
Alexander Tereshkin
2010Evolution of cryptographic hashing.
Josef Pieprzyk
2010FPGA based programmable embedded intrusion detection system.
Taner Tuncer, Yetkin Tatar
2010Homogeneity analysis of power consumption for information security purposes.
Tatiana V. Stepanova, Maxim O. Kalinin, Peter Baranov, Dmitry P. Zegzhda
2010Immune model based approach for network intrusion detection.
Vadim D. Kotov, Vladimir I. Vasilyev
2010Implementation and performance evaluation of the RSEP protocol on ARM and intel platforms.
Suleyman Kondakci, Gökhan Yilmaz
2010Improving first order differential power attacks through digital signal processing.
Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia
2010Integral engineering technique for information security methodologies.
Alexander V. Lyubimov
2010Key management with host mobility in dynamic groups.
Said Gharout, Abdelmadjid Bouabdallah, Mounir Kellil, Yacine Challal
2010MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API.
Vinod P. Nair, Harshit Jain, Yashwant K. Golecha, Manoj Singh Gaur, Vijay Laxmi
2010Ontological approach toward cybersecurity in cloud computing.
Takeshi Takahashi, Youki Kadobayashi, Hiroyuki Fujiwara
2010Ontology-based analysis of information security standards and capabilities for their harmonization.
Vladimir I. Vorobiev, Ludmila N. Fedorchenko, Vadim P. Zabolotsky, Alexander V. Lyubimov
2010Permanent protection of information systems with method of automated security and integrity control.
Maxim O. Kalinin
2010Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010
Oleg B. Makarevich, Atilla Elçi, Mehmet A. Orgun, Sorin A. Huss, Ludmila K. Babenko, Alexander G. Chefranov, Vijay Varadharajan
2010Protecting user privacy with multi-field anonymisation of ip addresses.
Carsten Schmoll, Nikolaos Chatzis, Christian Henke
2010Rating the raters: a reputation system for wiki-like domains.
Alexis Velarde Pantola, Susan Pancho-Festin, Florante Salvador
2010Reinforcement learning intellectual agent of protection for adapting to surrounding environment.
Iryna Borysivna Tregubenko
2010Review of european patents for methods of security system design.
Alexander Sergeevich Mosolov, Olga Viktorovna Grafova
2010Securing RFID-based authentication systems using ParseKey+.
Behnam Rahnama, Atilla Elçi, Selcuk Celik
2010The development of information security operational management system based on the intelligent technologies.
Irina V. Mashkina, Timur Kh. Tukhvatshin, Murat B. Guzairov
2010The weak and the strong password preferences: a case study on turkish users.
Ilker Korkmaz, Mehmet Emin Dalkiliç
2010Towards a system-wide and transparent security mechanism using language-level information flow control.
Mohammad Reza Azadmanesh, Mohsen Sharifi
2010Trust based multi-path routing for end to end secure data delivery in manets.
Poonam Gera, Kumkum Garg, Manoj Misra