SIN C

83 papers

YearTitle / Authors
2014A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated Intrusion Detection Systems.
Xavier J. A. Bellekens, Christos Tachtatzis, Robert C. Atkinson, Craig Renfrew, Tony Kirkham
2014A New Perspective to Information Security: Total Quality Information Security Management.
Mehrdad Sepehri Sharbaf
2014A Novel Authentication Scheme for Online Transactions.
Paraskevas Sarris, Lewis Mackenzie, Soumyadeb Chowdhury
2014A Privacy-Preserving E-Ticketing System for Public Transportation Supporting Fine-Granular Billing and Local Validation.
Ivan Gudymenko
2014A Protocol For Storage Limitations and Upgrades in Decentralised Networks.
Greig Paul, James Irvine
2014A Small Data Approach to Identification of Individuals on the Transport Layer using Statistical Behaviour Templates.
Sebastian Abt, Sebastian Gärtner, Harald Baier
2014An Approach of Privacy Preserving based Publishing in Twitter.
Amardeep Singh, Divya Bansal, Sanjeev Sofat
2014An Empirical Study of Smartphone Based Iris Recognition in Visible Spectrum.
Kiran B. Raja, Ramachandra Raghavendra, Christoph Busch, Soumik Mondal
2014An ID and Address Protection Unit for NoC based Communication Architectures.
Ahmed Saeed, Ali Ahmadinia, Mike Just, Christophe Bobda
2014An Order Preserving Encryption Scheme for Cloud Computing.
Vikas Jaiman, Gaurav Somani
2014An effectiveness of application of <<Capture The Flag>> competitions concept within higher education (Student contribution).
Artem Garkusha, Evgeny Sergeevich Abramov, Oleg B. Makarevich
2014Analysing Security requirements in Cloud-based Service Level Agreements.
Yogachandran Rahulamathavan, Pramod S. Pawar, Pete Burnap, Muttukrishnan Rajarajan, Omer F. Rana, George Spanoudakis
2014Analysis of Identity Forging Attack in MANETs.
Nishant Garg, Kuldeep Pareek, Manoj Singh Gaur, Vijay Laxmi, Chhagan Lal
2014Analyzing the Effectiveness of DoS Attacks on Tor.
Bernd Conrad, Fatemeh Shirazi
2014Applying Large-scale Adaptive Graphs to Modeling Internet of Things Security.
Tatiana V. Stepanova, Dmitry P. Zegzhda
2014Automated Session Fixation Vulnerability Detection in Web Applications using the Set-Cookie HTTP response header in cookies.
Rahul Kumar, Indraveni K, Aakash Kumar Goel
2014Autonomic management for convergent networks to support robustness of appliance technologies.
Ahmad Kamal Ramli, Karim Djemame
2014Bandwidth-Optimized Parallel Private Information Retrieval.
Ecem Ünal, Erkay Savas
2014Big Data Information Security Maintenance.
Natalia G. Miloslavskaya, Mikhail Senatorov, Alexander I. Tolstoy, Sergey Zapechnikov
2014CBR Clone Based Software Flaw Detection Issues.
Ali Reza Honarvar, Ashkan Sami
2014Challenges in developing Capture-HPC exclusion lists.
Mohammad Puttaroo, Peter Komisarczuk, Renato Cordeiro de Amorim
2014Classification of PE Files using Static Analysis.
Ashish Saini, Ekta Gandotra, Divya Bansal, Sanjeev Sofat
2014Compliance with standards, assurance and audit: does this equal security?
Bob Duncan, Mark Whittington
2014Content Provider Leakage Vulnerability Detection in Android Applications.
Hossain Shahriar, Hisham M. Haddad
2014Continuous Authentication using Fuzzy Logic.
Soumik Mondal, Patrick Bours
2014Cryptanalysis of Polynomial based Homomorphic Encryption.
Alina Trepacheva
2014Current Trends and the Future of Metamorphic Malware Detection.
Shahid Alam, Issa Traoré, Ibrahim Sogukpinar
2014Deploying Suitable Countermeasures to Solve the Security Problems within an E-learning Environment.
Neila Rjaibi, Latifa Ben Arfa Rabai
2014Design and Analysis of a New Hash Function Gear.
Mohammad A. AlAhmad, Imad Fakhri Alshaikhli
2014Detecting Malicious Users in Twitter using Classifiers.
Monika Singh, Divya Bansal, Sanjeev Sofat
2014Development of a Threat Model for Vehicular Ad-hoc Network based Accident Warning Systems.
Niaz Morshed Chowdhury, Lewis M. Mackenzie
2014Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis.
Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale
2014Dynamic Analysis of Web Objects.
Komminist Weldemariam, Hossain Shahriar, Vamshee Krishna Devendran
2014Educated Guessing Attacks on Culturally Familiar Graphical Passwords Using Personal Information on Social Networks.
Hani Moaiteq Aljahdali, Ron Poet
2014Efficient Protection of Response Messages in DTLS-Based Secure Multicast Communication.
Marco Tiloca
2014Employing Neural Networks for the Detection of SQL Injection Attack.
Naghmeh Moradpoor Sheykhkanloo
2014Exploring Worm Behaviors using DTW.
Smita Naval, Vijay Laxmi, Neha Gupta, Manoj Singh Gaur, Muttukrishnan Rajarajan
2014Exploring the Guessability of Image Passwords.
Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie
2014Framework for distributed virtual honeynets.
Peter Pisarcík, Pavol Sokol
2014GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing.
Xavier J. A. Bellekens, Christos Tachtatzis, Robert C. Atkinson, Craig Renfrew, Tony Kirkham
2014Group Key Exchange Protocol Based on Diffie-Hellman Technique in Ad-Hoc Network.
Maryam Farajzadeh-Zanjani, Seyed Masoud Alavi Abhari, Alexander G. Chefranov
2014HISEC: A New Lightweight Block Cipher Algorithm.
Sufyan Salim Mahmood AlDabbagh, Imad Fakhri Taha Al Shaikhli, Mohammad A. AlAhmad
2014HosTaGe: a Mobile Honeypot for Collaborative Defense.
Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer
2014Human Visualisation of Cryptographic Code Using Progressive Multi-Scale Resolution.
Alwyn Goh, Geong Sen Poh, Voon-Yee Vee, Kok Boon Chong, Xin Zhe Khooi, Chanan Zhuo Ern Loh, Zhi Yuan Eng
2014Identification and Detection of Phishing Emails Using Natural Language Processing Techniques.
Shivam Aggarwal, Vishal Kumar, S. D. Sudarsan
2014Implementation Aspects of MeterGoat, a Smart Meter Security Training Platform.
Parth Bhatt, Johny de Souza, Nelson Uto, Jefferson Capovilla, Jose Resende, Danilo Suiama
2014Implementation of Safety Techniques in a Cyber Domain.
Maria Evangelopoulou, Christopher W. Johnson
2014Implementation of an Adaptive Traffic-aware Firewall.
Ashok Singh Sairam, Rahul Kumar, Pratima Biswas
2014Improbable Differential Attacks on Serpent using Undisturbed Bits.
Cihangir Tezcan, Halil Kemal Taskin, Murat Demircioglu
2014In-Cloud Malware Analysis and Detection: State of the Art.
Shahid Alam, Ibrahim Sogukpinar, Issa Traoré, Yvonne Coady
2014Information Security Theory Development.
Anatoly Malyuk, Natalia G. Miloslavskaya
2014Instrumental System for Analysis of Information Systems Using Smart Cards Protection.
Ludmila K. Babenko, Oleg B. Makarevich, Dmitry Bespalov, Roman Chesnokov, Yaroslav Trubnikov
2014Integrated Framework for Classification of Malwares.
Ekta Gandotra, Divya Bansal, Sanjeev Sofat
2014Intrusion Detection System for Cloud Environment.
Hifaa Bait Baraka, Huaglory Tianfield
2014Isn't the Time Ripe for a Standard Ontology on Security of Information and Networks?
Atilla Elçi
2014Known Plaintexts Attack on Polynomial based Homomorphic Encryption.
Alina Trepacheva, Liudmila Babenko
2014Location Identity Based Content Security Scheme for Content Centric Networking.
Fawad Khan, Sarmad Ullah Khan, Muhammad Roman, Muhammad Usman Abbasi
2014Managing Mobile Device Security in Critical Infrastructure Sectors.
Chalee Vorakulpipat, Chantri Polprasert, Siwaruk Siwamogsatham
2014MapReduce: MR Model Abstraction for Future Security Study.
Ibrahim Lahmer, Ning Zhang
2014Mathematical Modelling of Identity, Identity Management and Other Related Topics.
Md Sadek Ferdous, Gethin Norman, Ron Poet
2014Mathematical model of the polyalphabetic information security system based on the normal generalized knapsack.
Valeriy O. Osipyan
2014Memory access time as entropy source for RNG.
Sergey Agafin, Anton Krasnopevtsev
2014Negotiation Based Framework for Attribute-Based Access Control Policy Evaluation.
Edward Caprin, Yan Zhang
2014Non-cryptographic Detection Approach and Countermeasure for JFDV Attack.
Avani Sharma, Rajbir Kaur
2014On the Possibility of Insider Threat Detection Using Physiological Signal Monitoring.
Abdulaziz Almehmadi, Khalil El-Khatib
2014Physical Dangers in the Cyber Security and Precautions to be Taken.
Ecir U. Küçüksille, Mehmet Ali Yalçinkaya, Ozan Uçar
2014Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations.
Peter Aufner, Georg Merzdovnik, Markus Huber, Edgar R. Weippl
2014Privacy Implications of Wearable Health Devices.
Greig Paul, James Irvine
2014Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014
Ron Poet, Muttukrishnan Rajarajan
2014Reverse Engineering of ARM Binaries Using Formal Transformations.
Tobias F. Pfeffer, Paula Herber, Jörg Schneider
2014Sector-Specific Tool for Information Security Risk Management in the Context of Telecommunications Regulation (Tool demo).
Nicolas Mayer, Jocelyn Aubert
2014Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster).
Hui Lin, Adam J. Slagell, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer
2014Symmetric Fully Homomorphic Encryption Using Decidable Matrix Equations.
Philipp Burtyka, Oleg B. Makarevich
2014The Botnet Revenue Model.
Giovanni Bottazzi, Gianluigi Me
2014The Uncertainty of Identity Toolset: Analysing Digital Traces for User Profiling.
Muhammad Adnan, Antonio Lima, Luca Rossi, Suresh Veluru, Paul A. Longley, Mirco Musolesi, Muttukrishnan Rajarajan
2014Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices.
Christoph Hochreiner, Markus Huber, Georg Merzdovnik, Edgar R. Weippl
2014Towards a HL7 based Metamodeling Integration Approach for Embracing the Privacy of Healthcare Patient Records Administration.
Christophe Feltus, Damien Nicolas, Claude Poupart
2014Towards an Innovative Systemic Approach of Risk Management.
Hervé Cholez, Christophe Feltus
2014Towards the Detection of Undetectable Metamorphic Malware.
Jikku Kuriakose, Vinod P.
2014Traversing symmetric NAT with predictable port allocation.
Dusan Klinec, Vashek Matyás
2014Trustworthiness of Identity Attributes.
Brian A. Soeder, K. Suzanne Barber
2014Users' Perceptions of Recognition-Based Graphical Passwords: A Qualitative Study on Culturally Familiar Graphical Passwords.
Hani Moaiteq Aljahdali, Ron Poet
2014Virtual Machine Introspection.
Thu Yein Win, Huaglory Tianfield, Quentin Mair, Taimur Al Said, Omer F. Rana