SIN C

63 papers

YearTitle / Authors
2015A classification framework for distinct cyber-attacks based on occurrence patterns.
Malik S. K. Awan, Mohammed A. AlGhamdi, Sultan H. Almotiri, Pete Burnap, Omer F. Rana
2015A dynamic marking method for implicit information flow in dynamic taint analysis.
Xuefei Wang, Hengtai Ma, Lisha Jing
2015A graph-based data mining approach to preventing financial fraud: a case study.
Margarita Knyazeva, Alexander N. Tselykh, Alexey A. Tselykh, Elena Popkova
2015A honeypot-driven cyber incident monitor: lessons learned and steps ahead.
Emmanouil Vasilomanolakis, Shankar Karuppayah, Panayotis Kikiras, Max Mühlhäuser
2015A new algorithm for unkeyed jam resistance.
Hamid Hanifi, Leemon C. Baird III, Ramakrishna Thurimella
2015A perfect dynamic-id and biometric based remote user authentication scheme under multi-server environments using smart cards.
Subhasish Banerjee, Manash Pratim Dutta, Chandan Tilak Bhunia
2015A robust dynamic analysis system preventing SandBox detection by Android malware.
Jyoti Gajrani, Jitendra Sarswat, Meenakshi Tripathi, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti
2015Absolute key variation technique of automatic variable key in cryptography.
Rajat Subhra Goswami, Subhasish Banerjee, Manash Pratim Dutta, Chandan Tilak Bhunia
2015Access control model D-TBAC subject to the requirements to tasks' performing.
Sergey Lapin
2015An analytical processing approach to supporting cyber security compliance assessment.
Francesco Buccafurri, Lidia Fotia, Angelo Furfaro, Alfredo Garro, Matteo Giacalone, Andrea Tundis
2015Analysis of the impact of ethical issues on the management of the access rights.
André Rifaut, Christophe Feltus, Slim Turki, Djamel Khadraoui
2015Application of cluster analysis for the assessment of the share of fraud victims among bank card holders.
S. S. Alkhasov, Alexander N. Tselykh, Alexey A. Tselykh
2015Approbation of the methodology for web monitoring of terrorism- and extremism-related content.
Evstifeeva Natalia Alexandrovna, Evstifeeva Olga Urievna
2015Automatic vulnerability detection for weakness visualization and advisory creation.
Marian Gawron, Aragats Amirkhanyan, Feng Cheng, Christoph Meinel
2015Building data in motion DLP system from scratch using opensource software and confirming its effectiveness within "capture the flag" competitions.
Artem Garkusha
2015Case based analysis in information security incidents management system.
Andrey Shalyapin, Vadim Zhukov
2015Comparison between safety and efficient security of the ARP protocol.
Elvia León, Brayan S. Reyes Daza, Octavio J. Salcedo Parra
2015Cryptanalysis of factoring-based fully homomorphic encryption.
Ludmila K. Babenko, Alina Trepacheva
2015Cybersecurity of ad-hoc distributed systems.
Dmitry V. Moskvin, Denis Ivanov
2015DDoS/EDoS attack in cloud: affecting everyone out there!
Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi
2015DRACO: DRoid analyst combo an android malware analysis framework.
Shweta Bhandari, Rishabh Gupta, Vijay Laxmi, Manoj Singh Gaur, Akka Zemmari, Maxim Anikeev
2015Designing a context-aware cyber physical system for detecting security threats in motor vehicles.
Andrei Petrovski, Prapa Rattadilok, Sergey Petrovski
2015Developing a penetration test methodology in ensuring router security and testing it in a virtual laboratory.
Ecir Ugur Küçüksille, Mehmet Ali Yalçinkaya, Samet Ganal
2015Developing a system for text-messages protection.
Dmitry Mikhaylov, Andrey Starikovskiy, Grigoriy Lebedev, Dmitry Rubin, Alexey Egorov, Eugeniy Uleykin, Alexander Boruchinkin, Anastasia M. Tolstaya
2015Development of network security tools for enterprise software-defined networks.
Alexander Shukhman, Petr Polezhaev, Yuri Ushakov, Leonid Legashev, Veniamin N. Tarasov, Nadezhda F. Bakhareva
2015DynaDroid: dynamic binary instrumentation based app behavior monitoring framework.
Bharat Buddhdev, Rati Bhan, Manoj Singh Gaur, Vijay Laxmi
2015Dynamic response recognition by neural network to detect network host anomaly activity.
Vladimir Eliseev, Yury Shabalin
2015Execution of data-dependent programs over encrypted data.
Philipp Burtyka, Oleg B. Makarevich
2015Few notes towards making honeyword system more secure and usable.
Nilesh Chakraborty, Samrat Mondal
2015Hartley's test ranked opcodes for Android malware analysis.
Meenu Mary John, P. Vinod, K. A. Dhanya
2015Improved trust based key management for end-to-end secure communication in cellular networks.
Naila Mukhtar, Muhammad Shamim Baig, L. A. Khan
2015Improvement of treeless signature schemes implementation by random oracle buffering.
Maxim Anikeev
2015Information security in computer networks with dynamic topology.
Alexander Minin, Maxim O. Kalinin
2015Information security risk management in computer networks based on fuzzy logic and cost/benefit ratio estimation.
Igor Anikin, Lilia Yu. Emaletdinova
2015Information theoretic method for classification of packed and encoded files.
Jithu Raphel, P. Vinod
2015Labelled mobile ambients model for information flow security in distributed systems.
N. V. Narendra Kumar, R. K. Shyamasundar
2015Large-scale systems security evolution: control theory approach.
Tatiana V. Stepanova, Dmitry P. Zegzhda
2015Lightweight cryptography: modern development paradigms.
Alexey Zhukov
2015Machine learning approach for filtering spam emails.
Princy George, P. Vinod
2015Mathematical modelling of cryptosystems based on Diophantine problem with gamma superposition method.
Valeriy O. Osipyan
2015Mitigating conflicts of interest by authorization policies.
Nezar Nassr, Eric Steegmans
2015Modeling of next-generation firewalls as queueing services.
Sergey Zapechnikov, Natalia G. Miloslavskaya, Alexander I. Tolstoy
2015Modern techniques of function-level fault tolerance in MFM-systems.
Alexander Tarasov
2015Modern trends in the regulatory framework of the information security compliance assessment in Russia based on common criteria.
Alexander Barabanov, Alexey Markov
2015Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems.
Tatiana V. Stepanova, Alexander I. Pechenkin, Daria S. Lavrova
2015Problems of data protection in industrial corporations enterprise architecture.
Vladimir V. Glukhov, Igor V. Ilin, A. B. Anisiforov
2015Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015
Oleg B. Makarevich, Ron Poet, Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, Ludmila K. Babenko, Md Sadek Ferdous, Anthony T. S. Ho, Vijay Laxmi, Josef Pieprzyk
2015Profile-based students assignment to core financial intelligence unit departments.
Daria Chukova, Alexey Pakhomov
2015Protection from binary and multi-symbol packet length covert channels.
Anna Epishkina, Konstantin Kogos
2015Record linkage applications in health services research: opportunities and challenges.
Ramakrishna Thurimella, Rinku Dewri, William Mitchell
2015SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques.
Naghmeh Moradpoor Sheykhkanloo
2015Secure e-Learning portal for teaching business continuity and information security management.
Natalia G. Miloslavskaya, Alexander I. Tolstoy, Vladislav Petrov
2015Secure voice communication system with hardware encryption of data on hands-free headset.
A. Yu. Boruchinkin
2015Simulation user behavior on a security testbed using user behavior states graph.
Aragats Amirkhanyan, Andrey Sapegin, Marian Gawron, Feng Cheng, Christoph Meinel
2015Steganographic methods of communications in distributed computing networks.
Artem S. Konoplev, Alexey G. Busygin
2015Synthesis of secure software development controls.
Alexander Barabanov, Alexey Markov, Andrey Fadin, Valentin Tsirlov, Igor Shakhalov
2015The general model of secure computation system.
Ludmila K. Babenko, Philipp Burtyka, Oleg B. Makarevich, Alina Trepacheva
2015The use of mobile devices in authentication.
Ron Poet
2015Towards proactive detection of advanced persistent threat (APT) attacks using honeypots.
Zainab Saud, M. Hasan Islam
2015Trust management system for mobile cluster-based wireless sensor network.
Evgeny Sergeevich Abramov, Elena Basan, Oleg B. Makarevich
2015Two formal problems of network security and a theory of boolean-valued flow networks.
Evgeny Shcherba
2015Web service for detecting credit card fraud in near real-time.
Alexey A. Tselykh, Dmitry Petukhov
2015sandFOX: secure sandboxed and isolated environment for firefox browser.
Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Priyadarsi Nanda