SIN C

34 papers

YearTitle / Authors
2016A New Authentication Scheme for Cloud-based Storage Applications.
Manel Medhioub, Mohamed Hamdi, Tai-Hoon Kim
2016A Scalable Threats Classification Model in Information Systems.
Mouna Jouini, Latifa Ben Arfa Rabai
2016A Secure Multi-Tenant Framework for SDN.
Hao Jiang, Ahmed Bouabdallah, Amin Aflatoonian, Jean-Marie Bonnin, Karine Guillouard
2016A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm.
Robert Bronte, Hossain Shahriar, Hisham M. Haddad
2016A Study of a Smart IT Convergence Framework in IoT.
Hye-young Kim
2016A Study on Unified Security Mechanism and Platform for Centralized Business Contents.
Yong-pyo Hong, Youngjun Kim
2016Algorithms for network server anomaly behavior detection without traffic content inspection.
Vladimir Eliseev, Anastasiya Gurina
2016An Algorithm to Facilitate Intrusion Response in Mobile Ad Hoc Networks.
Jagjot Kaur, Dale Lindskog
2016An Attributed Graph Mining Approach to Detect Transfer Pricing Fraud.
Alexey A. Tselykh, Margarita Knyazeva, Elena Popkova, Antonina Durfee, Alexander N. Tselykh
2016An Efficient Secure scheme for Wireless Sensor Networks.
Manel Elleuchi, Omar Cheikhrouhou, Abdulfattah Mohammad Obeid, Mohamed Abid
2016An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol.
Goutham Reddy Alavalapati, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo
2016Applying Virtualization Technology for the Construction of Trusted Executable Environment.
Andrey Yu. Chernov, Artem S. Konoplev, Dmitry P. Zegzhda
2016Biometric Authentication Protocols on Smartphones: An Overview.
Martin Stokkenes, Ramachandra Raghavendra, Christoph Busch
2016Color Adaptive Quantized Patterns for Presentation Attack Detection in Ocular Biometric Systems.
Kiran B. Raja, Ramachandra Raghavendra, Christoph Busch
2016Criteria and Indices of Computer Network Protection.
Vladimir I. Vorobiev, Elena L. Evnevich, Roza R. Fatkieva, Ludmila N. Fedorchenko, Dmitriy K. Levonevskiy
2016Development of the Hierarchal Trust management System for Mobile Cluster-based Wireless Sensor Network.
Alexandr S. Basan, Elena Basan, Oleg B. Makarevich
2016Efficient Evaluation of Authorizations for Video Data.
Ussama Yakub, Vijayalakshmi Atluri, Jaideep Vaidya
2016Evolutionary Game-Based Defense Mechanism in the MANETs.
Myria Bouhaddi, Kamel Adi, Mohammed Said Radjef
2016Experimentation of Privacy Protection for JPEG Contents on Image-Sharing Platforms.
Kun He, Christophe Bidan, Gaëtan Le Guelvouit
2016Fast Implementation and Cryptanalysis of GOST R 34.12-2015 Block Ciphers.
Evgeniya Ishchukova, Ludmila K. Babenko, Maxim Anikeev
2016Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic Detection.
Giovanni Bottazzi, Giuseppe F. Italiano, Giuseppe Giulio Rutigliano
2016Fuzzy Commitment Scheme based on Reed Solomon Codes.
Sonam Chauhan, Ajay Sharma
2016Impact of Drug Abuse on Face Recognition Systems: A Preliminary Study.
Ramachandra Raghavendra, Kiran B. Raja, Christoph Busch
2016Integrating non elementary actions in access control models.
Salem Benferhat, Mouslim Tolba, Karim Tabia, Abdelkader Belkhir
2016Modeling of Algebraic Analysis of GOST+ Cipher in SageMath.
Ludmila K. Babenko, Ekaterina Maro, Maxim Anikeev
2016Participant Authenticating, Error Detecting, and 100% Multiple Errors Repairing Chang-Chen-Wang's Secret Sharing Method Enhancement.
Alexander G. Chefranov, Amir Narimani
2016Phishing Susceptibility Detection through Social Media Analytics.
Safwan Alam, Khalil El-Khatib
2016Preventive information flow control through a mechanism of split addresses.
Deepak Subramanian, Guillaume Hiet, Christophe Bidan
2016Privacy-preserving Electronic Road Pricing System for Multifare Low Emission Zones.
Roger Jardí-Cedó, Macià Mut Puigserver, Jordi Castellà-Roca, Magdalena Payeras-Capellà, Alexandre Viejo
2016Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016
2016Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing.
Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin, Alexander I. Pechenkin, Alexander Minin, Daria S. Lavrova
2016Security-enabled Enactment of Decentralized Workflows.
Sardar Hussain, Richard O. Sinnott, Ron Poet
2016Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units.
Xavier J. A. Bellekens, Greig Paul, Christos Tachtatzis, James Irvine, Robert C. Atkinson
2016The Improved Protocols Based on AODV in terms of Quality and Security in MANET Network.
Mohammadreza Soltan Aghaei, Elham Zamani