Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Teddy Mantoro, M. Iman Wahyudi, Media A. Ayu, Wendi Usino |
Real-Time Printed Document Authentication Using Watermarked QR Code. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nabil Laoufi |
From Risk Analysis to the Expression of Security Requirements for Systems Information. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chyquitha Danuputri, Teddy Mantoro, Mardi Hardjianto |
Data Security Using LSB Steganography and Vigenere Chiper in an Android Environment. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Hilmi Kamarudin, Carsten Maple, Tim Watson, Hasliza Sofian |
Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R Attacks. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Takumi Akiyama, Kazuya Otani, Yoshio Kakizaki, Ryôichi Sasaki |
Evaluation of a Risk-Based Management Method for Online Accounts. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kazuki Hashimoto, Hiroyuki Hiruma, Takashi Matsumoto, Kosetus Kayama, Yoshio Kaikizaki, Hiroshi Yamaki, Tetsutaro Uehara, Ryôichi Sasaki |
Development of Intellectual Network Forensic System LIFT against Targeted Attacks. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | P. D. Persadha, A. A. Waskita, S. Yazid |
Comparative Study of Cyber Security Policies among Malaysia, Australia, Indonesia: A Responsibility Perspective. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sriram Raghavan, S. V. Raghavan |
Estimating Posterior Probabilities to Identify Breach Points during Cyber-attacks. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Herny Ramadhani Mohd Husny Hamid, Norhaiza Ya Abdullah |
Physical Authentication Using Random Number Generated (RNG) Keypad Based on One Time Pad (OTP) Concept. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hyoseok Yoon, Se-Ho Park, Kyung-Taek Lee |
Exploiting Ambient Light Sensor for Authentication on Wearable Devices. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Budi Setiawan, Aries Syamsudin, Ashwin Sasongko Sastrosubroto |
Implementation of Secure Smart Grid as Critical Information Infrastructure in Indonesia: A Case Study in Smart Grid Electricity. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Makoto Sato, Akihiko Sugimoto, Naoki Hayashi, Yoshiaki Isobe, Ryôichi Sasaki |
Proposal of a Method for Identifying the Infection Route for Targeted Attacks Based on Malware Behavior in a Network. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dwiki Jatikusumo, Hanny Hikmayanti H., Feriadi, Wendi Usino |
Securing Official Account Twitter Using Social Media Management System: Accuracy of the Data and Information Publish with Twitter. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Victor Wahanggara, Yudi Prayudi |
Malware Detection through Call System on Android Smartphone Using Vector Machine Method. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mikhail Styugin |
Analysis of Awareness Structures in Information Security Systems. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Abdullah Said Alkalbani, Teddy Mantoro, Sardjoeni Moedjiono, Media A. Ayu |
Hybrid Solution for Secured and Energy Aware Routing Path in Wireless Sensor Networks. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Ahmad Abu Allawi, Ali Hadi, Arafat Awajan |
MLDED: Multi-layer Data Exfiltration Detection System. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | |
Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015 |
CyberSec |
2015 |
DBLP BibTeX RDF |
|
1 | Herny Ramadhani Mohd Husny Hamid, Megat Ahmad Izzat bin Megat Ahmad Kamil, Norhaiza Ya Abdullah |
Portable Toolkit for Penetration Testing and Firewall Configuration. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ryohei Koizumi, Ryôichi Sasaki |
Study on Countermeasures Using Mitigation Software against Vulnerability Attacks. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Delwar Alam, Md. Alamgir Kabir, Touhid Bhuiyan, Tanjila Farah |
A Case Study of SQL Injection Vulnerabilities Assessment of .bd Domain Web Applications. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Imran, Muhammad Tanvir Afzal, Muhammad Abdul Qadir 0001 |
Similarity-Based Malware Classification Using Hidden Markov Model. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Normaziah Abdul Aziz, Fakhrulrazi Mokhti, M. Nadhar M. Nozri |
Mobile Device Forensics: Extracting and Analysing Data from an Android-Based Smartphone. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Manh Cong Tran, Yasuhiro Nakamura |
An Approach to Mine Suspicious Domain Based on HTTP Automated Software Communication Behavior. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Naoto Nakagawa, Yoshimi Teshigawara, Ryôichi Sasaki |
Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Norhaiza Ya Abdullah, Herny Ramadhani Mohd Husny Hamid |
Folder Lock by Using Multimodal Biometric: Fingerprint and Signature Authentication. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ali Tamimi, D. Subbaram Naidu, Sanaz Kavianpour |
An Intrusion Detection System Based on NSGA-II Algorithm. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Luthfi, Yudi Prayudi |
Process Model of Digital Forensics Readiness Scheme (DFRS) as a Recommendation of Digital Evidence Preservation. |
CyberSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohd Najwadi Yusoff, Ramlan Mahmod, Mohd Taufik Abdullah, Ali Dehghantanha |
Mobile forensic data acquisition in Firefox OS. |
CyberSec |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zakaria Zakaria Hassan, Talaat A. Elgarf, Abdelhalim Zekry |
Modifying authentication techniques in mobile communication systems. |
CyberSec |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Eric Holm, Geraldine Mackenzie |
The importance of mandatory data breach notification to identity crime. |
CyberSec |
2014 |
DBLP DOI BibTeX RDF |
|
1 | |
Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014 |
CyberSec |
2014 |
DBLP BibTeX RDF |
|
1 | Iman Ahmeid Mohamed, Azizah Bt Abdul Manaf |
An enhancement of traceability model based-on scenario for digital forensic investigation process. |
CyberSec |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Neila Rjaibi, Nawel Gannouni, Latifa Ben Arfa Rabai, Anis Ben Aissa |
Modeling the propagation of security threats: An e-learning case study. |
CyberSec |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem |
Statistical analysis for random bits generation on quantum key distribution. |
CyberSec |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Heshem A. El Zouka, Mustafa M. Hosni |
On the power of quantum cryptography and computers. |
CyberSec |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Murdoch Watney |
Challenges pertaining to cyber war under international law. |
CyberSec |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohd Najwadi Yusoff, Ramlan Mahmod, Ali Dehghantanha, Mohd Taufik Abdullah |
An approach for forensic investigation in Firefox OS. |
CyberSec |
2014 |
DBLP DOI BibTeX RDF |
|
1 | M. Kaddour, Nourdine Ait Tmazirte, Maan El Badaoui El Najjar, Z. Naja, Nazih Moubayed |
Autonomous integrity monitoring for GNSS localization using informational approach and iono-free measurements. |
CyberSec |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Emsaieb Geepalla |
Comparison between Alloy and Timed Automata for modelling and analysing of access control specifications. |
CyberSec |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Victor R. Kebande, Hein S. Venter |
A cognitive approach for botnet detection using Artificial Immune System in the cloud. |
CyberSec |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiaomei Quan, Hongbin Zhang |
Copy-move forgery detection in digital images based on local dimension estimation. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Bilal Al Sabbagh, Stewart Kowalski |
ST(CS)2 - Featuring socio-technical cyber security warning systems. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ida Madieha bt. Abdul Ghani Azmi, Sonny Zulhuda, Sigit Puspito Wigati Jarot |
Data breach on the critical information infrastructures: Lessons from the Wikileaks. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ghassan Samara, Wafaa A. H. Ali Alsalihy |
A new security mechanism for vehicular communication networks. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ala A. Abdulrazeg, Norita Md Norwawi, Nurlida Basir |
Security metrics to improve misuse case model. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Latifa Ben Arfa Rabai, Mouna Jouini, Marwa Nafati, Anis Ben Aissa, Ali Mili 0001 |
An economic model of security threats for cloud computing systems. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Caiyi Zhu, Xiangkun Dai |
Model of trust management based on finite state machine. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Edna Dias Canedo, Rafael Timóteo de Sousa Júnior, Rhandy Rafhael de Carvalho, Robson de Oliveira Albuquerque |
Trust model for private cloud. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Maryam Savari, Mohammad Montazerolzohour, Eng-Thiam Yeoh |
Combining encryption methods in multipurpose smart card. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Liam Smit, Adrie Stander, Jacques Ophoff |
Investigating the accuracy of base station information for estimating cellphone location. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Acklyn Murray, Sherali Zeadally, Angelyn Flowers |
An assessment of U.S. legislation on cybersecurity. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Warusia Yassin, Nur Izura Udzir, Zaiton Muda, Azizol Abdullah, Mohd Taufik Abdullah |
A Cloud-based Intrusion Detection Service framework. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohsen Damshenas, Ali Dehghantanha, Ramlan Mahmoud, Solahuddin bin Shamsuddin |
Forensics investigation challenges in cloud computing environments. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Huyam Al-Amro, Eyas El-Qawasmeh |
Discovering security vulnerabilities and leaks in ASP.NET websites. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa |
How secure is your smartphone: An analysis of smartphone security mechanisms. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alireza Tamjidyamcholo |
Information security risk reduction based on genetic algorithm. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohd Anuar Mat Isa, Jamalul-lail Ab Manan, Ramlan Mahmod, Habibah Hashim, Mar Yah Said, Nur Izura Udzir, Ali Dehghantanha |
Finest authorizing member of common criteria certification. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | M. P. Azuwa, Rabiah Ahmad, Shahrin Sahib, Solahuddin Shamsuddin |
A propose technical security metrics model for SCADA systems. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ramya Dharam, Sajjan G. Shiva |
Runtime monitors for tautology based SQL injection attacks. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sina Manavi, Sadra Mohammadalian, Nur Izura Udzir, Azizol Abdullah |
Hierarchical secure virtualization model for cloud. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | K. SuganyaDevi, N. Malmurugan, R. Sivakumar |
OF-SMED: An optimal foreground detection method in surveillance system for traffic monitoring. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Salasiah Sulaiman, Zaiton Muda, Julia Juremi |
The new approach of Rijndael key schedule. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Davoud Mougouei, Wan Nurhayati Wan Ab. Rahman, Mohammad Moein Almasi |
Evaluating fault tolerance in security requirements of web services. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kee-Won Kim, Jun-Cheol Jeon |
Cellular semi-systolic Montgomery Multiplier on finite fields. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Farhood Norouzizadeh Dezfouli, Ali Dehghantanha, Ramlan Mahmoud, Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin |
Volatile memory acquisition using backup for forensic investigation. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jung-Ho Eom, Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung |
Cyber military strategy for cyberspace superiority in cyber warfare. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Newton Howard, Sergey Kanareykin |
Intention awareness in cyber security. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Somdip Dey |
SD-EI: A cryptographic technique to encrypt images. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Solmaz Salehian, Farzaneh Masoumiyan, Nur Izura Udzir |
Energy-efficient intrusion detection in Wireless Sensor Network. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xiangkun Dai, Caiyi Zhu, Yucui Guo |
P2P dynamic trust management system based on trust network. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kamarularifin Abd. Jalil, Qatrunnada Binti Abdul Rahman |
Multiple trusted devices authentication protocol for ubiquitous computing applications. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Abdullahi Arabo, Fadi El-Moussa 0001 |
Security framework for smart devices. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Maryam Savari, Mohammad Montazerolzohour |
All about encryption in smart card. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Faiz Liew Abdullah, A. Z. Yonis |
Performance of LTE Release 8 and Release 10 in wireless communications. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ali Alkhalifah, John D'Ambra |
The role of Identity Management Systems in enhancing protection of user privacy. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Salah Bindahman, Nasriah Zakaria, Norsaadah Zakaria |
3D body scanning technology: Privacy and ethical issues. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Maryam Tanha, Seyed Dawood Sajjadi Torshizi, Mohd Taufik Abdullah, Fazirulhisyam Hashim |
An overview of attacks against digital watermarking and their respective countermeasures. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Enos K. Mabuto, Hein S. Venter |
User-generated digital forensic evidence in graphic design applications. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | S. A. I. Yazid, M. A. Faizal, Rabiah Ahmad, S. Shahrin, Solahuddin Shamsuddin |
Enhancement of Asset value classification for Mobile devices. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hadi KhorasaniZadeh, Norbik Bashah Idris, Jamalul-lail Ab Manan |
Distributed Intrusion Detection trust management through integrity and expertise evaluation. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Majid Nasirinejad, Alireza Ahmadian Yazdi |
SASy username and password management on the cloud. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sumit Kumar, Shashikala Tapaswi |
A centralized detection and prevention technique against ARP poisoning. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Julia Juremi, Ramlan Mahmod, Salasiah Sulaiman |
A proposal for improving AES S-box with rotation and key-dependent. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fakariah Hani Mohd Ali, Rozita Yunos, Mohd Azuan Mohamad Alias |
Simple port knocking method: Against TCP replay attack and port scanning. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir, Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin |
Towards secure model for SCADA systems. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Abusukhon, Mohammad Talib |
A novel network security algorithm based on private key encryption. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Ibrahim 0003, Mohd Taufik Abdullah, Ali Dehghantanha |
VoIP evidence model: A new forensic method for investigating VoIP malicious attacks. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Maryam Savari, Mohammad Montazerolzohour, Eng-Thiam Yeoh |
Comparison of ECC and RSA algorithm in multipurpose smart card application. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Thilla Rajaretnam |
The problem to consent to the collection, use, and disclosure of personal information in cyberspace. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Rabiah Ahmad, Zahri Yunos, Shahrin Sahib |
Understanding cyber terrorism: The grounded theory method applied. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hamed Khiabani, Norbik Bashah Idris, Jamalul-lail Ab Manan |
Leveraging Remote Attestation to enhance the Unified Trust Model for WSNs. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Mahboubian, Nur Izura Udzir, Shamala Subramaniam, Nor Asilah Wati Abdul Hamid |
An alert fusion model inspired by artificial immune system. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mark Evered |
A transitive access control model for dynamic roles and attributes. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fazli Bin Mat Nor, Kamarularifin Abd. Jalil, Jamalul-lail Ab Manan |
An enhanced remote authentication scheme to mitigate man-in-the-browser attacks. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | |
2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012 |
CyberSec |
2012 |
DBLP BibTeX RDF |
|
1 | Pin Shen Teh, Shigang Yue, Andrew Beng Jin Teoh |
Improving keystroke dynamics authentication system via multiple feature fusion scheme. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | S. M. Nirkhi, Rajiv V. Dharaskar, V. M. Thakre |
Analysis of online messages for identity tracing in cybercrime investigation. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed A. Alzain, Ben Soh, Eric Pardede |
A New approach using redundancy technique to improve security in cloud computing. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Eric Holm |
Identity crime: The challenges in the regulation of identity crime. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|