Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Teddy Mantoro, M. Iman Wahyudi, Media A. Ayu, Wendi Usino |
Real-Time Printed Document Authentication Using Watermarked QR Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 68-72, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nabil Laoufi |
From Risk Analysis to the Expression of Security Requirements for Systems Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 84-89, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chyquitha Danuputri, Teddy Mantoro, Mardi Hardjianto |
Data Security Using LSB Steganography and Vigenere Chiper in an Android Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 22-27, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Hilmi Kamarudin, Carsten Maple, Tim Watson, Hasliza Sofian |
Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 101-106, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Takumi Akiyama, Kazuya Otani, Yoshio Kakizaki, Ryôichi Sasaki |
Evaluation of a Risk-Based Management Method for Online Accounts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 52-57, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kazuki Hashimoto, Hiroyuki Hiruma, Takashi Matsumoto, Kosetus Kayama, Yoshio Kaikizaki, Hiroshi Yamaki, Tetsutaro Uehara, Ryôichi Sasaki |
Development of Intellectual Network Forensic System LIFT against Targeted Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 16-21, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | P. D. Persadha, A. A. Waskita, S. Yazid |
Comparative Study of Cyber Security Policies among Malaysia, Australia, Indonesia: A Responsibility Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 146-150, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sriram Raghavan, S. V. Raghavan |
Estimating Posterior Probabilities to Identify Breach Points during Cyber-attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 113-116, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Herny Ramadhani Mohd Husny Hamid, Norhaiza Ya Abdullah |
Physical Authentication Using Random Number Generated (RNG) Keypad Based on One Time Pad (OTP) Concept. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 135-139, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hyoseok Yoon, Se-Ho Park, Kyung-Taek Lee |
Exploiting Ambient Light Sensor for Authentication on Wearable Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 95-100, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Budi Setiawan, Aries Syamsudin, Ashwin Sasongko Sastrosubroto |
Implementation of Secure Smart Grid as Critical Information Infrastructure in Indonesia: A Case Study in Smart Grid Electricity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 34-39, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Makoto Sato, Akihiko Sugimoto, Naoki Hayashi, Yoshiaki Isobe, Ryôichi Sasaki |
Proposal of a Method for Identifying the Infection Route for Targeted Attacks Based on Malware Behavior in a Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 40-45, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dwiki Jatikusumo, Hanny Hikmayanti H., Feriadi, Wendi Usino |
Securing Official Account Twitter Using Social Media Management System: Accuracy of the Data and Information Publish with Twitter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 11-15, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Victor Wahanggara, Yudi Prayudi |
Malware Detection through Call System on Android Smartphone Using Vector Machine Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 62-67, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mikhail Styugin |
Analysis of Awareness Structures in Information Security Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 6-10, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Abdullah Said Alkalbani, Teddy Mantoro, Sardjoeni Moedjiono, Media A. Ayu |
Hybrid Solution for Secured and Energy Aware Routing Path in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 78-83, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Ahmad Abu Allawi, Ali Hadi, Arafat Awajan |
MLDED: Multi-layer Data Exfiltration Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 107-112, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | |
Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![IEEE Computer Society, 978-1-4673-8499-5 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Herny Ramadhani Mohd Husny Hamid, Megat Ahmad Izzat bin Megat Ahmad Kamil, Norhaiza Ya Abdullah |
Portable Toolkit for Penetration Testing and Firewall Configuration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 90-94, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ryohei Koizumi, Ryôichi Sasaki |
Study on Countermeasures Using Mitigation Software against Vulnerability Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 28-33, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Delwar Alam, Md. Alamgir Kabir, Touhid Bhuiyan, Tanjila Farah |
A Case Study of SQL Injection Vulnerabilities Assessment of .bd Domain Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 73-77, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Imran, Muhammad Tanvir Afzal, Muhammad Abdul Qadir 0001 |
Similarity-Based Malware Classification Using Hidden Markov Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 129-134, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Normaziah Abdul Aziz, Fakhrulrazi Mokhti, M. Nadhar M. Nozri |
Mobile Device Forensics: Extracting and Analysing Data from an Android-Based Smartphone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 123-128, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Manh Cong Tran, Yasuhiro Nakamura |
An Approach to Mine Suspicious Domain Based on HTTP Automated Software Communication Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 1-5, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Naoto Nakagawa, Yoshimi Teshigawara, Ryôichi Sasaki |
Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 46-51, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Norhaiza Ya Abdullah, Herny Ramadhani Mohd Husny Hamid |
Folder Lock by Using Multimodal Biometric: Fingerprint and Signature Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 140-145, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ali Tamimi, D. Subbaram Naidu, Sanaz Kavianpour |
An Intrusion Detection System Based on NSGA-II Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 58-61, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Luthfi, Yudi Prayudi |
Process Model of Digital Forensics Readiness Scheme (DFRS) as a Recommendation of Digital Evidence Preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 117-122, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohd Najwadi Yusoff, Ramlan Mahmod, Mohd Taufik Abdullah, Ali Dehghantanha |
Mobile forensic data acquisition in Firefox OS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014, pp. 27-31, 2014, IEEE, 978-1-4799-3905-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zakaria Zakaria Hassan, Talaat A. Elgarf, Abdelhalim Zekry |
Modifying authentication techniques in mobile communication systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014, pp. 38-44, 2014, IEEE, 978-1-4799-3905-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Eric Holm, Geraldine Mackenzie |
The importance of mandatory data breach notification to identity crime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014, pp. 6-11, 2014, IEEE, 978-1-4799-3905-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | |
Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![IEEE, 978-1-4799-3905-3 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Iman Ahmeid Mohamed, Azizah Bt Abdul Manaf |
An enhancement of traceability model based-on scenario for digital forensic investigation process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014, pp. 12-15, 2014, IEEE, 978-1-4799-3905-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Neila Rjaibi, Nawel Gannouni, Latifa Ben Arfa Rabai, Anis Ben Aissa |
Modeling the propagation of security threats: An e-learning case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014, pp. 32-37, 2014, IEEE, 978-1-4799-3905-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem |
Statistical analysis for random bits generation on quantum key distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014, pp. 45-51, 2014, IEEE, 978-1-4799-3905-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Heshem A. El Zouka, Mustafa M. Hosni |
On the power of quantum cryptography and computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014, pp. 58-63, 2014, IEEE, 978-1-4799-3905-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Murdoch Watney |
Challenges pertaining to cyber war under international law. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014, pp. 1-5, 2014, IEEE, 978-1-4799-3905-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohd Najwadi Yusoff, Ramlan Mahmod, Ali Dehghantanha, Mohd Taufik Abdullah |
An approach for forensic investigation in Firefox OS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014, pp. 22-26, 2014, IEEE, 978-1-4799-3905-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | M. Kaddour, Nourdine Ait Tmazirte, Maan El Badaoui El Najjar, Z. Naja, Nazih Moubayed |
Autonomous integrity monitoring for GNSS localization using informational approach and iono-free measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014, pp. 64-69, 2014, IEEE, 978-1-4799-3905-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Emsaieb Geepalla |
Comparison between Alloy and Timed Automata for modelling and analysing of access control specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014, pp. 16-21, 2014, IEEE, 978-1-4799-3905-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Victor R. Kebande, Hein S. Venter |
A cognitive approach for botnet detection using Artificial Immune System in the cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014, pp. 52-57, 2014, IEEE, 978-1-4799-3905-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiaomei Quan, Hongbin Zhang |
Copy-move forgery detection in digital images based on local dimension estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 180-185, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Bilal Al Sabbagh, Stewart Kowalski |
ST(CS)2 - Featuring socio-technical cyber security warning systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 312-316, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ida Madieha bt. Abdul Ghani Azmi, Sonny Zulhuda, Sigit Puspito Wigati Jarot |
Data breach on the critical information infrastructures: Lessons from the Wikileaks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 306-311, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ghassan Samara, Wafaa A. H. Ali Alsalihy |
A new security mechanism for vehicular communication networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 18-22, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ala A. Abdulrazeg, Norita Md Norwawi, Nurlida Basir |
Security metrics to improve misuse case model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 94-99, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Latifa Ben Arfa Rabai, Mouna Jouini, Marwa Nafati, Anis Ben Aissa, Ali Mili 0001 |
An economic model of security threats for cloud computing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 100-105, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Caiyi Zhu, Xiangkun Dai |
Model of trust management based on finite state machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 161-164, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Edna Dias Canedo, Rafael Timóteo de Sousa Júnior, Rhandy Rafhael de Carvalho, Robson de Oliveira Albuquerque |
Trust model for private cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 128-132, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Maryam Savari, Mohammad Montazerolzohour, Eng-Thiam Yeoh |
Combining encryption methods in multipurpose smart card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 43-48, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Liam Smit, Adrie Stander, Jacques Ophoff |
Investigating the accuracy of base station information for estimating cellphone location. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 88-93, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Acklyn Murray, Sherali Zeadally, Angelyn Flowers |
An assessment of U.S. legislation on cybersecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 289-294, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Warusia Yassin, Nur Izura Udzir, Zaiton Muda, Azizol Abdullah, Mohd Taufik Abdullah |
A Cloud-based Intrusion Detection Service framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 213-218, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohsen Damshenas, Ali Dehghantanha, Ramlan Mahmoud, Solahuddin bin Shamsuddin |
Forensics investigation challenges in cloud computing environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 190-194, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Huyam Al-Amro, Eyas El-Qawasmeh |
Discovering security vulnerabilities and leaks in ASP.NET websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 329-333, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa |
How secure is your smartphone: An analysis of smartphone security mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 76-81, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alireza Tamjidyamcholo |
Information security risk reduction based on genetic algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 122-127, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohd Anuar Mat Isa, Jamalul-lail Ab Manan, Ramlan Mahmod, Habibah Hashim, Mar Yah Said, Nur Izura Udzir, Ali Dehghantanha |
Finest authorizing member of common criteria certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 155-160, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | M. P. Azuwa, Rabiah Ahmad, Shahrin Sahib, Solahuddin Shamsuddin |
A propose technical security metrics model for SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 70-75, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ramya Dharam, Sajjan G. Shiva |
Runtime monitors for tautology based SQL injection attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 253-258, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sina Manavi, Sadra Mohammadalian, Nur Izura Udzir, Azizol Abdullah |
Hierarchical secure virtualization model for cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 219-224, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | K. SuganyaDevi, N. Malmurugan, R. Sivakumar |
OF-SMED: An optimal foreground detection method in surveillance system for traffic monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 12-17, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Salasiah Sulaiman, Zaiton Muda, Julia Juremi |
The new approach of Rijndael key schedule. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 23-27, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Davoud Mougouei, Wan Nurhayati Wan Ab. Rahman, Mohammad Moein Almasi |
Evaluating fault tolerance in security requirements of web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 111-116, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kee-Won Kim, Jun-Cheol Jeon |
Cellular semi-systolic Montgomery Multiplier on finite fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 1-5, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Farhood Norouzizadeh Dezfouli, Ali Dehghantanha, Ramlan Mahmoud, Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin |
Volatile memory acquisition using backup for forensic investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 186-189, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jung-Ho Eom, Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung |
Cyber military strategy for cyberspace superiority in cyber warfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 295-299, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Newton Howard, Sergey Kanareykin |
Intention awareness in cyber security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 6-11, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Somdip Dey |
SD-EI: A cryptographic technique to encrypt images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 28-32, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Solmaz Salehian, Farzaneh Masoumiyan, Nur Izura Udzir |
Energy-efficient intrusion detection in Wireless Sensor Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 207-212, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xiangkun Dai, Caiyi Zhu, Yucui Guo |
P2P dynamic trust management system based on trust network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 165-170, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kamarularifin Abd. Jalil, Qatrunnada Binti Abdul Rahman |
Multiple trusted devices authentication protocol for ubiquitous computing applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 225-229, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Abdullahi Arabo, Fadi El-Moussa 0001 |
Security framework for smart devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 82-87, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Maryam Savari, Mohammad Montazerolzohour |
All about encryption in smart card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 54-59, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Faiz Liew Abdullah, A. Z. Yonis |
Performance of LTE Release 8 and Release 10 in wireless communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 236-241, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ali Alkhalifah, John D'Ambra |
The role of Identity Management Systems in enhancing protection of user privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 144-149, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Salah Bindahman, Nasriah Zakaria, Norsaadah Zakaria |
3D body scanning technology: Privacy and ethical issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 150-154, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Maryam Tanha, Seyed Dawood Sajjadi Torshizi, Mohd Taufik Abdullah, Fazirulhisyam Hashim |
An overview of attacks against digital watermarking and their respective countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 265-270, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Enos K. Mabuto, Hein S. Venter |
User-generated digital forensic evidence in graphic design applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 195-200, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | S. A. I. Yazid, M. A. Faizal, Rabiah Ahmad, S. Shahrin, Solahuddin Shamsuddin |
Enhancement of Asset value classification for Mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 106-110, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hadi KhorasaniZadeh, Norbik Bashah Idris, Jamalul-lail Ab Manan |
Distributed Intrusion Detection trust management through integrity and expertise evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 133-138, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Majid Nasirinejad, Alireza Ahmadian Yazdi |
SASy username and password management on the cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 242-246, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sumit Kumar, Shashikala Tapaswi |
A centralized detection and prevention technique against ARP poisoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 259-264, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Julia Juremi, Ramlan Mahmod, Salasiah Sulaiman |
A proposal for improving AES S-box with rotation and key-dependent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 38-42, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fakariah Hani Mohd Ali, Rozita Yunos, Mohd Azuan Mohamad Alias |
Simple port knocking method: Against TCP replay attack and port scanning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 247-252, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir, Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin |
Towards secure model for SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 60-64, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Abusukhon, Mohammad Talib |
A novel network security algorithm based on private key encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 33-37, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Ibrahim 0003, Mohd Taufik Abdullah, Ali Dehghantanha |
VoIP evidence model: A new forensic method for investigating VoIP malicious attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 201-206, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Maryam Savari, Mohammad Montazerolzohour, Eng-Thiam Yeoh |
Comparison of ECC and RSA algorithm in multipurpose smart card application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 49-53, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Thilla Rajaretnam |
The problem to consent to the collection, use, and disclosure of personal information in cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 283-288, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Rabiah Ahmad, Zahri Yunos, Shahrin Sahib |
Understanding cyber terrorism: The grounded theory method applied. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 323-328, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hamed Khiabani, Norbik Bashah Idris, Jamalul-lail Ab Manan |
Leveraging Remote Attestation to enhance the Unified Trust Model for WSNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 139-143, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Mahboubian, Nur Izura Udzir, Shamala Subramaniam, Nor Asilah Wati Abdul Hamid |
An alert fusion model inspired by artificial immune system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 317-322, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mark Evered |
A transitive access control model for dynamic roles and attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 117-121, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fazli Bin Mat Nor, Kamarularifin Abd. Jalil, Jamalul-lail Ab Manan |
An enhanced remote authentication scheme to mitigate man-in-the-browser attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 271-276, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | |
2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![IEEE, 978-1-4673-1425-1 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Pin Shen Teh, Shigang Yue, Andrew Beng Jin Teoh |
Improving keystroke dynamics authentication system via multiple feature fusion scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 277-282, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | S. M. Nirkhi, Rajiv V. Dharaskar, V. M. Thakre |
Analysis of online messages for identity tracing in cybercrime investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 300-305, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed A. Alzain, Ben Soh, Eric Pardede |
A New approach using redundancy technique to improve security in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 230-235, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Eric Holm |
Identity crime: The challenges in the regulation of identity crime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 176-179, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|