Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Jonas Pfoh, Christian A. Schneider, Claudia Eckert 0001 |
Exploiting the x86 Architecture to Derive Virtual Machine State Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 166-175, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Danilo Valeros Bernardo, Doan Hoang |
Protecting Next Generation High Speed Network Protocol - UDT through Generic Security Service Application Program Interface - GSS-API. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 266-272, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dongkyun Ahn, Gyungho Lee |
Prospect of Fine Grain Dynamic Memory Access Control with Profiling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 69-74, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mathieu Blanc, Jérémy Briffaut, Thibault Coullet, Maxime Fonda, Christian Toinard |
Protection of a Shared HPC Cluster. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 273-279, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hiroto Kakiuchi, Takao Kawamura, Toshihiko Sasama, Kazunori Sugahara |
Detection Methods Improving Reliability of Automatic Human Tracking System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 240-246, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Homam El-Taj, Omar Abouabdalla, Ahmed M. Manasrah, Ahmed Al-Madi, Muhammad Imran Sarwar, Sureswaran Ramadass |
Forthcoming Aggregating Intrusion Detection System Alerts Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 40-44, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Praveen Bommannavar, Nicholas Bambos |
Patch Scheduling for Risk Exposure Mitigation under Service Disruption Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 176-181, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ali Ahmed 0001, Ning Zhang 0001 |
An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 251-260, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Boulares Ouchenne, Ousmane Koné |
A Security Control Architecture for SOAP-Based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 261-265, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | S. Hasan Mirjalili, Arjen K. Lenstra |
Towards a Structural Secure Design Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 280-286, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Donghai Tian, Deguang Kong, Changzhen Hu, Peng Liu 0005 |
Protecting Kernel Data through Virtualization Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 5-10, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mohit Soni, Sandesh Gupta, M. S. Rao, Phalguni Gupta |
An Efficient Vein Pattern-Based Recognition System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 234-239, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sarosh Hashmi, John Brooke |
Towards Sybil Resistant Authentication in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 17-24, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Beritelli, Salvatore Casale, Rosario Grasso, Andrea Spadaccini |
Performance Evaluation of SNR Estimation Methods in Forensic Speaker Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 88-92, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Cagatay Karabat, Mehmet Keskinöz |
Blind Detectors in Spread Spectrum Watermarking for Interference Reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 103-108, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng, Feng Bao 0001 |
A Shuffling Scheme with Strict and Strong Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 201-206, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alireza Shahrestani, Maryam Feily, Rodina Binti Ahmad, Sureswaran Ramadass |
Discovery of Invariant Bot Behavior through Visual Network Monitoring System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 182-188, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xavier Titi, Jean-Marc Seigneur |
Verifying Hotspot Quality User Rating with Certified QoS Evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 129-134, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Thomas C. Ormerod, Lingyu Wang 0001, Mourad Debbabi, Amr M. Youssef, Hamad Binsalleeh, Amine Boukhtouta, Prosenjit Sinha |
Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 195-200, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pekka Pietikäinen, Kati Karjalainen, Juha Röning, Juhani Eronen |
Socio-technical Security Assessment of a VoIP System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 141-147, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Fan Wu 0013, Chung-Han Chen, Hira N. Narang |
An Efficient Acceleration of Symmetric Key Cryptography Using General Purpose Graphics Processing Unit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 228-233, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pierre de Leusse, Theo Dimitrakos |
SOA-Based Security Governance Middleware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 57-62, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bilal Khan, Muhammad Khurram Khan, Maqsood Mahmud, Khaled Alghathbar |
Security Analysis of Firewall Rule Sets in Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 51-56, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jin Tamura |
Improving the Efficiency of a Highly-Used Access Control Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 35-39, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ahlem Bouchahda, Nhan Le Thanh, Adel Bouhoula, Faten Labbene |
RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 135-140, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Anders Fongen |
Identity Management without Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 75-81, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wolfgang Boehmer |
Analysis of Strongly and Weakly Coupled Management Systems in Information Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 109-116, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Rouzaud-Cornabas, Patrice Clemente, Christian Toinard |
An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 11-16, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tewfiq El Maliki, Jean-Marc Seigneur |
A Security Adaptation Reference Monitor (SARM) for Highly Dynamic Wireless Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 63-68, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rainer Falk, Hans-Joachim Hof |
Industrial Sensor Network Security Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 97-102, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Hartung, Christoph Busch 0001 |
Biometric Transaction Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 207-215, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jaziar Radianti |
A Study of a Social Behavior inside the Online Black Markets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 189-194, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tamás Paulik, Ádám Máté Földes, Gábor György Gulyás |
BlogCrypt: Private Content Publishing on the Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 123-128, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Abdel Alim Kamal, Amr M. Youssef |
Applications of SAT Solvers to AES Key Recovery from Decayed Key Schedule Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 216-220, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sedat Soydan |
Analyzing the DPA Leakage of the Masked S-box via Digital Simulation and Reducing the Leakage by Inserting Delay Cells. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 221-227, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Manfred Schäfer, Wolf-Dietrich Moeller |
Strategies for Managed Software Integrity Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 45-50, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Keunwoo Rhee, Byunghee Lee, Dongho Won, Hac Yun Na, Seungjoo Kim |
Vulnerabilities and Improvements of Du-Xiao-Chen-Wu's Secure Cell Relay Routing Protocol for Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 1-4, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Francisco José Bellido Outeiriño, Pedro Canales Aranda, José Luis de la Cruz Fernández, Benito Pérez Jarauta |
Universal Bluetooth Access Control and Security System for e-Keys Enviroments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 247-250, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ravishankar Borgaonkar |
An Analysis of the Asprox Botnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 148-153, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pierluigi Failla |
Heuristic Search in Encrypted Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 82-87, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jaziar Radianti |
Eliciting Information on the Vulnerability Black Market from Interviews. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 154-159, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Masaru Takesue |
Cascaded Simple Filters for Accurate and Lightweight Email-Spam Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 160-165, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Beritelli, Andrea Spadaccini |
A Statistical Approach to Biometric Identity Verification Based on Heart Sounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 93-96, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Reijo Savola, Masaru Takesue, Rainer Falk, Manuela Popescu (eds.) |
Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![IEEE Computer Society, 978-1-4244-7517-9 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Reijo M. Savola, Petri Heinonen |
Security-Measurability-Enhancing Mechanisms for a Distributed Adaptive Security Monitoring System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 25-34, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia Y. Lester |
Shifting the Paradigm: Training Undergraduate Students in Software Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 117-122, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wilson Goudalo, Dominique Seret |
The Process of Engineering of Security of Information Systems (ESIS): The Formalism of Business Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 105-113, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Engineering Process, Information Systems Security Engineering, Business Process Formalism, Information Systems Urbanization, UML, Enterprise Architecture |
1 | Reijo Savola, Habtamu Abie |
Identification of Basic Measurable Security Components for a Distributed Messaging System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 121-128, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security requirements, security metrics, messaging systems |
1 | Hossein Rezaei Ghaleh, Shahin Norouzi |
A New Approach to Protect the OS from Off-line Attacks Using the Smart Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 185-190, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
OS security, off-line attack, trusted computing, smartcard |
1 | Cynthia Y. Lester, Frank Jamerson |
Incorporating Software Security into an Undergraduate Software Engineering Course. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 161-166, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
secure software development lifecycle, software engineering, Collaborative learning, software security, undergraduate curriculum |
1 | Mohamed Abo El-Fotouh, Klaus Diepold |
The Pushdown Attack on AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 280-285, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Pushdown Attacks, Cryptanalysis, AES |
1 | Antonietta Stango, Neeli R. Prasad, Dimitris M. Kyriazanos |
A Threat Analysis Methodology for Security Evaluation and Enhancement Planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 262-267, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
vulnerabilities, security metrics, assets, threat analysis |
1 | Kamil Reddy, Hein S. Venter |
Using Object-Oriented Concepts to Develop a High-Level Information Privacy Risk Management Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 23-30, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Aleksander Dikanski, Christian Emig, Sebastian Abeck |
Integration of a Security Product in Service-Oriented Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 1-7, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Kraxberger, Udo Payer |
Secure Routing Approach for Unstructured P2P Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 210-216, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, p2p systems, secure routing |
1 | Gábor György Gulyás, Róbert Schulcz, Sándor Imre |
Modeling Role-Based Privacy in Social Networking Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 173-178, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, social networks, Anonymity, identity management |
1 | Wei Zhou, Zhiqiang Wei 0001, Mijun Kang, Paddy Nixon, Lang Jia |
A Credit-Based Incentive Mechanism for Recommendation Acquisition in Multihop Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 306-311, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Heiko Klarl, Korbinian Molitorisz, Christian Emig, Karsten Klinger, Sebastian Abeck |
Extending Role-Based Access Control for Business Usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 136-141, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Access Control, RBAC, Business Process Modelling, Roles, Identity Management, Business-IT Alignment |
1 | Ángel Cuevas, Paul El Khoury, Laurent Gomez, Annett Laube, Alessandro Sorniotti |
A Security Pattern for Untraceable Secret Handshakes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 8-14, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Christian Seifert, Peter Komisarczuk, Ian Welch |
True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 63-69, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
client honeypot, security, evaluation, intrusion detection |
1 | Khaled Gaaloul, Philip Miseldine, François Charoy |
Towards Proactive Policies Supporting Event-Based Task Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 99-104, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Access Control, Workflow, Policy, Delegation |
1 | Jérémy Briffaut, Xavier Kauffmann-Tourkestansky, Jean-François Lalande, Waleed W. Smari |
Generation of Role Based Access Control Security Policies for Java Collaborative Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 224-229, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
java, RBAC, collaborative applications |
1 | Rüdiger Grimm |
A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-repudiation Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 49-56, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
IT-security model, secure state, trust model, non-repudiation, fair exchange, obligation, transition rule |
1 | Su Chang, Thomas E. Daniels |
Correlation Based Node Behavior Profiling for Enterprise Network Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 298-305, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security, Behavior Profiling |
1 | Vicente Hernández, Lourdes López-Santidrián, Oscar Prieto, José-Fernán Martínez, Ana Belén García, Antonio da Silva 0001 |
Security Framework for DPWS Compliant Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 87-92, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Secure Protocols, WS Security, Security Framework, DPWS |
1 | Rainer Falk, Andreas Koepf, Hermann Seuschek, Ming-Yuh Huang, Mingyan Li |
Simulating a Multi-domain RFID System for Replacement Part Tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 197-202, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Zahoor Ahmad Jhat, Ajaz Hussain Mir, Simeen Rubab |
Fingerprint Texture Feature for Discrimination and Personal Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 230-236, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
spatial grey level dependence method, verification, Biometric, texture, fingerprint |
1 | Davide Lorenzoli, George Spanoudakis |
Detection of Security and Dependability Threats: A Belief Based Reasoning Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 312-320, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security and dependability, belief based reasoning, runtime monitoring |
1 | Gh. Rasool Begh, Ajaz Hussain Mir |
Quantification of the Effect of Security on Performance in Wireless LANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 57-62, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Wireless LAN, TCP, Packet Loss, UDP, WEP, WPA |
1 | Nuno Amálio |
Suspicion-Driven Formal Analysis of Security Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 217-223, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security, planning, requirements, confidentiality, formal analysis, separation of duty, Event-Calculus |
1 | Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Seiji Mune, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi |
A Two-Step Execution Mechanism for Thin Secure Hypervisors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 129-135, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
TCB, ID management, Security, Virtual machine monitor, Hypervisor, Trusted Computing Base, VMM |
1 | Catalin V. Bîrjoveanu |
Secrecy for Bounded Security Protocols without Freshness Check. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 37-41, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Masaru Takesue |
Personalized Filtering of Polymorphic E-mail Spam. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 249-254, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Personalized filter, polymorphous spam, filtering metric, fingerprint, Bloom filter, piecewise linear function |
1 | Rainer Falk, Wilson Goudalo, Eric Y. Chen, Reijo Savola, Manuela Popescu (eds.) |
The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![IEEE Computer Society, 978-0-7695-3668-2 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Igor Podebrad, Klaus Hildebrandt, Bernd Klauer |
List of Criteria for a Secure Computer Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 76-80, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
parts of von-Neumann- Maschine, computer-architecture, IT-security |
1 | Matti Mantere, Ilkka Uusitalo, Juha Röning |
Comparison of Static Code Analysis Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 15-22, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Peipei Shi, Bo Zhu, Amr M. Youssef |
A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 237-241, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Secure PIN entry, shoulder surfing |
1 | Benjamin Aziz, Geoff W. Hamilton |
Detecting Man-in-the-Middle Attacks by Precise Timing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 81-86, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Timed Algebra, Security, Static Analysis, Process Algebra |
1 | Peter Lory |
Secure Distributed Multiplication of Two Polynomially Shared Values: Enhancing the Efficiency of the Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 286-291, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multiplication protocol, secret sharing, Multiparty computations, divided differences |
1 | Hyangjin Lee, Inkyoung Jeun, Hyuncheol Jung |
Criteria for Evaluating the Privacy Protection Level of Identity Management Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 155-160, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy protection level, Assessment, Identity Management |
1 | Wolfgang Boehmer |
Survivability and Business Continuity Management System According to BS 25999. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 142-147, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
BS 25999, BCMS, Business Continuity Plan (BCP), Disaster Recovery (DR) |
1 | Alireza Sadighian, Rasool Jalili |
AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 31-36, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Chit Wei Saw |
Runtime Protection via Dataflow Flattening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 242-248, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, data hiding, obfuscation, software protection |
1 | Jan Nagy, Peter Pecho |
Social Networks Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 321-325, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, privacy, social networks |
1 | Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani |
Security in Ad Hoc Networks: From Vulnerability to Risk Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 203-209, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ad hoc networks, attacks, vulnerabilities, security measures |
1 | Rainer Falk, Hans-Joachim Hof |
Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 191-196, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wake-up radio, security, wireless sensor network |
1 | Mauro Migliardi, Valentina Resaz |
Distributed Intrusion Detection: Simulation and Evaluation of Two Methodologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 42-48, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Distributed Intrusion Detection., Simulation, Evaluation |
1 | Vasileios Karyotis, Anastasios Kakalis, Symeon Papavassiliou |
On the Tradeoff between MAC-Layer and Network-Layer Topology-Controlled Malware Spreading Schemes in Ad Hoc and Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 255-261, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
malware spreading, topology control attacks, closed queuing networks |
1 | Bogdan Groza |
Analysis of a Password Strengthening Technique and Its Practical Use. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 292-297, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authentication, protocol, password |
1 | Ilkka Uusitalo, Josep M. Catot, Ramon Loureiro |
Phishing and Countermeasures in Spanish Online Banking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 167-172, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Abuse and crime involving computers, Security, Authentication, Electronic commerce, Invasive software |
1 | Maryam Feily, Alireza Shahrestani, Sureswaran Ramadass |
A Survey of Botnet and Botnet Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 268-273, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Cristian Varas, Thomas Hirsch |
Self Protection through Collaboration Using D-CAF: A Distributed Context-Aware Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 179-184, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Participative Measurement, Denial of Service, Autonomic Communication, Intrusion Prevention, Flash crowds |
1 | Imad M. Abbadi, Muntaha Alawneh |
Replay Attack of Dynamic Rights within an Authorised Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 148-154, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Enterprise Rights Management, Dynamic Rights, Authorised Domain, Digital Rights Management |
1 | Hyewon Park, Zeen Kim, Kwangjo Kim |
Forward Secure ID-Based Group Key Agreement Protocol with Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 274-279, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
GKA, anonymous, forward-secure, ID-based |
1 | Mucahit Mutlugun, Ibrahim Sogukpinar |
Multi-level Authentication Scheme Utilizing Smart Cards and Biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 93-98, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
smart card, fingerprint, security policy, remote authentication |
1 | Mario Ibáñez, Natividad Martínez Madrid, Ralf Seepold |
Security Management with Virtual Gateway Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 70-75, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security architecure, Virtualization, Residential Gateway |
1 | Jérémy Briffaut, Jean-François Lalande, Christian Toinard, Mathieu Blanc |
Enforcement of Security Properties for Dynamic MAC Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 114-120, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Wolfgang Boehmer |
Appraisal of the Effectiveness and Efficiency of an Information Security Management System Based on ISO 27001. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 224-231, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Katarzyna Michalska, Tomasz Walkowiak |
Hierarchical Approach to Dependability Analysis of Information Systems by Modeling and Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 356-361, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jérémy Briffaut, Jean-François Lalande, Waleed W. Smari |
Team--Based MAC Policy over Security--Enhanced Linux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 41-46, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|