Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | A. Yu. Boruchinkin |
Secure voice communication system with hardware encryption of data on hands-free headset. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gaurav Somani 0001, Manoj Singh Gaur, Dheeraj Sanghi |
DDoS/EDoS attack in cloud: affecting everyone out there! |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Malik S. K. Awan, Mohammed A. AlGhamdi, Sultan H. Almotiri, Pete Burnap, Omer F. Rana |
A classification framework for distinct cyber-attacks based on occurrence patterns. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Subhasish Banerjee, Manash Pratim Dutta, Chandan Tilak Bhunia |
A perfect dynamic-id and biometric based remote user authentication scheme under multi-server environments using smart cards. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tatiana V. Stepanova, Dmitry P. Zegzhda |
Large-scale systems security evolution: control theory approach. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Rajat Subhra Goswami, Subhasish Banerjee, Manash Pratim Dutta, Chandan Tilak Bhunia |
Absolute key variation technique of automatic variable key in cryptography. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nilesh Chakraborty, Samrat Mondal |
Few notes towards making honeyword system more secure and usable. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ramakrishna Thurimella, Rinku Dewri, William Mitchell |
Record linkage applications in health services research: opportunities and challenges. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Barabanov, Alexey Markov |
Modern trends in the regulatory framework of the information security compliance assessment in Russia based on common criteria. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Natalia G. Miloslavskaya, Alexander I. Tolstoy, Vladislav Petrov |
Secure e-Learning portal for teaching business continuity and information security management. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Barabanov, Alexey Markov, Andrey Fadin, Valentin Tsirlov, Igor Shakhalov |
Synthesis of secure software development controls. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Buccafurri, Lidia Fotia, Angelo Furfaro, Alfredo Garro, Matteo Giacalone, Andrea Tundis |
An analytical processing approach to supporting cyber security compliance assessment. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ludmila K. Babenko, Alina Trepacheva |
Cryptanalysis of factoring-based fully homomorphic encryption. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | André Rifaut, Christophe Feltus, Slim Turki, Djamel Khadraoui |
Analysis of the impact of ethical issues on the management of the access rights. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Daria Chukova, Alexey Pakhomov |
Profile-based students assignment to core financial intelligence unit departments. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Evstifeeva Natalia Alexandrovna, Evstifeeva Olga Urievna |
Approbation of the methodology for web monitoring of terrorism- and extremism-related content. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sergey Lapin |
Access control model D-TBAC subject to the requirements to tasks' performing. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Alexey Zhukov |
Lightweight cryptography: modern development paradigms. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Evgeny Sergeevich Abramov, Elena Basan, Oleg B. Makarevich |
Trust management system for mobile cluster-based wireless sensor network. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ecir Ugur Küçüksille, Mehmet Ali Yalçinkaya, Samet Ganal |
Developing a penetration test methodology in ensuring router security and testing it in a virtual laboratory. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sergey Zapechnikov, Natalia G. Miloslavskaya, Alexander I. Tolstoy |
Modeling of next-generation firewalls as queueing services. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jithu Raphel, P. Vinod 0001 |
Information theoretic method for classification of packed and encoded files. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Oleg B. Makarevich, Ron Poet, Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, Ludmila K. Babenko, Md. Sadek Ferdous, Anthony T. S. Ho, Vijay Laxmi, Josef Pieprzyk (eds.) |
Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015 |
SIN |
2015 |
DBLP BibTeX RDF |
|
1 | Dmitry Mikhaylov, Andrey Starikovskiy, Grigoriy Lebedev, Dmitry Rubin, Alexey Egorov, Eugeniy Uleykin, Alexander Boruchinkin, Anastasia M. Tolstaya |
Developing a system for text-messages protection. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir V. Glukhov, Igor V. Ilin, A. B. Anisiforov |
Problems of data protection in industrial corporations enterprise architecture. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Alexey A. Tselykh, Dmitry Petukhov |
Web service for detecting credit card fraud in near real-time. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tatiana V. Stepanova, Alexander I. Pechenkin, Daria S. Lavrova |
Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Anna Epishkina, Konstantin Kogos |
Protection from binary and multi-symbol packet length covert channels. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Margarita Knyazeva, Alexander N. Tselykh, Alexey A. Tselykh, Elena Popkova |
A graph-based data mining approach to preventing financial fraud: a case study. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ron Poet |
The use of mobile devices in authentication. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Naila Mukhtar, Muhammad Shamim Baig, L. A. Khan |
Improved trust based key management for end-to-end secure communication in cellular networks. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Maxim Anikeev |
Improvement of treeless signature schemes implementation by random oracle buffering. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Eliseev, Yury Shabalin |
Dynamic response recognition by neural network to detect network host anomaly activity. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ludmila K. Babenko, Philipp Burtyka, Oleg B. Makarevich, Alina Trepacheva |
The general model of secure computation system. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bharat Buddhdev, Rati Bhan, Manoj Singh Gaur, Vijay Laxmi |
DynaDroid: dynamic binary instrumentation based app behavior monitoring framework. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Valeriy O. Osipyan |
Mathematical modelling of cryptosystems based on Diophantine problem with gamma superposition method. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Emmanouil Vasilomanolakis, Shankar Karuppayah, Panayotis Kikiras, Max Mühlhäuser |
A honeypot-driven cyber incident monitor: lessons learned and steps ahead. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Andrey Shalyapin, Vadim Zhukov |
Case based analysis in information security incidents management system. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Shukhman, Petr Polezhaev, Yuri Ushakov, Leonid Legashev, Veniamin N. Tarasov, Nadezhda F. Bakhareva |
Development of network security tools for enterprise software-defined networks. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Tarasov |
Modern techniques of function-level fault tolerance in MFM-systems. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | N. V. Narendra Kumar, R. K. Shyamasundar |
Labelled mobile ambients model for information flow security in distributed systems. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Naghmeh Moradpoor Sheykhkanloo |
SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Brian A. Soeder, K. Suzanne Barber |
Trustworthiness of Identity Attributes. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bernd Conrad, Fatemeh Shirazi |
Analyzing the Effectiveness of DoS Attacks on Tor. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tobias F. Pfeffer, Paula Herber, Jörg Schneider 0001 |
Reverse Engineering of ARM Binaries Using Formal Transformations. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Gudymenko |
A Privacy-Preserving E-Ticketing System for Public Transportation Supporting Fine-Granular Billing and Local Validation. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Soumik Mondal, Patrick Bours |
Continuous Authentication using Fuzzy Logic. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nishant Garg, Kuldeep Pareek, Manoj Singh Gaur, Vijay Laxmi, Chhagan Lal |
Analysis of Identity Forging Attack in MANETs. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hervé Cholez, Christophe Feltus |
Towards an Innovative Systemic Approach of Risk Management. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ecem Ünal, Erkay Savas |
Bandwidth-Optimized Parallel Private Information Retrieval. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale |
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Vikas Jaiman, Gaurav Somani 0001 |
An Order Preserving Encryption Scheme for Cloud Computing. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ibrahim Lahmer, Ning Zhang 0001 |
MapReduce: MR Model Abstraction for Future Security Study. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Puttaroo, Peter Komisarczuk, Renato Cordeiro de Amorim |
Challenges in developing Capture-HPC exclusion lists. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Abt, Sebastian Gärtner, Harald Baier |
A Small Data Approach to Identification of Individuals on the Transport Layer using Statistical Behaviour Templates. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Neila Rjaibi, Latifa Ben Arfa Rabai |
Deploying Suitable Countermeasures to Solve the Security Problems within an E-learning Environment. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kiran B. Raja, Ramachandra Raghavendra, Christoph Busch 0001, Soumik Mondal |
An Empirical Study of Smartphone Based Iris Recognition in Visible Spectrum. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hani Moaiteq Aljahdali, Ron Poet |
Users' Perceptions of Recognition-Based Graphical Passwords: A Qualitative Study on Culturally Familiar Graphical Passwords. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Philipp Burtyka, Oleg B. Makarevich |
Symmetric Fully Homomorphic Encryption Using Decidable Matrix Equations. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Parth Bhatt, Johny de Souza, Nelson Uto, Jefferson Capovilla, Jose Resende, Danilo Suiama |
Implementation Aspects of MeterGoat, a Smart Meter Security Training Platform. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Greig Paul, James Irvine 0001 |
A Protocol For Storage Limitations and Upgrades in Decentralised Networks. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad A. AlAhmad, Imad Fakhri Alshaikhli |
Design and Analysis of a New Hash Function Gear. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Monika Singh 0001, Divya Bansal, Sanjeev Sofat |
Detecting Malicious Users in Twitter using Classifiers. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Cihangir Tezcan, Halil Kemal Taskin, Murat Demircioglu |
Improbable Differential Attacks on Serpent using Undisturbed Bits. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Bottazzi, Gianluigi Me |
The Botnet Revenue Model. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shahid Alam, Issa Traoré, Ibrahim Sogukpinar |
Current Trends and the Future of Metamorphic Malware Detection. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Peter Pisarcík, Pavol Sokol |
Framework for distributed virtual honeynets. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Kamal Ramli, Karim Djemame |
Autonomic management for convergent networks to support robustness of appliance technologies. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mehrdad Sepehri Sharbaf |
A New Perspective to Information Security: Total Quality Information Security Management. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chalee Vorakulpipat, Chantri Polprasert, Siwaruk Siwamogsatham |
Managing Mobile Device Security in Critical Infrastructure Sectors. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anatoly Malyuk, Natalia G. Miloslavskaya |
Information Security Theory Development. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Alina Trepacheva, Liudmila Babenko |
Known Plaintexts Attack on Polynomial based Homomorphic Encryption. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Md. Sadek Ferdous, Gethin Norman, Ron Poet |
Mathematical Modelling of Identity, Identity Management and Other Related Topics. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Natalia G. Miloslavskaya, Mikhail Senatorov, Alexander I. Tolstoy, Sergey Zapechnikov |
Big Data Information Security Maintenance. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Paraskevas Sarris, Lewis Mackenzie, Soumyadeb Chowdhury |
A Novel Authentication Scheme for Online Transactions. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Adnan 0008, Antonio Lima, Luca Rossi 0004, Suresh Veluru 0001, Paul A. Longley, Mirco Musolesi, Muttukrishnan Rajarajan |
The Uncertainty of Identity Toolset: Analysing Digital Traces for User Profiling. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Smita Naval, Vijay Laxmi, Neha Gupta, Manoj Singh Gaur, Muttukrishnan Rajarajan |
Exploring Worm Behaviors using DTW. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jikku Kuriakose, Vinod P. 0001 |
Towards the Detection of Undetectable Metamorphic Malware. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Hochreiner, Markus Huber 0001, Georg Merzdovnik, Edgar R. Weippl |
Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shivam Aggarwal, Vishal Kumar, S. D. Sudarsan |
Identification and Detection of Phishing Emails Using Natural Language Processing Techniques. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sufyan Salim Mahmood AlDabbagh, Imad Fakhri Taha Al Shaikhli, Mohammad A. AlAhmad |
HISEC: A New Lightweight Block Cipher Algorithm. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Alwyn Goh, Geong Sen Poh, Voon-Yee Vee, Kok Boon Chong, Xin Zhe Khooi, Chanan Zhuo Ern Loh, Zhi Yuan Eng |
Human Visualisation of Cryptographic Code Using Progressive Multi-Scale Resolution. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Atilla Elçi |
Isn't the Time Ripe for a Standard Ontology on Security of Information and Networks? |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hossain Shahriar, Hisham M. Haddad |
Content Provider Leakage Vulnerability Detection in Android Applications. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Abdulaziz Almehmadi, Khalil El-Khatib |
On the Possibility of Insider Threat Detection Using Physiological Signal Monitoring. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hifaa Bait Baraka, Huaglory Tianfield |
Intrusion Detection System for Cloud Environment. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hani Moaiteq Aljahdali, Ron Poet |
Educated Guessing Attacks on Culturally Familiar Graphical Passwords Using Personal Information on Social Networks. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Thu Yein Win, Huaglory Tianfield, Quentin Mair, Taimur Al Said, Omer F. Rana |
Virtual Machine Introspection. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ron Poet, Muttukrishnan Rajarajan (eds.) |
Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014 |
SIN |
2014 |
DBLP BibTeX RDF |
|
1 | Peter Aufner, Georg Merzdovnik, Markus Huber 0001, Edgar R. Weippl |
Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Marco Tiloca |
Efficient Protection of Response Messages in DTLS-Based Secure Multicast Communication. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xavier J. A. Bellekens, Christos Tachtatzis, Robert C. Atkinson, Craig Renfrew, Tony Kirkham |
A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated Intrusion Detection Systems. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Alina Trepacheva |
Cryptanalysis of Polynomial based Homomorphic Encryption. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Amardeep Singh, Divya Bansal, Sanjeev Sofat |
An Approach of Privacy Preserving based Publishing in Twitter. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rahul Kumar, Indraveni K, Aakash Kumar Goel |
Automated Session Fixation Vulnerability Detection in Web Applications using the Set-Cookie HTTP response header in cookies. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Komminist Weldemariam, Hossain Shahriar, Vamshee Krishna Devendran |
Dynamic Analysis of Web Objects. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fawad Khan, Sarmad Ullah Khan, Muhammad Roman, Muhammad Usman Abbasi |
Location Identity Based Content Security Scheme for Content Centric Networking. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ashok Singh Sairam, Rahul Kumar, Pratima Biswas |
Implementation of an Adaptive Traffic-aware Firewall. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Feltus, Damien Nicolas, Claude Poupart |
Towards a HL7 based Metamodeling Integration Approach for Embracing the Privacy of Healthcare Patient Records Administration. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ashish Saini, Ekta Gandotra, Divya Bansal, Sanjeev Sofat |
Classification of PE Files using Static Analysis. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|