Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Niaz Morshed Chowdhury, Lewis M. Mackenzie |
Development of a Threat Model for Vehicular Ad-hoc Network based Accident Warning Systems. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xavier J. A. Bellekens, Christos Tachtatzis, Robert C. Atkinson, Craig Renfrew, Tony Kirkham |
GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie |
Exploring the Guessability of Image Passwords. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shahid Alam, Ibrahim Sogukpinar, Issa Traoré, Yvonne Coady |
In-Cloud Malware Analysis and Detection: State of the Art. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tatiana V. Stepanova, Dmitry P. Zegzhda |
Applying Large-scale Adaptive Graphs to Modeling Internet of Things Security. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ludmila K. Babenko, Oleg B. Makarevich, Dmitry Bespalov, Roman Chesnokov, Yaroslav Trubnikov |
Instrumental System for Analysis of Information Systems Using Smart Cards Protection. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hui Lin 0005, Adam J. Slagell, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer |
Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster). |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Valeriy O. Osipyan |
Mathematical model of the polyalphabetic information security system based on the normal generalized knapsack. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed Saeed 0003, Ali Ahmadinia, Mike Just, Christophe Bobda |
An ID and Address Protection Unit for NoC based Communication Architectures. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ali Reza Honarvar, Ashkan Sami |
CBR Clone Based Software Flaw Detection Issues. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas Mayer, Jocelyn Aubert |
Sector-Specific Tool for Information Security Risk Management in the Context of Telecommunications Regulation (Tool demo). |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sergey Agafin, Anton Krasnopevtsev |
Memory access time as entropy source for RNG. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ecir U. Küçüksille, Mehmet Ali Yalçinkaya, Ozan Uçar |
Physical Dangers in the Cyber Security and Precautions to be Taken. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yogachandran Rahulamathavan, Pramod S. Pawar, Pete Burnap, Muttukrishnan Rajarajan, Omer F. Rana, George Spanoudakis |
Analysing Security requirements in Cloud-based Service Level Agreements. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Avani Sharma, Rajbir Kaur |
Non-cryptographic Detection Approach and Countermeasure for JFDV Attack. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Greig Paul, James Irvine 0001 |
Privacy Implications of Wearable Health Devices. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Naghmeh Moradpoor Sheykhkanloo |
Employing Neural Networks for the Detection of SQL Injection Attack. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Maria Evangelopoulou, Christopher W. Johnson 0001 |
Implementation of Safety Techniques in a Cyber Domain. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Maryam Farajzadeh-Zanjani, Seyed Masoud Alavi Abhari, Alexander G. Chefranov |
Group Key Exchange Protocol Based on Diffie-Hellman Technique in Ad-Hoc Network. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bob Duncan, Mark Whittington |
Compliance with standards, assurance and audit: does this equal security? |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Edward Caprin, Yan Zhang 0003 |
Negotiation Based Framework for Attribute-Based Access Control Policy Evaluation. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ekta Gandotra, Divya Bansal, Sanjeev Sofat |
Integrated Framework for Classification of Malwares. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dusan Klinec, Vashek Matyás |
Traversing symmetric NAT with predictable port allocation. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Artem Garkusha, Evgeny Sergeevich Abramov, Oleg B. Makarevich |
An effectiveness of application of <> competitions concept within higher education (Student contribution). |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer 0001 |
HosTaGe: a Mobile Honeypot for Collaborative Defense. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jérôme Dossogne, Frédéric Lafitte, Dirk Van Heule |
Secure and practical threshold RSA. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hosnieh Rafiee, Christoph Meinel |
Privacy and security in IPv6 networks: challenges and possible solutions. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld |
Cryptanalysis of RC4(n, m) stream cipher. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yüksel Arslan, Yildiray Yalman |
Visual steganalysis of LSB-encoded audio data based on frequency domain characteristics. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Salim Khamadja, Kamel Adi, Luigi Logrippo |
Designing flexible access control models for the cloud. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Gharib, Mohsen Minaei, Morteza Golkari, Ali Movaghar 0001 |
Expert key selection impact on the MANETs' performance using probabilistic key management algorithm. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mudassar Aslam, Christian Gehrmann, Mats Björkman |
Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich |
Digital camera identification system. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sambit Bakshi, Tugkan Tuglular |
Security through human-factors and biometrics. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aurathai Wareesa-ard |
EndNote vs Zotero in searching library catalog via Z39.50 of academic libraries in Thailand. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Evgeny Sergeevich Abramov, Elena Basan, Oleg B. Makarevich |
Development of a secure cluster-based wireless sensor network model. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Salim Khamadja, Kamel Adi, Luigi Logrippo |
An access control framework for hybrid policies. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Kazim, Rahat Masood, Muhammad Awais Shibli |
Securing the virtual machine images in cloud computing. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jérôme Dossogne, Frédéric Lafitte |
On authentication factors: "what you can" and "how you do it". |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Anil Saini, Manoj Singh Gaur, Vijay Laxmi |
The darker side of Firefox extension. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Feltus, Djamel Khadraoui |
Conviction model for incident reaction architecture monitoring based on automatic sensors alert detection. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Geong Sen Poh, Mohd Amril Nurman Mohd Nazir, Bok-Min Goi, Syh-Yuan Tan, Raphael Chung-Wei Phan, Maryam Safiyah Shamsudin |
An authentication framework for peer-to-peer cloud. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Naïm Qachri, Frédéric Lafitte, Olivier Markowitch |
Authenticated key agreement in wireless networks with automated key management. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Lafitte, Olivier Markowitch, Dirk Van Heule |
SAT based analysis of LTE stream cipher ZUC. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yulong Fu, Ousmane Koné |
A finite transition model for security protocol verification. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Valeriy O. Osipyan |
Information protection systems based on universal knapsack problem. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Alexander G. Chefranov, SeyedMasoud Alavi Abhari, Hooman Alavizadeh, Maryam Farajzadeh-Zanjani |
Secure true random number generator in WLAN/LAN. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan |
An improved fault-tolerant conference-key agreement protocol with forward secrecy. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rohan Nanda, P. Venkata Krishna 0001 |
D0M-WLAN: a traffic analysis based approach for detecting malicious activities on wireless networks. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bart Preneel |
The SHA-3 competition: lessons learned. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jérôme Dossogne, Frédéric Lafitte |
Blinded additively homomorphic encryption schemes for self-tallying voting. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shahid Alam, R. Nigel Horspool, Issa Traoré |
MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Soumik Mondal, Patrick Bours, Syed Zulkarnain Syed Idrus |
Complexity measurement of a password for keystroke dynamics: preliminary study. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad AlSa'deh, Christoph Meinel, Florian Westphal, Marian Gawron, Björn Groneberg |
CGA integration into IPsec/IKEv2 authentication. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Parvez Faruki, Vijay Ganmoor, Vijay Laxmi, Manoj Singh Gaur, Ammar Bharmal |
AndroSimilar: robust statistical feature signature for Android malware detection. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Somayeh Taheri, Salke Hartung, Dieter Hogrefe |
Anonymity and privacy in multicast mobile ad hoc networks. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ali Aydin Selçuk |
Trusting SSL in practice. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Duygu Sinanc, Seref Sagiroglu |
A review on cloud security. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | R. K. Shyamasundar |
Security and protection of SCADA: a bigdata algorithmic approach. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Feltus |
Industry program panel. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Pablo Lamilla Álvarez, Yoshiaki Takata |
An HBAC-based approximation for IBAC programs. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Saeid Tizpaz-Niari, Amir Hossein Jahangir |
Verification of OSPF vulnerabilities by colored Petri net. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Georges Ataya |
Linking business goals to information security plans and activities. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Arif Sari, Behnam Rahnama |
Addressing security challenges in WiMAX environment. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ludmila K. Babenko |
Analysis of GOST 28147-89 security: methods and algorithms. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yulong Fu, Ousmane Koné |
Using transition systems to model and verify the implementation of security protocol. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aldjia Boucetta, Kamal Eddine Melkemi |
Hand shape recognition using Hu and Legendre moments. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Casey Mortensen, Ryan Winkelmaier, Jun Zheng 0003 |
Exploring attack vectors facilitated by miniaturized computers. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sattar B. Sadkhan, Nidaa A. Abbass |
Multidisciplinary prospective in cryptology. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marek Klonowski, Michal Koza, Miroslaw Kutylowski |
Efficient and robust data aggregation using untrusted infrastructure. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira |
Towards a dynamic authorisation planning satisfying intra-instance and inter-instance constraints. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Eman Hableel, Young-Ji Byon, Joonsang Baek |
Public key infrastructure for UAE: a case study. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Behnam Rahnama, Yunus Kiran, Raz Dara |
Countering AES static s-box attack. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Leonid S. Bershtein, Alexey A. Tselykh |
A clique-based method for mining fuzzy graph patterns in anti-money laundering systems. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Laxmi, Deepanshu Mehta, Manoj Singh Gaur, Parvez Faruki, Chhagan Lal |
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Feltus, Djamel Khadraoui |
On designing automatic reaction strategy for critical infrastructure SCADA system. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zahra Khani, Reza Azmi |
A protocol for simultaneous use of confidentiality and integrity in large-scale storage systems. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Juan Carlos Moreno, V. B. Surya Prasath, Hugo Proença 0001 |
Robust periocular recognition by fusing local to holistic sparse representations. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Morteza Barati, Karim Faez, Zahra Hakimi |
A novel threshold-based scan detection method using genetic algorithm. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Cihangir Tezcan |
Improbable differential cryptanalysis. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ludmila K. Babenko, Alexandr S. Basan, Oleg B. Makarevich |
Performance analysis of the developed mandatory access control system in the DBMS. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira |
A novel approach for dynamic authorisation planning in constrained workflow systems. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hussain Nyeem, Wageeh W. Boles, Colin Boyd |
Counterfeiting attacks on block-wise dependent fragile watermarking schemes. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, Oleg B. Makarevich (eds.) |
The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013 |
SIN |
2013 |
DBLP BibTeX RDF |
|
1 | Artem S. Konoplev, Maxim O. Kalinin |
Security policy verification in grid systems. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Katharina Krombholz, Heidelinde Hobel, Markus Huber 0001, Edgar R. Weippl |
Social engineering attacks on the knowledge worker. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Valeriy O. Osipyan, A. S. Zhuck, A. H. Arutyunyan, Y. A. Karpenko |
Building of mathematical model of flow data processing system based on given selection of elements of the set. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Oleg B. Makarevich, Irina V. Mashkina, Alina Sentsova |
The method of the information security risk assessment in cloud computing systems. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Abdulaziz Almehmadi, Khalil El-Khatib |
Authorized! access denied, unauthorized! access granted. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Pyatkov Anton, Vyacheslav Zolotarev |
About responsibilities distribution for information security. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hosnieh Rafiee, Christoph Mueller, Lukas Niemeier, Jannik Streek, Christoph Sterz, Christoph Meinel |
A flexible framework for detecting IPv6 vulnerabilities. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hossain Shahriar, Vamshee Krishna Devendran, Hisham Haddad |
ProClick: a framework for testing clickjacking attacks in web applications. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hossain Shahriar |
Security vulnerabilities and mitigation techniques of web applications. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Edward Caprin, Yan Zhang 0003, Khaled M. Khan |
Social access control language (SocACL). |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ksenia Tsyganok, Evgeny Tumoyan, Lyudmila K. Babenko |
Development the method of detection the malicious pages interconnection in the internet. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Isao Nakanishi, Hironao Fukuda, Shigang Li 0001 |
Biometric verification using brain waves toward on-demand user management systems: performance differences between divided regions in α - β wave band. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sarmad Ullah Khan, Rafiullah Khan |
Content-location based key management scheme for content centric networks. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Md. Sadek Ferdous, Ron Poet |
Analysing attribute aggregation models in federated identity management. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Manoj Singh Gaur, Dhiren R. Patel, Anil Saini |
Insecurities within browser: issues and challenges. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wolter Pieters, Julian A. Padget, Francien Dechesne, Virginia Dignum, Huib Aldewereld |
Obligations to enforce prohibitions: on the adequacy of security policies. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|