Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Rosanne English, Ron Poet |
Measuring the revised guessability of graphical passwords. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Boris Rozenberg, Yaron Gonen, Ehud Gudes, Nurit Gal-Oz, Erez Shmueli |
Tracking end-users in web databases. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Patryk Szewczyk |
Usability of Internet Security Software: Have they got it right? |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Steffen Bartsch |
Exploring twisted paths: Analyzing authorization processes in organizations. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | V. Koulolias, A. Kountzeris, Herbert Leitold, Bernd Zwattendorfer, A. Crespo, M. Stern |
STORK e-privacy and security. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Peter Amthor 0001, Winfried E. Kühnhauser, Anja Pölck |
Model-based safety analysis of SELinux security policies. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Pierangela Samarati, Sara Foresti, Jiankun Hu, Giovanni Livraga (eds.) |
5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011 |
NSS |
2011 |
DBLP BibTeX RDF |
|
1 | Martin Mihajlov, Saso Josimovski, Borka Jerman-Blazic |
A conceptual framework for evaluating usable security in authentication mechanisms - usability perspectives. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy 0001, Mohamed Almorsy |
CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Böhm 0003, Maximilian Hofer, Wolfgang Pribyl |
A microcontroller SRAM-PUF. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rosanne English, Ron Poet |
Towards a metric for recognition-based graphical password security. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Serge Chaumette, Olivier Ly, Renaud Tabary |
Automated extraction of polymorphic virus signatures using abstract interpretation. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake |
Automatic security verification for 3-party authentication and key exchange protocols. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Marco Botta, Davide Cavagnino, Victor Pomponiu |
KL-F: Karhunen-Loève based fragile watermarking. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bassem Bakhache, Joseph M. Ghazal, Safwan El Assad |
Enhancement of ZigBee and Wi-Fi security by a robust and fast chaotic algorithm. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mirko Montanari, Roy H. Campbell |
Attack-resilient compliance monitoring for large distributed infrastructure systems. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | David Zage, Charles Edwin Killian, Cristina Nita-Rotaru |
Removing the blinders: Using information to mitigate adversaries in adaptive overlays. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ziyad S. Al-Salloum, Stephen D. Wolthusen |
A propagation model of a vulnerability mitigation computer worm - seawave. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yuanyuan Zhang 0002, Wassim Znaidi, Cédric Lauradoux, Marine Minier |
Flooding attacks against network coding and countermeasures. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Eesa A. Alsolami, Colin Boyd, Andrew J. Clark, Irfan Ahmed 0001 |
User-representative feature selection for keystroke dynamics. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina De Capitani di Vimercati, Pierangela Samarati, Sara Foresti, Jiankun Hu |
Foreword from the Conference Chairs. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Arash Afshar, Mehran S. Fallah |
Reconstructing security types for automated policy enforcement in FABLE. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nataliia Bielova, Dominique Devriese, Fabio Massacci, Frank Piessens |
Reactive non-interference for a browser model. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Marta Fernández-Diego, Julián Marcelo-Cocho |
Modelling self-protected networks and dynamic systems. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Abdulbasit Ahmed, Alexei Lisitsa 0001, Clare Dixon |
A misuse-based network Intrusion Detection System using Temporal Logic and stream processing. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bernd Zwattendorfer, Arne Tauber, Thomas Zefferer |
A privacy-preserving eID based Single Sign-On solution. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nathan S. Evans, Christian Grothoff |
R5N: Randomized recursive routing for restricted-route networks. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yang Zhong, Hirofumi Yamaki, Hiroki Takakura |
A grid-based clustering for low-overhead anomaly intrusion detection. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Martine Bellaïche, Jean-Charles Grégoire |
Avoiding DDoS with active management of backlog queues. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Florian Kerschbaum |
Secure conjunctive keyword searches for unstructured text. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Robert Koch 0002, Dominik Holzapfel, Gabi Dreo Rodosek |
Data control in social networks. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia Wagner, Jérôme François, Radu State, Thomas Engel 0001 |
DANAK: Finding the odd! |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Huiyun Li, Qi Zhang, Hai Yuan |
Channel state information based key generation vs. side-channel analysis key information leakage. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mazdak Alimadadi, Mehran S. Fallah |
A distributed client-puzzle mechanism to mitigate bandwidth attacks. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Samia A. Ali, Refaat M. Mohamed, Mahmoud H. Fahim |
RCHB: Light-weight, provably-secure variants of the HB protocol using rotation and complementation. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jiang Ming 0002, Haibin Zhang, Debin Gao |
Towards ground truthing observations in gray-box anomaly detection. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xabier Ugarte-Pedrero, Igor Santos, Pablo García Bringas, Mikel Gastesi, José Miguel Esparza |
Semi-supervised learning for packed executable detection. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Amir Averbuch, Michael Kiperberg, Nezer Zaidenberg |
An efficient VM-based software protection. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sophie Gastellier-Prevost, Maryline Laurent |
Defeating pharming attacks at the client-side. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sheng Wei 0001, Miodrag Potkonjak |
Scalable consistency-based hardware trojan detection and diagnosis. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Khalid Nasr, Anas Abou El Kalam, Christian Fraboul |
A holistic methodology for evaluating wireless Intrusion Detection Systems. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yu Wang 0017, Yang Xiang 0001, Jun Zhang 0010, Shun-Zheng Yu |
A novel semi-supervised approach for network traffic clustering. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ravi Jhawar, Philip Inglesant, Nicolas T. Courtois, Martina Angela Sasse |
Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Panagiotis Rizomiliotis, Evangelos Rekleitis, Stefanos Gritzalis |
Designing secure RFID authentication protocols is (still) a non-trivial task. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nizar Ben Neji, Adel Bouhoula |
Towards safe and optimal filtering rule reordering for complex packet filters. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bofeng Zhang, Yuan Li, Yujing Liu, Jinshu Su |
Analysis of prefix hijacking based on AS hierarchical model. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nathalie Baracaldo, Amirreza Masoumzadeh 0001, James Joshi |
A secure, constraint-aware role-based access control interoperation framework. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alessio Bonti, Ming Li 0010, Wen Shi |
Improving P2P IPTV random peers search through user similarity. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell |
SMS linguistic profiling authentication on mobile device. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Renato Accornero, Daniele Rispoli, Francesco Bergadano |
Privacy-enhanced identity via browser extensions and linking services. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Gallo, Henrique Kawakami, Ricardo Dahab |
FORTUNA - A probabilistic framework for early design stages of hardware-based secure systems. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ayda Saïdane, Nicolas Guelfi |
Towards improving security testability of AADL architecture models. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Maurizio Adriano Strangio |
On the security of the ECKE-1N and EECKE-1N elliptic-curve key agreement protocols. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tony Cheneau, Andrei Vlad Sambra, Maryline Laurent |
A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sami Alsouri, Stefan Katzenbeisser 0001, Sebastian Biedermann |
Trustable outsourcing of business processes to cloud computing environments. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Valentim Oliveira, Tito Silva |
The power of credit card numbers and long CVVs. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yini Wang, Sheng Wen, Yang Xiang 0001 |
Modeling worms propagation on probability. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Ali Iqbal, Maximilian Ott, Aruna Seneviratne |
Resource Selection from Distributed Semantic Web Stores. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xu Huang 0001, Shirantha Wijesekera, Dharmendra Sharma 0001 |
Secure Communication in 802.11 Networks with a Novel Protocol Using Quantum Cryptography. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Matthieu-P. Schapranow, Alexander Zeier, Hasso Plattner |
A Dynamic Mutual RFID Authentication Model Preventing Unauthorized Third Party Access. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shan Juan Xie, Sook Yoon, Hui Gong, Jin Wook Shin, Dong Sun Park |
Fingerprint Reference Point Determination Based on Orientation Features. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Juan E. Tapiador, John A. Clark |
Information-Theoretic Detection of Masquerade Mimicry Attacks. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yi Zhuang 0001 |
A Pivot-Based Distributed Pseudo Facial Image Retrieval in Manifold Spaces: An Efficiency Study. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alban Gabillon, Léo Letouzey |
A View Based Access Control Model for SPARQL. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yuping Wang 0003, Lei Fan |
A Smoothing Evolutionary Algorithm with Circle Search for Global Optimization. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chunli Lv, Xiaoqi Jia, Lijun Tian, Jiwu Jing, Mingli Sun |
Efficient Ideal Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR Operations. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lili Sun, Hua Wang 0002, Raj Jururajin, Sri Sriprakash |
A Purpose Based Access Control in XML Databases System. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shamsul Kamal Ahmad Khalid, Jacob Zimmermann, Diane Corney, Colin J. Fidge |
Automatic Generation of Assertions to Detect Potential Security Vulnerabilities in C Programs That Use Union and Pointer Types. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Islam Tharwat Abdel-Halim, Hossam M. A. Fahmy, Ayman M. Bahaa El-Din, Mohamed H. El-Shafey |
Agent-Based Trusted On-Demand Routing Protocol for Mobile Ad Hoc Networks. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rong-Jian Chen, Yu-Cheng Peng, Jun-Jian Lin, Jui-Lin Lai, Shi-Jinn Horng |
Novel Multi-bit Bitwise Adaptive Embedding Algorithms with Minimum Error for Data Hiding. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yinghua Guo, Ivan Lee |
Forensic Analysis of DoS Attack Traffic in MANET. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Min-Hua Shao, Ying-Chih Chin |
A Novel Approach to Dynamic ID-Based Remote User Authentication Scheme for Multi-server Environment. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Eder Mateus Nunes Gonçalves |
An Approach to Specify Knowledge in Multi-agent Systems Using Petri Nets. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Min Li, Hua Wang 0002 |
Specifying Usage Control Model with Object Constraint Language. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Adonis P. H. Fung, K. W. Cheung 0003 |
HTTPSLock: Enforcing HTTPS in Unmodified Browsers with Cached Javascript. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Steven Simpson, Adam T. Lindsay, David Hutchison 0001 |
Identifying Legitimate Clients under Distributed Denial-of-Service Attacks. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Reginald Lal, Andrew Chiou |
Computational Intelligence Utilisation in Simulation of Congestion Control in TCP/IP Edge Network. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | António Rosado, João M. P. Cardoso |
A Query Processing Strategy for Conceptual Queries Based on Object-Role Modeling. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chaabane Abdelberi, Pere Manils, Mohamed Ali Kâafar |
Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Girija Chetty, Monica Biswas, Rashmi Singh |
Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Len Bui, Dat Tran 0001, Xu Huang 0001, Girija Chetty |
Face Gender Recognition Based on 2D Principal Component Analysis and Support Vector Machine. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Farzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini |
A Rights Management Approach to Securing Data Distribution in Coalitions. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ion Alberdi, Vincent Nicomette, Philippe Owezarski |
Luth: Composing and Parallelizing Midpoint Inspection Devices. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Fengyu Wang, Bin Gong, Shanqing Guo, Xiaofeng Wang |
Monitoring Heavy-Hitter Flows in High-Speed Network Concurrently. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chuan-Long Wang, Yan-Ping Wang |
The Convergences of Multisplitting Parallel Methods for Non-Hermitian Positive Definite Systems. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng, Feng Bao 0001 |
Efficient Proof of Validity of Votes in Homomorphic E-Voting. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | M. Manzur Murshed, Tishna Sabrina, Anindya Iqbal, Kh Mahmudul Alam |
A Novel Anonymization Technique to Trade Off Location Privacy and Data Integrity in Participatory Sensing Systems. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mansoor Alicherry, Angelos D. Keromytis |
DIPLOMA: Distributed Policy Enforcement Architecture for MANETs. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Qussai Yaseen, Brajendra Panda |
Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders' Knowledgebase. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Liang Fu Lu, Mao Lin Huang, Mehmet A. Orgun, Jiawan Zhang |
An Improved Wavelet Analysis Method for Detecting DDoS Attacks. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Jabas, Wael Abdulal, Ramachandram Sirandas |
An Efficient and High Scalable Key Distribution Scheme for Mobile Ad Hoc Network through Mining Traffic Meta-data Patterns. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel 0001, Alexandre Dulaunoy |
Breaking Tor Anonymity with Game Theory and Data Mining. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chih-Lun Chou, Gwo-Jiun Horng, Sheng-Tzong Cheng |
Fast IPTV Channel Switching Using Hot-View and Personalized Channel Preload over IEEE 802.16e. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ji Zhang |
An Efficient and Effective Duplication Detection Method in Large Database Applications. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ray Hunt, Jill Slay |
The Design of Real-Time Adaptive Forensically Sound Secure Critical Infrastructure. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hao Gao, Jun Yan 0005, Yi Mu 0001 |
Dynamic Trust Model for Federated Identity Management. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pål Halvorsen, Dag Johansen, Bjørn Olstad, Tomas Kupka, Sverre Tennøe |
vESP: A Video-Enabled Enterprise Search Platform. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Fabrício da Costa Dias, Ryan Ribeiro de Azevedo, Cleyton Mário de Oliveira Rodrigues, Eric Rommel Dantas Galvão, Guilherme Ataíde Dias, Roberto Souto Maior de Barros |
OntoPsic: Leveraging the Knowledge in the Treatment and Diagnosis of Telepsychiatry. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xu Huang, John Campbell 0001, Frank Gao |
Scalar Multiplication of a Dynamic Window with Fuzzy Controller for Elliptic Curve Cryptography. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ping Li 0037, Guangdong Huang |
Credit Spread Option Pricing by Dynamic Copulas. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|