Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Maxim Anikeev, Felix C. Freiling |
Preventing malicious data harvesting from deallocated memory areas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 448-449, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Herman Isa, Norziana Jamil, Muhammad Reza Z'aba |
S-box construction from non-permutation power functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 46-53, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad A. AlAhmad, Imad Fakhri Alshaikhli, Mridul Nandi |
Joux multicollisions attack in sponge construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 292-296, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Erkay Savas |
Attacks on implementations of cryptographic algorithms: side-channel and fault attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 7-14, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Guy Guemkam, Jonathan Blangenois, Christophe Feltus, Djamel Khadraoui |
Metamodel for reputation based agents system: case study for electrical distribution SCADA design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 251-255, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ramachandra Raghavendra, Kiran B. Raja, Bian Yang, Christoph Busch 0001 |
Improved face recognition at a distance using light field camera & super resolution schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 413-416, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | T. Mekhaznia |
Nature inspired heuristics for attack of simplified DES algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 311-315, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | N. Rajamanickam, R. Nadarajan |
Implementing real-time transactional security property using timed edit automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 429-432, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lihui Hu, Jean Mayo, Charles Wallace 0001 |
An empirical study of three access control systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 287-291, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Romdhane Ben Younes, Guy Tremblay |
A possibilistic approach to intrusion detection under imperfect logging protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 266-271, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ziyad Tariq Mustafa Al-Ta'l, Omar Younis Abdulhameed |
Features extraction of fingerprints using firefly algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 392-395, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Evgeny Sergeevich Abramov, Maxim Kobilev, Oleg B. Makarevich |
Using quadrocopter as a pentest tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 404-407, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Georges Ataya |
Information security, risk governance and management frameworks: an overview of COBIT 5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 3-5, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nikolay Sergeev, Alexey A. Tselykh, Alexander N. Tselykh |
Generalized approach to modeling user activity graphs for network security and public safety monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 117-122, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ludmila K. Babenko, Evgeniya Ishchukova |
Influence of S-Boxes to the resistance of GOST algorithm against linear cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 352-355, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur, P. Vinod 0001 |
Mining control flow graph as API call-grams to detect portable executable malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 130-137, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Pawan Kumar, Virendra Singh |
Efficient regular expression pattern matching for network intrusion detection systems using modified word-based automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 103-110, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Luís Mendonça, Henrique Santos 0001 |
Botnets: a heuristic-based detection framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 33-40, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Valeriy O. Osipyan |
Building of alphabetic data protection cryptosystems on the base of equal power knapsacks with Diophantine problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 124-129, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Priyanka Singh, Suneeta Agarwal |
A region specific robust watermarking scheme based on singular value decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 117-123, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Debojit Boro, Bernard Nongpoh, Dhruba K. Bhattacharyya |
Anomaly based intrusion detection using meta ensemble classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 143-147, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi, Rakesh Kumar Tiwari |
Detection of incorrect position information using speed and time span verification in VANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 53-59, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Feltus, Eric Dubois 0001, Erik Proper, Iver Band, Michaël Petit |
Enhancing the ArchiMate® standard with a responsibility modeling language for access rights management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 12-19, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ajay Chaudhary, Manoj Misra, Anjali Sardana |
An efficient fuzzy controller based technique for network traffic classification to improve QoS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 95-102, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Herman Isa, Muhammad Reza Z'aba |
Randomness analysis on LED block ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 60-66, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Apurba Das, S. Kavitha |
Hybridization of DCTune and psycho-visual saliency model to improve security and capacity in DCT based image watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 168-172, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry Chernyavskiy, Natalia G. Miloslavskaya |
A concept of unification of network security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 27-32, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ksenia Tsyganok, Evgeny Tumoyan, Ludmila K. Babenko, Maxim Anikeev |
Classification of polymorphic and metamorphic malware samples based on their behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 111-116, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Prerana Sharma, Devesh Mishra, Ankur Agarwal |
Efficient image encryption and decryption using discrete wavelet transform and fractional Fourier transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 153-157, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Anjana V. Kumar, Kalpa Vishnani, K. Vinay Kumar |
Split personality malware detection and defeating in popular virtual machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 20-26, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Smita Naval, Vijay Laxmi, Manoj Singh Gaur, P. Vinod 0001 |
ESCAPE: entropy score analysis of packed executable. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 197-200, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nilanjan Dey, Poulami Das 0002, Sheli Sinha Chaudhuri, Achintya Das |
Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar's method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 87-94, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Reena Gunjan, Vijay Laxmi, Manoj Singh Gaur |
Detection attack analysis using partial watermark in DCT domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 188-192, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chirag Modi 0001, Dhiren R. Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan |
A novel framework for intrusion detection in cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 67-74, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kunal Sain, Mradula Sharma, Suneeta Agarwal |
(Student contribution) ASPS: an authentication scheme using pre-formed visual cryptographic shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 183-187, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sajal Bhatia, Desmond Allan Schmidt, George M. Mohay |
Ensemble-based DDoS detection and mitigation model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 79-86, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Priyanka Loya, Alwyn Roshan Pais |
SIRIS: secure IRIS authentication system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 148-152, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Soumya Maity, Soumya Kanti Ghosh 0001 |
Enforcement of access control policy for mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 47-52, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Geong Sen Poh, Kok-Lim Alvin Yau, Mee Hong Ling |
Analysis of a secure cooperative channel sensing protocol for cognitive radio networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 41-46, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Evgeny Sergeevich Abramov, Elena Barannik, Oleg B. Makarevich |
Methods of automated analysis of vendor specific implementation of stateful-filtration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 158-162, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hiroshi Tsunoda, Glenn Mansfield Keeni |
Security by simple network traffic monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 201-204, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Manoj Singh Gaur, Atilla Elçi, Oleg B. Makarevich, Mehmet A. Orgun, Virendra Singh (eds.) |
5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![ACM, 978-1-4503-1668-2 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Ludmila K. Babenko, Evgeniya Ishchukova, Ekaterina Maro |
Research about strength of GOST 28147-89 encryption algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 138-142, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Behnam Rahnama, Atilla Elçi, Ibukun Eweoya |
Fine tuning the advanced encryption standard (AES). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 205-209, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Preety Singh, Vijay Laxmi, Manoj Singh Gaur |
Lip peripheral motion for visual surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 173-177, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | K. V. Arya, Hemant Kumar |
A clustering based algorithm for network intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 193-196, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | A. M. Chandrashekar, K. Raghuveer |
Fusion of multiple data mining techniques for effective network intrusion detection: a contemporary approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 178-182, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Eugene Tumoyan, Daria Kavchuk |
The method of optimizing the automatic vulnerability validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 75-78, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Gunjan Bansal, Niteesh Kumar, Sukumar Nandi, Santosh Biswas |
Detection of NDP based attacks using MLD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 163-167, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Atilla Elçi, Behnam Rahnama, Reza Makvandi |
Microcontroller-based implementation of parsekey+ for limited resources embedded applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 259-262, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Haichang Gao, Licheng Ma, Jinhua Qiu, Xiyang Liu |
Exploration of a hand-based graphical password scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 143-150, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bogdan Korel, Shangping Ren, Kevin A. Kwiat, Arnaud Auguste, Alban Vignaux |
Improving operation time bounded mission critical systems' attack-survivability through controlled source-code transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 183-190, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mehmet A. Orgun, Atilla Elçi, Oleg B. Makarevich, Sorin A. Huss, Josef Pieprzyk, Lyudmila K. Babenko, Alexander G. Chefranov, Rajan Shankaran (eds.) |
Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![ACM, 978-1-4503-1020-8 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Ludmila K. Babenko, Evgeniya Ishchukova, Ekaterina Maro |
Algebraic analysis of GOST encryption algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 57-62, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Haitham S. Al-Sinani, Chris J. Mitchell |
Extending the Scope of cardspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 235-238, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Suleyman Kondakci |
Obscurity of network security course curriculum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 219-222, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Lo Re, Fabrizio Milazzo, Marco Ortolani |
Secure random number generation in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 175-182, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Peralta, Supratik Mukhopadhyay, Ramesh Bharadwaj |
Counterfactually reasoning about security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 223-226, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Boulares Ouchenne, Ousmane Koné |
Formal analysis of usage control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 231-234, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ravishankar Borgaonkar, Kevin Redon, Jean-Pierre Seifert |
Security analysis of a femtocell device. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 95-102, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zhaogong Guo, Kouichi Yasaki, Yousuke Nakamura, Kazuaki Nimura, Isamu Yamada |
Proposal and implementation of enhanced HDD authentication that enables self-wipe. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 255-258, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chun Ruan, Seyed A. Shahrestani |
Logic based authorization program and its implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 87-94, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kevin A. Kwiat |
Fault tolerance for fight-through: a basis for strategic survival. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 1-2, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala |
Counteracting DDoS attacks in WLAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 119-126, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi, Andrea Palomba |
Fault attack to the elliptic curve digital signature algorithm with multiple bit faults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 63-72, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mufeed Juma AlMashrafi, Kenneth Koon-Ho Wong, Leonie Simpson, Harry Bartlett, Ed Dawson |
Algebraic analysis of the SSS stream cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 199-204, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mahmoud Elkhodr, Seyed A. Shahrestani, Hon Cheung |
An approach to enhance the security of remote health monitoring systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 205-208, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Z. Tirkel, Thomas E. Hall, Charles F. Osborne, Nicholas Meinhold, Oscar Moreno |
Collusion resistant fingerprinting of digital audio. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 5-12, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shu-guang Dai, Chun-Ming Tang 0003, Yuenai Chen |
The optimal linear multi-secret sharing scheme for non-threshold access structure(student contribution). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 43-48, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Geong Sen Poh, Muhammad Reza Z'aba |
On the security and practicality of a buyer seller watermarking protocol for DRM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 251-254, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Valeriy O. Osipyan |
Different models of information protection system, based on the functional knapsack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 215-218, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Martin Ågren, Martin Hell |
Cryptanalysis of the stream cipher BEAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 21-28, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Iynkaran Natgunanathan, Yong Xiang 0001 |
Echo hiding based stereo audio watermarking against pitch-scaling attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 37-42, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Wei-Kuo Chiang, Jian-Hao Chen |
TW-KEAP: an efficient four-party key exchange protocol for end-to-end communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 167-174, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi, Nitesh Kumar Prajapati |
A sybil attack detection approach using neighboring vehicles in VANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 151-158, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Nassar 0001, Sylvain Martin, Guy Leduc, Olivier Festor |
Using decision trees for generating adaptive SPIT signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 13-20, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | William Huba, Bo Yuan 0005, Daryl Johnson, Peter Lutz |
A HTTP cookie covert channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 133-136, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mufeed Juma AlMashrafi |
A different algebraic analysis of the ZUC stream cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 191-198, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hosnieh Rafiee, Ahmad AlSa'deh, Christoph Meinel |
WinSEND: Windows SEcure Neighbor Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 243-246, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Manoj Singh Gaur, Vijay Laxmi, Lakshminarayanan V., Kamal Cahndra, Mark Zwolinski |
Acceleration of packet filtering using gpgpu. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 227-230, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Manoj Singh Gaur, Vijay Laxmi, Manish Kumar, Rajbir Kaur |
Detour attack in OLSR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 137-142, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Anderson Nunes Paiva Morais, Ana R. Cavalli, Eliane Martins |
A model-based attack injection approach for security validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 103-110, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Helena Rifà-Pous, Carles Garrigues |
A secure and anonymous cooperative sensing protocol for cognitive radio networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 127-132, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michio Sonoda, Takeshi Matsuda, Daiki Koizumi, Shigeichi Hirasawa |
On automatic detection of SQL injection attacks by the feature extraction of the single character. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 81-86, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Amine Elabidi, Ghazi Ben Ayed, Sonia Mettali Gammar, Farouk Kamoun |
Towards hiding federated digital identity: stop-dissemination mechanism in content-centric networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 239-242, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Liang Ming, Minhuan Huang, Dongxia Wang 0001, Xiaohui Kuang, Chunlei Wang, Xuewei Feng |
Research on survivability metrics based on survivable process of network system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 247-250, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Liang Cheng 0004, Yang Zhang 0021 |
Model checking security policy model using both UML static and dynamic diagrams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 159-166, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ferdous A. Barbhuiya, Santosh Biswas, Sukumar Nandi |
Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 111-118, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shameek Bhattacharjee, Saptarshi Debroy, Mainak Chatterjee, Kevin A. Kwiat |
Trust based fusion over noisy channels through anomaly detection in cognitive radio networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 73-80, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Jafarabadi, Mohammad Abdollahi Azgomi |
On the impacts of join and leave on the propagation ratio of topology-aware active worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 209-214, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Evgeny Sergeevich Abramov, Artem Viktorovich Andreev, Denis Valerievich Mordvin, Oleg B. Makarevich |
Corporate networks security evaluation based on attack graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 29-36, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Long Hoang Nguyen 0001 |
Rational distance-bounding protocols over noisy channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 49-56, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Varadharajan |
Rethinking cyber security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011, pp. 3-4, 2011, ACM, 978-1-4503-1020-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alexander I. Tolstoy, Natalia G. Miloslavskaya |
Bachelor of information security: ("automated systems security profile"). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 32-37, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kazim Yumbul, Serdar Süer Erdem, Erkay Savas |
Design and implementation of robust embedded processor for cryptographic applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 178-185, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Meisam S. A. Najjar, Mohammad Abdollahi Azgomi |
A distributed multi-approach intrusion detection system for web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 238-244, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi |
A novel defense mechanism against sybil attacks in VANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 249-255, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pedro D. Salgueiro, Salvador Abreu |
A DSL for intrusion detection based on constraint programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 224-232, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Takeshi Takahashi 0001, Youki Kadobayashi, Hiroyuki Fujiwara |
Ontological approach toward cybersecurity in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 100-109, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Soumya Maity, Padmalochan Bera, Soumya Kanti Ghosh 0001 |
A mobile IP based WLAN security management framework with reconfigurable hardware acceleration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010, pp. 218-223, 2010, ACM, 978-1-4503-0234-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|