Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Adrian Dabrowski, Heidelinde Hobel, Johanna Ullrich, Katharina Krombholz, Edgar R. Weippl |
Towards a Hardware Trojan Detection Cycle. |
ARES |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Haruno Kataoka, Yohei Ogawa, Isao Echizen, Tetsuji Kuboyama, Hiroshi Yoshiura |
Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisation. |
ARES |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Emad Elabd, Mohand-Said Hacid |
Concurrent Queries in Location Based Services. |
ARES |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen |
A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure. |
ARES |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Karin Bernsmed, Daniela S. Cruzes, Martin Gilje Jaatun, Børge Haugset, Erlend Andreas Gjære |
Healthcare Services in the Cloud - Obstacles to Adoption, and a Way Forward. |
ARES |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Henk Birkholz, Ingo Sieverdingbeck |
Supporting Security Automation for Multi-chassis Link Aggregation Groups via the Interconnected-Asset Ontology. |
ARES |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Christian Sillaber, Ruth Breu |
Quality Matters: Systematizing Quality Deficiencies in the Documentation of Business Security Requirements. |
ARES |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Martin Jauernig, Matthias Neugschwandtner, Christian Platzer, Paolo Milani Comparetti |
Lobotomy: An Architecture for JIT Spraying Mitigation. |
ARES |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Aziz |
A Formal Model and Analysis of the MQ Telemetry Transport Protocol. |
ARES |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Martin Husák, Jakub Cegan |
PhiGARo: Automatic Phishing Detection and Incident Response Framework. |
ARES |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jun Pang 0001, Yang Zhang 0016 |
A New Access Control Scheme for Facebook-Style Social Networks. |
ARES |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Igor V. Kotenko, Evgenia Novikova |
Visualization of Security Metrics for Cyber Situation Awareness. |
ARES |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Athanasios C. Rakitzis, Petros E. Maravelakis, Philippe Castagliola |
A Comparative Study of Control Charts for Zero-Inflated Binomial Processes. |
ARES |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yu Ichifuji, Noboru Sonehara |
Visualization of Recovery Situation in Disaster Area by Using Web Reservation Data. |
ARES |
2014 |
DBLP DOI BibTeX RDF |
|
1 | François Lesueur, Sabina Surdu, Romuald Thion, Yann Gripay, Meriam Ben-Ghorbel-Talbi |
Palpable Privacy through Declarative Information Flows Tracking for Smart Buildings. |
ARES |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Maciej Piec, Andreas Rauber |
Real-Time Screen Watermarking Using Overlaying Layer. |
ARES |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Aswami Ariffin, Christian D'Orazio, Kim-Kwang Raymond Choo, Jill Slay |
iOS Forensics: How Can We Recover Deleted Image Files with Timestamp in a Forensically Sound Manner? |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Denisse Muñante, Laurent Gallon, Philippe Aniorté |
An Approach Based on Model-Driven Engineering to Define Security Policies Using OrBAC. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jurlind Budurushi, Stephan Neumann, Maina M. Olembo, Melanie Volkamer |
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Seiji Munetoh, Nobukazu Yoshioka |
Model-Assisted Access Control Implementation for Code-centric Ruby-on-Rails Web Application Development. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hiroshi Maruyama, Kiyoshi Watanabe, Sachiko Yoshihama, Naohiko Uramoto, Yoichiro Takehora, Kazuhiro Minami |
ICHIGAN Security - A Security Architecture That Enables Situation-Based Policy Switching. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Iryna Windhorst, Ali Sunyaev |
Dynamic Certification of Cloud Services. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christian Raspotnig, Vikash Katta, Péter Kárpáti, Andreas L. Opdahl |
Enhancing CHASSIS: A Method for Combining Safety and Security. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Moussa Ouedraogo, Manel Khodja, Djamel Khadraoui |
Towards a Risk Based Assessment of QoS Degradation for Critical Infrastructure. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Debmalya Biswas, Imad Aad, Gian Paolo Perrucci |
Privacy Panel: Usable and Quantifiable Mobile Privacy. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mirko Haustein, Herbert Sighart, Dennis Titze, Peter Schoo |
Collaboratively Exchanging Warning Messages between Peers While under Attack. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vikash Katta, Christian Raspotnig, Péter Kárpáti, Tor Stålhane |
Requirements Management in a Combined Process for Safety and Security Assessments. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Gunnar Schomaker, Andreas Herrholz, Guillaume Duc, Renaud Pacalet, Salvatore Raho, Miltos D. Grammatikakis, Marcello Coppola, Ignacio Garcia Vega |
TRESCCA - Trustworthy Embedded Systems for Secure Cloud Computing. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Beatriz Gallego-Nicasio Crespo |
User Interface Harmonization for IT Security Management: User-Centered Design in the PoSecCo Project. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David A. Mundie, David M. McIntire |
An Ontology for Malware Analysis. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Woohyun Shim, Fabio Massacci, Martina de Gramatica, Alessandra Tedeschi, Alessandro Pollini |
Evaluation of Airport Security Training Programs: Perspectives and Issues. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christian Richthammer, Michael Netter, Moritz Riesner, Günther Pernul |
Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User Control. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Federica Paci, M. Carmen Fernández Gago, Francisco Moyano |
Detecting Insider Threats: A Trust-Aware Framework. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Eric Chan-Tin, Jiyoung Shin, Jiangmin Yu |
Revisiting Circuit Clogging Attacks on Tor. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Martin Hawley, Paul Howard, Rainer Koelle, Peter Saxton |
Collaborative Security Management: Developing Ideas in Security Management for Air Traffic Control. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Henk Birkholz, Ingo Sieverdingbeck, Nicolai Kuntze, Carsten Rudolph |
Enhancing Security Testing via Automated Replication of IT-Asset Topologies. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra |
Probabilistic Contract Compliance for Mobile Applications. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kristian Beckers, Maritta Heisel, Isabelle Côté, Ludger Goeke, Selim Güler |
Structured Pattern-Based Security Requirements Elicitation for Clouds. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jostein Jensen, Åsmund Ahlmann Nyre |
Federated Identity Management and Usage Control - Obstacles to Industry Adoption. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jean-François Lalande, Steffen Wendzel |
Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rainer Koelle, Walter Strijland, Stefan Roels |
Towards Harmonising the Legislative, Regulatory, and Standards-Based Framework for ATM Security: Developing a Software Support Tool. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hongzhe Li, Taebeom Kim, Munkhbayar Bat-Erdene, Heejo Lee |
Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ge Zhang 0001, Simone Fischer-Hübner |
Counteract DNS Attacks on SIP Proxies Using Bloom Filters. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jakub Breier, Ladislav Hudec |
On Selecting Critical Security Controls. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Martin Gilje Jaatun, Tor Erlend Fægri |
Sink or SWIM: Information Security Requirements in the Sky. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Eckehard Hermann, Rüdiger Grimm |
The Common Limes Security Model for Asset Flow Control in Decentralized, Insecure Systems. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Angelos D. Keromytis |
A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kahina Lazri, Sylvie Laniepce, Jalel Ben-Othman |
Reconsidering Intrusion Monitoring Requirements in Shared Cloud Platforms. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Enrico Sorio, Alberto Bartoli, Eric Medvet |
Detection of Hidden Fraudulent URLs within Trusted Sites Using Lexical Features. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dan Fleck, Arnur G. Tokhtabayev, Alex Alarif, Angelos Stavrou, Tomas Nykodym |
PyTrigger: A System to Trigger & Extract User-Activated Malware Behavior. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Igor V. Kotenko, Olga Polubelova, Igor Saenko 0001, Elena Doynikova |
The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Amir Herzberg, Haya Schulmann |
DNSSEC: Interoperability Challenges and Transition Mechanisms. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kristian Beckers, Maritta Heisel |
A Usability Evaluation of the NESSoS Common Body of Knowledge. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Gerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio |
A Classifier of Malicious Android Applications. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jason L. Wright, Jason W. Larsen, Miles McQueen |
Estimating Software Vulnerabilities: A Case Study Based on the Misclassification of Bugs in MySQL Server. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jaemin Park, Kiyoung Baek, Cheoloh Kang |
Secure Profile Provisioning Architecture for Embedded UICC. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christos Koukouvinos, Christina Parpoula, Dimitris E. Simos |
Genetic Algorithm and Data Mining Techniques for Design Selection in Databases. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | York Yannikos, Christian Winter 0001 |
Model-Based Generation of Synthetic Disk Images for Digital Forensic Tool Testing. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Fabrizio Baiardi, Fabio Corò, Federico Tonelli, Luca Guidi |
GVScan: Scanning Networks for Global Vulnerabilities. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Memiko Otsuki, Noboru Sonehara |
Estimating the Value of Personal Information with SNS Utility. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Makrides, Alex Karagrigoriou |
Statistical Inference for Multi-state Systems: The Weibull Case. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam |
Conflict Management in Obligation with Deadline Policies. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Thanh-Trung Pham, Xavier Défago |
Reliability Prediction for Component-Based Software Systems with Architectural-Level Fault Tolerance Mechanisms. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Asanger, Andrew Hutchison |
Experiences and Challenges in Enhancing Security Information and Event Management Capability Using Unsupervised Anomaly Detection. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Koichiro Hayashi |
Social Issues of Big Data and Cloud: Privacy, Confidentiality, and Public Utility. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Palomares, Daniel Migault, Wolfgang Velasquez, Maryline Laurent |
High Availability for IPsec VPN Platforms: ClusterIP Evaluation. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kelly Y. Itakura, Noboru Sonehara |
Using Twitter's Mentions for Efficient Emergency Message Propagation. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Franco Bergomi, Stéphane Paul, Bjørnar Solhaug, Raphaël Vignon-Davillier |
Beyond Traceability: Compared Approaches to Consistent Security Risk Assessments. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael Gruhn, Tilo Müller |
On the Practicability of Cold Boot Attacks. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marko Niemimaa, Jonna Järveläinen |
IT Service Continuity: Achieving Embeddedness through Planning. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Valerio Vianello, Vincenzo Gulisano, Ricardo Jiménez-Peris, Marta Patiño-Martínez, Rubén Torres, Rodrigo Diaz, Elsa Prieto |
A Scalable SIEM Correlation Engine and Its Application to the Olympic Games IT Infrastructure. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aleksandar Hudic, Elise Revell, Dimitris E. Simos |
A Generation Method of Cryptographic Keys for Enterprise Communication Systems. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Roberta Cardinali, Enrico Anniballi, Carlo Bongioanni, Antonio Macera, Fabiola Colone, Pierfrancesco Lombardo |
ARGUS 3D: Security Enhancements through Innovative Radar Technologies. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Unger, Martin Mulazzani, Dominik Fruhwirt, Markus Huber 0001, Sebastian Schrittwieser, Edgar R. Weippl |
SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Micheloni, Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath |
Laribus: Privacy-Preserving Detection of Fake SSL Certificates with a Social P2P Notary Network. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lukasz Olejnik, Claude Castelluccia |
Towards Web-Based Biometric Systems Using Personal Browsing Interests. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mai H. El-Sherief, Marianne A. Azer |
A Novel Proximity Based Trust Model for Opportunistic Networks. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Antonio Marotta, Gabriella Carrozza, Luigi Battaglia, Patrizia Montefusco, Vittorio Manetti |
Applying the SecRAM Methodology in a CLOUD-Based ATM Environment. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vincenzo Ciancia, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, José Antonio Martín, Ernesto Pimentel 0001 |
Automated Synthesis and Ranking of Secure BPMN Orchestrators. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Elias Bou-Harb, Mourad Debbabi, Chadi Assi |
A Statistical Approach for Fingerprinting Probing Activities. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Roland Rieke, Maria Zhdanova, Jürgen Repp, Romain Giot, Chrystel Gaber |
Fraud Detection in Mobile Payments Utilizing Process Behavior Analysis. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Gansen Zhao, Haiyu Wang, Chunming Rong, Yong Tang 0001 |
Resource Pool Oriented Trust Management for Cloud Infrastructure. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David W. Chadwick, George Inman |
The Trusted Attribute Aggregation Service (TAAS) - Providing an Attribute Aggregation Layer for Federated Identity Management. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Suliman A. Alsuhibany, Aad P. A. van Moorsel |
Modelling and Analysis of Release Order of Security Algorithms Using Stochastic Petri Nets. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | I. Goriac |
Measuring Anonymity with Plausibilistic Entropy. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Paolo Rocchi, Gurami Tsitsiashvili |
Some General Properties of Multi-state Physical Models. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aaron Paulos, Partha P. Pal, Richard E. Schantz, Brett Benyo, David Johnson 0004, Mike Hibler, Eric Eide |
Isolation of Malicious External Inputs in a Security Focused Adaptive Execution Environment. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Raphael Wigoutschnigg, Peter Schartner, Stefan Rass |
Shared Crowds: A Token-Ring Approach to Hide the Receiver. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Aziz, Geoff W. Hamilton |
Reputation-Controlled Business Process Workflows. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | |
2013 International Conference on Availability, Reliability and Security, ARES 2013, Regensburg, Germany, September 2-6, 2013 |
ARES |
2013 |
DBLP BibTeX RDF |
|
1 | Ilia Frenkel, Lev Khvatskin, Svetlana Daichman, Anatoly Lisnianski |
Assessing Water Cooling System Performance: Lz-Transform Method. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rainer Poisel, Simon Tjoa |
A Comprehensive Literature Review of File Carving. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hermann de Meer, Henrich Christopher Pöhls, Joachim Posegga, Kai Samelin |
Scope of Security Properties of Sanitizable Signatures Revisited. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Cesario Di Sarno, Valerio Formicola, Mario Sicuranza, Giovanni Paragliola |
Addressing Security Issues of Electronic Health Record Systems through Enhanced SIEM Technology. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kristian Beckers, Denis Hatebur, Maritta Heisel |
A Problem-Based Threat Analysis in Compliance with Common Criteria. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tomoya Muraki, Shintaro Oishi, Masatsugu Ichino, Isao Echizen, Hiroshi Yoshiura |
Anonymizing Face Images by Using Similarity-Based Metric. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Blangenois, Guy Guemkam, Christophe Feltus, Djamel Khadraoui |
Organizational Security Architecture for Critical Infrastructure. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Götzfried, Tilo Müller |
ARMORED: CPU-Bound Encryption for Android-Driven ARM Devices. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yulia Cherdantseva, Jeremy Hilton |
A Reference Model of Information Assurance & Security. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mark Scanlon, M. Tahar Kechadi |
Universal Peer-to-Peer Network Investigation Framework. |
ARES |
2013 |
DBLP DOI BibTeX RDF |
|