default search action
CD-ARES 2014: Fribourg, Switzerland
- Stephanie Teufel, A Min Tjoa, Ilsun You, Edgar R. Weippl:
Availability, Reliability, and Security in Information Systems - IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings. Lecture Notes in Computer Science 8708, Springer 2014, ISBN 978-3-319-10974-9
Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Information Systems (CD-ARES 2014)
- Marijke Coetzee:
Argumentation-Based Group Decision Support for Collectivist Communities. 1-16 - Shuichiro Yamamoto:
A Knowledge Integration Approach for Safety-Critical Software Development and Operation Based on the Method Architecture. 17-28 - Sergiu I. Balan, Gianfranco Lamperti, Michele Scandale:
Metrics-Based Incremental Determinization of Finite Automata. 29-44 - Azadeh Alebrahim, Maritta Heisel:
Towards Developing Secure Software Using Problem-Oriented Security Patterns. 45-62 - Evgenia Novikova, Igor V. Kotenko:
Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services. 63-78 - Denisse Muñante, Vanea Chiprianov, Laurent Gallon, Philippe Aniorté:
A Review of Security Requirements Engineering Methods with Respect to Risk Analysis and Model-Driven Engineering. 79-93 - Sven Wohlgemuth:
Adaptive User-Centered Security. 94-109 - Andreas Holzinger, Bettina Sommerauer, Peter Spitzer, Simon Juric, Borut Zalik, Matjaz Debevc, Chantal Lidynia, André Calero Valdez, Carsten Röcker, Martina Ziefle:
Mobile Computing is not Always Advantageous: Lessons Learned from a Real-World Case Study in a Hospital. 110-123 - Andreas Holzinger, Michael Schwarz, Bernhard Ofner, Fleur Jeanquartier, André Calero Valdez, Carsten Röcker, Martina Ziefle:
Towards Interactive Visualization of Longitudinal Data to Support Knowledge Discovery on Multi-touch Tablet Computers. 124-137 - Sao-Khue Vo, Amin Anjomshoaa, A Min Tjoa:
Semantic-Aware Mashups for Personal Resources in SemanticLIFE and SocialLIFE. 138-154
4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2014)
- Antonio J. Jara:
Trust Extension Protocol for Authentication in Networks Oriented to Management (TEPANOM). 155-165 - Yi-Li Huang, Fang-Yie Leu, Ilsun You, Jing-Hao Yang:
Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters. 166-171 - Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela:
Crypto-Biometric Models for Information Secrecy. 172-178 - Aude Plateaux, Patrick Lacharme, Audun Jøsang, Christophe Rosenberger:
One-Time Biometrics for Online Banking and Electronic Payment Authentication. 179-193 - Vasily Desnitsky, Igor V. Kotenko:
Expert Knowledge Based Design and Verification of Secure Systems with Embedded Devices. 194-210 - Shinsaku Kiyomoto, Yutaka Miyake:
PrivacyFrost2: A Efficient Data Anonymization Tool Based on Scoring Functions. 211-225 - Gerardo Canfora, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio:
Detection of Malicious Web Pages Using System Calls Sequences. 226-238 - Hellen Nanda Janine Havinga, Olivier Diederik Theobald Sessink:
Risk Reduction Overview - A Visualization Method for Risk Management. 239-249 - Wolfgang Boehmer:
Towards Analysis of Sophisticated Attacks, with Conditional Probability, Genetic Algorithm and a Crime Function. 250-256 - Guohong Zhao, Shuhui Chen, Baokang Zhao, Ilsun You, Jinshu Su, Wanrong Yu:
A High-Speed Network Content Filtering System. 257-269 - Jingping Song, Zhiliang Zhu, Chris J. Price:
Feature Grouping for Intrusion Detection System Based on Hierarchical Clustering. 270-280 - Guohong Zhao, Wanrong Yu, Baokang Zhao, Chunqing Wu:
Towards a Key Consuming Detection in QKD-VoIP Systems. 281-285 - Qian He, Baokang Zhao, Yunjian Long, Jinshu Su, Ilsun You:
A Structure P2P Based Web Services Registry with Access and Control. 286-297 - Antonio Colella, Clara Maria Colombini:
Amplification DDoS Attacks: Emerging Threats and Defense Strategies. 298-310
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.