default search action
3rd NSS 2009: Gold Coast, Australia
- Yang Xiang, Javier López, Haining Wang, Wanlei Zhou:
Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3838-9
Distributed Attack Systems and Mechanisms
- John Clark, Sylvain P. Leblanc, Scott Knight:
Hardware Trojan Horse Device Based on Unintended USB Channels. 1-8 - Ke Li, Wanlei Zhou, Ping Li, Jing Hai, Jianwen Liu:
Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics. 9-17 - Jemal H. Abawajy:
Enhancing RFID Tag Resistance against Cloning Attack. 18-23 - Mohd Fadzli Marhusin, Chris Lokan, Henry Larkin, David Cornforth:
A Data Mining Approach for Detection of Self-Propagating Worms. 24-29 - Nasim Vatani, Amir Masoud Rahmani, Mohammad Ebrahim Shiri:
An Information Filtering Approach. 30-35
Security Architecture in Distributed Network Systems
- Rong-Jian Chen, Yu-Cheng Peng, Jui-Lin Lai, Shi-Jinn Horng:
Architecture Design of High Efficient and Non-memory AES Crypto Core for WPAN. 36-43 - Markus Hinkelmann, Andreas Jakoby, Nina Moebius, Tiark Rompf, Peer Stechert:
A Cryptographically t-Private Auction System. 44-51 - Tilman Wolf, Russell Tessier:
Design of a Secure Router System for Next-Generation Networks. 52-59 - Robert Koch:
Changing Network Behavior. 60-66 - Olivier Flauzac, Florent Nolot, Cyril Rabat, Luiz Angelo Steffenel:
Grid of Security: A New Approach of the Network Security. 67-72
Security Protocols
- Thaier Hayajneh, Prashant Krishnamurthy, David Tipper:
DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks. 73-80 - Yang Zhang:
Effective Attacks in the Tor Authentication Protocol. 81-86 - A. John Prakash, V. Rhymend Uthariaraj:
Secure Authenticated Key Establishment Protocol for Ad Hoc Networks. 87-94 - Andre L. Alexander, Alexander L. Wijesinha, Ramesh K. Karne:
An Evaluation of Secure Real-Time Transport Protocol (SRTP) Performance for VoIP. 95-101 - Raphael C.-W. Phan, Wei-Chuen Yau, Bok-Min Goi:
Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols. 102-106
Security Algorithms and Applications
- Spyros Antonatos, Quang Hieu Vu:
Harnessing the Power of P2P Systems for Fast Attack Signature Validation. 107-114 - Zhongwen Li, Xiaochen Xu, Liang Shi, Jian Liu, Chen Liang:
Authentication in Peer-to-Peer Network: Survey and Research Directions. 115-122 - Dimitris Geneiatakis, Costas Lambrinoudakis, Stefanos Gritzalis:
A Hierarchical Model for Cross-Domain Communication of Health Care Units. 123-129 - Xiaoxun Sun, Hua Wang, Lili Sun:
Extended K-Anonymity Models Against Attribute Disclosure. 130-136 - Kalvinder Singh, Vallipuram Muthukkumarasamy:
Implementation and Analysis of Sensor Security Protocols in a Home Health Care System. 137-142
Implementation, Deployment and Management of Security Systems
- Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network. 143-150 - Nabil M. K. Mirza, Ziad Osman, Rached N. Zantout, Mohamed El-Sayed:
Error Correction of Noisy Block Cipher Using Cipher and Plaintext Characteristics. 151-157 - Jan Muhammad, Richard O. Sinnott:
Policy-Driven Patch Management for Distributed Environments. 158-163 - Bruno Lage Srur, Vallipuram Muthukkumarasamy:
Enhancing Trust on e-Government: A Decision Fusion Module. 164-169 - Fernando Bernal-Hidalgo, Manuel Sánchez, Gabriel López, Antonio Fernandez Gómez-Skarmeta, Óscar Cánovas Reverte:
Trusted Network Access Control in the Eduroam Federation. 170-175
Intelligent Defense Agents and Systems
- Leslie Huin, Danielle Boulanger, Eric Disson:
ACSIS: Agents for Cooperative Secured Information Systems. 176-183 - Rossilawati Sulaiman, Dharmendra Sharma, Wanli Ma, Dat Tran:
A Multi-agent Security Architecture. 184-191 - Wei Chen, Li Zhu, Xiaomei Cao, Yang Geng:
A Novel Fuzzy Identity-Based Signature with Dynamic Threshold. 192-198 - Bing Sun, Ya-Ping Zhang, Ning Zhang:
Self-Protection Model Based on Intelligent Agent. 199-202 - Shaomin Zhang, Yue Zou, Baoyi Wang:
A Novel Grid Trust Model Based on Fuzzy Theory. 203-207
Security and Privacy in Wireless Networks
- Yang Zhang:
A Pseudonym-Based Signature Scheme for Dynamic Clusters in Ad Hoc Networks. 208-215 - Boyeon Song, Chris J. Mitchell:
Scalable RFID Pseudonym Protocol. 216-224 - Neila Krichene, Noureddine Boudriga:
Securing Roaming and Vertical Handover in Fourth Generation Networks. 225-231 - Qin Li, Qingkai Zeng:
A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network Protocols. 232-239 - Robert Steele, Kyongho Min:
Flexible Wireless Trust Through Ontology-Based Mapping and Its Attendant Semantic Limitations. 240-245
Distributed Access Control and Trust Management
- Giovanni Russello, Naranker Dulay:
xDUCON: Coordinating Usage Control Policies in Distributed Domains. 246-253 - Pedro Chávez Lugo, Juan Manuel Garcia Garcia, Juan J. Flores:
A System for Distributed SELinux Policy Management. 254-261 - Marco Ramilli, Marco Prandini:
A Messaging-Based System for Remote Server Administration. 262-269 - Jinwei Hu, Ruixuan Li, Zhengding Lu:
On Role Mappings for RBAC-Based Secure Interoperation. 270-277 - Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Eimear Gallery:
Property Based Attestation and Trusted Computing: Analysis and Challenges. 278-285
Security Theory and Tools
- Qi Zhang, Yi Mu, Minjie Zhang, Robert Huijie Deng:
Secure Mobile Agents with Designated Hosts. 286-293 - Yining Liu, Keqiu Li, Yong Zhang, Wenyu Qu:
A Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc Networks. 294-301 - Hua Guo, Xiyong Zhang, Yi Mu, Zhoujun Li:
An Efficient Certificateless Encryption Scheme in the Standard Model. 302-309 - Huiqiang Wang, Hongwu Lv, Guangsheng Feng:
A Self-Reflection Model for Autonomic Computing Systems Based on p-Calculus. 310-315 - Sami Harari:
FSS2-Id/A Fast Safe Identity-Based Multi Signature Scheme. 316-320
Distributed Intrusion Detection/Prevention Systems
- Farah Barika Ktata, Nabil El-Kadhi, Khaled Ghédira:
Distributed Agent Architecture for Intrusion Detection Based on New Metrics. 321-327 - Hyunhee Park, Meejoung Kim, Chul-Hee Kang:
F-TAD: Traffic Anomaly Detection for Sub-networks Using Fisher Linear Discriminant. 328-335 - Ming-Ming Xiao, Shun-Zheng Yu, Yu Wang:
Automatic Network Protocol Automaton Extraction. 336-343 - Alif Wahid, Christopher Leckie, Chenfeng Vincent Zhou:
Characterising the Evolution in Scanning Activity of Suspicious Hosts. 344-350 - Shui Yu, Theerasak Thapngam, Jianwen Liu, Su Wei, Wanlei Zhou:
Discriminating DDoS Flows from Flash Crowds Using Information Distance. 351-356
Security Simulation, Methods and Tools
- Carlos Queiroz, Abdun Naser Mahmood, Jiankun Hu, Zahir Tari, Xinghuo Yu:
Building a SCADA Security Testbed. 357-364 - Van-Hau Pham, Marc Dacier:
Honeypot Traces Forensics: The Observation Viewpoint Matters. 365-372 - Matús Harvan, Alexander Pretschner:
State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition. 373-380 - W. Y. Chin, Evangelos P. Markatos, Spyros Antonatos, Sotiris Ioannidis:
HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing. 381-388 - Muhammad Awais Shibli, Sead Muftic, Alessandro Giambruno, Antonio Lioy:
MagicNET: Security System for Development, Validation and Adoption of Mobile Agents. 389-396
FIAS 2009: Applications of Information Security Technologies
- Mansour M. Alsulaiman, Aasem N. Alyahya, Raed A. Alkharboush, Nasser S. Alghafis:
Intrusion Detection System Using Self-Organizing Maps. 397-402 - Sheeraz Memon, Margaret Lech, Namunu Chinthaka Maddage:
Speaker Verification Based on Different Vector Quantization Techniques with Gaussian Mixture Models. 403-408 - Chan Yeob Yeun, Salman Mohammed Al-Marzouqi:
Practical Implementations for Securing VoIP Enabled Mobile Devices. 409-414 - Mohamed A. El-Kady, Essam A. Al-Ammar:
Framework for Identification of Power System Operating Security Regions. 415-419
FIAS 2009: Advances in Information Assurance and Security
- Muhammad Khurram Khan:
Enhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'. 420-424 - Sumayah Al-Rwais, Jalal Al-Muhtadi:
A Context-Aware Access Control Model for Pervasive Environments. 425-430 - Ahmed Belkhirat, Abdelghani Bouras, Abdelkader Belkhir:
A New Similarity Measure for the Anomaly Intrusion Detection. 431-436 - Yong Jian Chin, Thian Song Ong, Michael Goh Kah Ong, Bee Yan Hiew:
Integrating Palmprint and Fingerprint for Identity Verification. 437-442 - Wei Li, Dawu Gu, Yong Wang, Juanru Li, Zhiqiang Liu:
An Extension of Differential Fault Analysis on AES. 443-446 - Ahmed Al-Nazer, Adnan Abdul-Aziz Gutub:
Exploit Kashida Adding to Arabic e-Text for High Capacity Steganography. 447-451
IDSS-NDS 2009: Intelligent Methods and Algorithms
- Mohammed Md. Mazid, A. B. M. Shawkat Ali, Kevin S. Tickle:
A Comparison Between Rule Based and Association Rule Mining Algorithms. 452-455 - Jesmin Nahar, Kevin S. Tickle, A. B. M. Shawkat Ali, Yi-Ping Phoebe Chen:
Early Breast Cancer Identification: Which Way to Go? Microarray or Image Based Computer Aided Diagnosis!. 456-461 - Lily D. Li, Xinghuo Yu, Xiaodong Li, William W. Guo:
A Modified PSO Algorithm for Constrained Multi-objective Optimization. 462-467 - Reginald Lal, Andrew Chiou:
Significance of Computional Intelligence Method in Computer Networks. 468-473 - Tohari Ahmad, Jiankun Hu, Song Han:
An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography. 474-479
IDSS-NDS 2009: Intelligent Systems in Industrial Applications
- Noel Henry Patson:
Visualizing Global Patterns in Huge Digraphs. 480-483 - Wei Peng, Qingmai Wang, Bin Wang, Xinghuo Yu:
Putting Simple Hierarchy into Ant Foraging: Cluster-Based Soft-Bots. 484-488 - Roland Dodd, Andrew Chiou, Xinghuo Yu, Ross Broadfoot:
Industrial Process Model Integration Using a Blackboard Model within a Pan Stage Decision Support System. 489-494 - Roland Dodd, Andrew Chiou, Xinghuo Yu, Ross Broadfoot:
Functional Characteristics and Proposed Deployment Infrastructure of an Industrial Decision Support System within a Sugar Mill Crystallisation Stage. 495-500 - W. K. Daniel Pun, Ricardo Santa:
If Cross-Functional Teams are the Answer, What is the Question?. 501-505 - Ananda Jeeva, William W. Guo:
Determining Supply Chain Flexibility Using Statistics and Nueral Networks: A Comparative Study. 506-509
DMAI 2009: Data Mining Algorithms and Applications
- Kit Yan Chan, Siow Yong Low, Sven Nordholm, Ka Fai Cedric Yiu, Sai-Ho Ling:
Speech Recognition Enhancement Using Beamforming and a Genetic Algorithm. 510-515 - Sai-Ho Ling, Hung T. Nguyen, Kit Yan Chan:
A New Particle Swarm Optimization Algorithm for Neural Network Optimization. 516-521 - Xiong Deng, Moustafa Ghanem, Yike Guo:
Real-Time Data Mining Methodology and a Supporting Framework. 522-527 - Khalid Iqbal, Sohail Asghar:
Generating Hierarchical Association Rules with the Use of Bayesian Network. 528-533
DMAI 2009: Advances in Artificial Intelligence
- John Mashford, Dhammika De Silva, Donavan Marney, Stewart Burn:
An Approach to Leak Detection in Pipe Networks Using Analysis of Monitored Pressure Values by Support Vector Machine. 534-539 - Saroj Ratnoo, Kamal Kant Bharadwaj:
Discovery of Exceptions: A Step towards Perfection. 540-545 - Fábio Fabris, Leticia Rosetti Margoto, Flávio Miguel Varejão:
Novel Approaches for Detecting Frauds in Energy Consumption. 546-551 - Miho Itoh:
Contextual Analysis Methods Capturing Knowledge Representation Related to the Reputation. 552-559 - Burcu Yurekli, Gökhan Çapan, Baris Yilmazel, Özgür Yilmazel:
Guided Navigation Using Query Log Mining through Query Expansion. 560-564
WMNS 2009: Advances in Wireless and Mobile Networks Security
- Dakila Reyes II, Cedric Angelo M. Festin, Susan Pancho-Festin:
Incentive-Based Self-Organized Public Key Management for Mobile Ad Hoc Networks. 565-570 - James Cannady:
Distributed Detection of Attacks in Mobile Ad Hoc Networks Using Learning Vector Quantization. 571-574 - Book-Sung Park, Dan Qi, Yanli Liu, Bolormaa Khurelbaatar, Chul-Ju Kim:
A Novel Quad-band Internal Antenna with Ni/Ag/Ni Structure for Wireless Mobile Handset. 575-578 - Omessaad Hamdi, Ammar Bouallegue, Sami Harari:
Weakness on Cryptographic Schemes Based on Chained Codes. 579-581
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.