The SCEAS System
Navigation Menu

Conferences in DBLP

(IEEEares)
2010 (conf/IEEEares/2010)


  1. A Security Decision-Reaction Architecture for Heterogeneous Distributed Network. [Citation Graph (, )][DBLP]


  2. Dual-Level Attack Detection and Characterization for Networks under DDoS. [Citation Graph (, )][DBLP]


  3. Improving Effectiveness of Intrusion Detection by Correlation Feature Selection. [Citation Graph (, )][DBLP]


  4. Analytical Approach to Attack Graph Analysis for Network Security. [Citation Graph (, )][DBLP]


  5. Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss. [Citation Graph (, )][DBLP]


  6. A Computer Architecture with Hardwarebased Malware Detection. [Citation Graph (, )][DBLP]


  7. Solving the Transitive Access Problem for the Services Oriented Architecture. [Citation Graph (, )][DBLP]


  8. Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography. [Citation Graph (, )][DBLP]


  9. Secure Bindings of SAML Assertions to TLS Sessions. [Citation Graph (, )][DBLP]


  10. From Contextual Permission to Dynamic Pre-obligation: An Integrated Approach. [Citation Graph (, )][DBLP]


  11. 2-clickAuth. [Citation Graph (, )][DBLP]


  12. Architecture-Aware Adaptive Deployment of Contextual Security Policies. [Citation Graph (, )][DBLP]


  13. Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients. [Citation Graph (, )][DBLP]


  14. A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems. [Citation Graph (, )][DBLP]


  15. FaT2D: Fault Tolerant Directed Diffusion for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  16. An Adaptive Redundancy Oriented Method to Tolerate Soft Errors in SRAM-Based FPGAs Using Unused Resources. [Citation Graph (, )][DBLP]


  17. Analysis of Transient Faults on a MIPS-Based Dual-Core Processor. [Citation Graph (, )][DBLP]


  18. Visualizing Past Personal Data Disclosures. [Citation Graph (, )][DBLP]


  19. Strategies for Reducing Risks of Inconsistencies in Access Control Policies. [Citation Graph (, )][DBLP]


  20. Multi-dimensional Uncertainty Analysis in Secure and Dependable Domain. [Citation Graph (, )][DBLP]


  21. Information Flow in Disaster Management Systems. [Citation Graph (, )][DBLP]


  22. Formal Specification and Analysis of an E-voting System. [Citation Graph (, )][DBLP]


  23. Towards a Privacy-Enhanced Social Networking Site. [Citation Graph (, )][DBLP]


  24. A Formal Approach Towards Risk-Aware Service Level Analysis and Planning. [Citation Graph (, )][DBLP]


  25. Threat- and Risk-Analysis During Early Security Requirements Engineering. [Citation Graph (, )][DBLP]


  26. An Analysis of Information Security Awareness within Home and Work Environments. [Citation Graph (, )][DBLP]


  27. Trust Based Multi Path DSR Protocol. [Citation Graph (, )][DBLP]


  28. Enhanced Chaotic Stream Cipher for WSNs. [Citation Graph (, )][DBLP]


  29. Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms. [Citation Graph (, )][DBLP]


  30. A Semantic Security Architecture for Web Services. [Citation Graph (, )][DBLP]


  31. FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management. [Citation Graph (, )][DBLP]


  32. Owner-Based Role-Based Access Control OB-RBAC. [Citation Graph (, )][DBLP]


  33. Program Obfuscation by Strong Cryptography. [Citation Graph (, )][DBLP]


  34. Pitfalls in Formal Reasoning about Security Protocols. [Citation Graph (, )][DBLP]


  35. Secure Group Communication Using Fractional Public Keys. [Citation Graph (, )][DBLP]


  36. Extending the Gordon and Loeb Model for Information Security Investment. [Citation Graph (, )][DBLP]


  37. Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures. [Citation Graph (, )][DBLP]


  38. Planning Dynamic Activity and Resource Allocations Using a Risk-Aware Business Process Management Approach. [Citation Graph (, )][DBLP]


  39. Security and Usability: Analysis and Evaluation. [Citation Graph (, )][DBLP]


  40. Recovery of Skype Application Activity Data from Physical Memory. [Citation Graph (, )][DBLP]


  41. Rejuvenating High Available Virtualized Systems. [Citation Graph (, )][DBLP]


  42. Detection of Spyware by Mining Executable Files. [Citation Graph (, )][DBLP]


  43. A Probabilistic Approach for On-Line Sum-Auditing. [Citation Graph (, )][DBLP]


  44. Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop. [Citation Graph (, )][DBLP]


  45. Optimising IDS Sensor Placement. [Citation Graph (, )][DBLP]


  46. Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion Detection. [Citation Graph (, )][DBLP]


  47. Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming. [Citation Graph (, )][DBLP]


  48. On the Simulation of a Software Reputation System. [Citation Graph (, )][DBLP]


  49. Model-Driven Application-Level Encryption for the Privacy of E-health Data. [Citation Graph (, )][DBLP]


  50. Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  51. A Multi-stage Methodology for Ensuring Appropriate Security Culture and Governance. [Citation Graph (, )][DBLP]


  52. Development of ICT Infrastructure for Local Socio-Economic System in Japan. [Citation Graph (, )][DBLP]


  53. A National Strategy for an Effective Cybersecurity Approach and Culture. [Citation Graph (, )][DBLP]


  54. Choosing Authentication Techniques in E-procurement System in Serbia. [Citation Graph (, )][DBLP]


  55. A Continuous Authentication System Based on User Behavior Analysis. [Citation Graph (, )][DBLP]


  56. Identifying Security Relevant Warnings from Static Code Analysis Tools through Code Tainting. [Citation Graph (, )][DBLP]


  57. Reselling Digital Content. [Citation Graph (, )][DBLP]


  58. A New DRM Architecture with Strong Enforcement. [Citation Graph (, )][DBLP]


  59. A Secure and Scalable Grid-Based Content Management System. [Citation Graph (, )][DBLP]


  60. A Design Pattern for Event-Based Processing of Security-Enriched SOAP Messages. [Citation Graph (, )][DBLP]


  61. Challenging IS and ISM Standardization for Business Benefits. [Citation Graph (, )][DBLP]


  62. Managing the Asset Risk of SMEs. [Citation Graph (, )][DBLP]


  63. A Generic Metamodel for IT Security. [Citation Graph (, )][DBLP]


  64. Combining Misuse Cases with Attack Trees and Security Activity Models. [Citation Graph (, )][DBLP]


  65. External Insider Threat: A Real Security Challenge in Enterprise Value Webs. [Citation Graph (, )][DBLP]


  66. Secure Monitoring of Service Level Agreements. [Citation Graph (, )][DBLP]


  67. Fighting Phishing with Trusted Email. [Citation Graph (, )][DBLP]


  68. Application and Economic Implications of an Automated Requirement-Oriented and Standard-Based Compliance Monitoring and Reporting Prototype. [Citation Graph (, )][DBLP]


  69. A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept. [Citation Graph (, )][DBLP]


  70. Secured Key Distribution Scheme for Cryptographic Key Management System. [Citation Graph (, )][DBLP]


  71. One Size Fits None: The Importance of Detector Parameterization. [Citation Graph (, )][DBLP]


  72. Supporting Authorization Policy Modification in Agile Development of Web Applications. [Citation Graph (, )][DBLP]


  73. The Road to Hell is Paved with Good Intentions: A Story of (In)secure Software Development. [Citation Graph (, )][DBLP]


  74. Katana: A Hot Patching Framework for ELF Executables. [Citation Graph (, )][DBLP]


  75. Investigating the Limitations of Java Annotations for Input Validation. [Citation Graph (, )][DBLP]


  76. Classification of Buffer Overflow Vulnerability Monitors. [Citation Graph (, )][DBLP]


  77. Configuration Fuzzing for Software Vulnerability Detection. [Citation Graph (, )][DBLP]


  78. Practical Experience Gained from Modeling Security Goals: Using SGITs in an Industrial Project. [Citation Graph (, )][DBLP]


  79. Security Modeling and Tool Support Advantages. [Citation Graph (, )][DBLP]


  80. Analysing and Visualising Security and Usability in IRIS. [Citation Graph (, )][DBLP]


  81. Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism. [Citation Graph (, )][DBLP]


  82. Model-Driven Security Patterns Application Based on Dependences among Patterns. [Citation Graph (, )][DBLP]


  83. Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats. [Citation Graph (, )][DBLP]


  84. Measuring the Level of Security Introduced by Security Patterns. [Citation Graph (, )][DBLP]


  85. Patterns for Secure Boot and Secure Storage in Computer Systems. [Citation Graph (, )][DBLP]


  86. A Consideration of the Reliability of Registration and Attribute Exchange. [Citation Graph (, )][DBLP]


  87. Binomial-Mix-Based Location Anonymizer System with Global Dummy Generation to Preserve User Location Privacy in Location-Based Services. [Citation Graph (, )][DBLP]


  88. Multiple Designated Verifiers Signatures Reconsidered. [Citation Graph (, )][DBLP]


  89. LSM-Based Secure System Monitoring Using Kernel Protection Schemes. [Citation Graph (, )][DBLP]


  90. Formalization of Viruses and Malware Through Process Algebras. [Citation Graph (, )][DBLP]


  91. Heuristics for Detecting Botnet Coordinated Attacks. [Citation Graph (, )][DBLP]


  92. An Improvement of Robustness Against Physical Attacks and Equipment Independence in Information Hiding Based on the Artificial Fiber Pattern. [Citation Graph (, )][DBLP]


  93. Large Scale Demonstration Experiments Towards Acheiving Practical Traceback on the Internet. [Citation Graph (, )][DBLP]


  94. Quantum Detection of Wavelength Division Multiplexing Optical Coherent Signals in Lossy Channels. [Citation Graph (, )][DBLP]


  95. Experimental Results on Cheon's Algorithm. [Citation Graph (, )][DBLP]


  96. The 'Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation. [Citation Graph (, )][DBLP]


  97. A Model for Computer Profiling. [Citation Graph (, )][DBLP]


  98. Using Normalized Compression Distance for Classifying File Fragments. [Citation Graph (, )][DBLP]


  99. A Multi-component View of Digital Forensics. [Citation Graph (, )][DBLP]


  100. Blind Steganalysis: A Countermeasure for Binary Image Steganography. [Citation Graph (, )][DBLP]


  101. Log Analysis Towards an Automated Forensic Diagnosis System. [Citation Graph (, )][DBLP]


  102. A Function Oriented Methodology to Validate and Verify Forensic Copy Function of Digital Forensic Tools. [Citation Graph (, )][DBLP]


  103. A Complexity Based Model for Quantifying Forensic Evidential Probabilities. [Citation Graph (, )][DBLP]


  104. A Framework to Guide the Implementation of Proactive Digital Forensics in Organisations. [Citation Graph (, )][DBLP]


  105. Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography. [Citation Graph (, )][DBLP]


  106. Information Flow Control Using the Java Virtual Machine Tool Interface (JVMTI). [Citation Graph (, )][DBLP]


  107. A Prototype for Support of Computer Forensic Analysis Combined with the Expected Knowledge Level of an Attacker to More Efficiently Achieve Investigation Results. [Citation Graph (, )][DBLP]


  108. A Novel Image Hiding Scheme Using Content Aware Seam Carving Method. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002