The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security (sec)
2008 (conf/sec/2008)


  1. Hiding in Groups: On the Expressiveness of Privacy Distributions. [Citation Graph (, )][DBLP]


  2. Practical Privacy-Preserving Benchmarking. [Citation Graph (, )][DBLP]


  3. Enhancing Privacy in Remote Data Classification. [Citation Graph (, )][DBLP]


  4. Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. [Citation Graph (, )][DBLP]


  5. Robbing Banks with Their Own Software-an Exploit Against Norwegian Online Banks. [Citation Graph (, )][DBLP]


  6. Collaborative architecture for malware detection and analysis. [Citation Graph (, )][DBLP]


  7. Realizing Stateful Public Key Encryption in Wireless Sensor Network. [Citation Graph (, )][DBLP]


  8. Establishing secure links in low-rate wireless personal area networks. [Citation Graph (, )][DBLP]


  9. An Asynchronous Node Replication Attack in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  10. A B Formal Framework for Security Developments in the Domain of Smart Card Applications. [Citation Graph (, )][DBLP]


  11. An Implementation of a Privacy Enforcement Scheme based on the Java Security Framework using XACML Policies. [Citation Graph (, )][DBLP]


  12. Negotiation of Prohibition: An Approach Based on Policy Rewriting. [Citation Graph (, )][DBLP]


  13. An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. [Citation Graph (, )][DBLP]


  14. Role Signatures for Access Control in Open Distributed Systems. [Citation Graph (, )][DBLP]


  15. Policies and Security Aspects For Distributed Scientific Laboratories. [Citation Graph (, )][DBLP]


  16. A Fuzzy Model for the Composition of Intrusion Detectors. [Citation Graph (, )][DBLP]


  17. Investigating the problem of IDS false alarms: An experimental study using Snort. [Citation Graph (, )][DBLP]


  18. User Session Modeling for Effective Application Intrusion Detection. [Citation Graph (, )][DBLP]


  19. A Product Machine Model for Anomaly Detection of Interposition Attacks on Cyber-Physical Systems. [Citation Graph (, )][DBLP]


  20. Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs. [Citation Graph (, )][DBLP]


  21. Behavioral Intrusion Detection Indicators. [Citation Graph (, )][DBLP]


  22. Leveraging Lattices to Improve Role Mining. [Citation Graph (, )][DBLP]


  23. A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases. [Citation Graph (, )][DBLP]


  24. Efficient Coalition Detection in Traitor Tracing. [Citation Graph (, )][DBLP]


  25. SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned. [Citation Graph (, )][DBLP]


  26. Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models. [Citation Graph (, )][DBLP]


  27. A Decentralized Bayesian Attack Detection Algorithm for Network Security. [Citation Graph (, )][DBLP]


  28. An Operation-Based Metric for CPA Resistance. [Citation Graph (, )][DBLP]


  29. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems. [Citation Graph (, )][DBLP]


  30. Adversary Modeling and Simulation in Cyber Warfare. [Citation Graph (, )][DBLP]


  31. Interactive Selection of ISO 27001 Controls under Multiple Objectives. [Citation Graph (, )][DBLP]


  32. Feasibility of Automated Information Security Compliance Auditing. [Citation Graph (, )][DBLP]


  33. Software Licence Protection and Management for Organisations. [Citation Graph (, )][DBLP]


  34. A Vulnerability Prioritization System Using A Fuzzy Risk Analysis Approach. [Citation Graph (, )][DBLP]


  35. ASTRA : A Security Analysis Method Based on Asset Tracking. [Citation Graph (, )][DBLP]


  36. A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack. [Citation Graph (, )][DBLP]


  37. Portable User-Centric Identity Management. [Citation Graph (, )][DBLP]


  38. Ubiquitous Privacy-Preserving Identity Managment. [Citation Graph (, )][DBLP]


  39. Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data. [Citation Graph (, )][DBLP]


  40. Using Virtualization to Create and Deploy Computer Security Lab Exercises. [Citation Graph (, )][DBLP]


  41. DigForNet: Digital Forensic in Networking. [Citation Graph (, )][DBLP]


  42. A Live Digital Forensic system for Windows networks. [Citation Graph (, )][DBLP]


  43. HoneyID : Unveiling Hidden Spywares by Generating Bogus Events. [Citation Graph (, )][DBLP]


  44. A Security Protocol for Self-Organizing Data Storage. [Citation Graph (, )][DBLP]


  45. Protecting Financial Institutions from Brute-Force Attacks. [Citation Graph (, )][DBLP]


  46. Agency Theory: Can it be Used to Strengthen IT Governance?. [Citation Graph (, )][DBLP]


  47. A new Accounting Mechanism for Modern and Future AAA Services. [Citation Graph (, )][DBLP]


  48. A user survey on the sense of security, Anshin. [Citation Graph (, )][DBLP]


  49. Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  50. A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection. [Citation Graph (, )][DBLP]


  51. Managing the lifecycle of XACML delegation policies in federated environments. [Citation Graph (, )][DBLP]


  52. Assessing the Likelihood of Privacy Policy Compliance. [Citation Graph (, )][DBLP]


  53. Classification features for detecting Server-side and Client-side Web attacks. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002