The SCEAS System
Navigation Menu

Conferences in DBLP

(securware)
2008 (conf/securware/2008)


  1. Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques. [Citation Graph (, )][DBLP]


  2. A Secure Task Delegation Model for Workflows. [Citation Graph (, )][DBLP]


  3. Formal Modeling of Authentication in SIP Registration. [Citation Graph (, )][DBLP]


  4. Controlling Access to Location-Based Services in Vehicular Mobile Pervasive Environments. [Citation Graph (, )][DBLP]


  5. A New Approach for Secure and Portable OS. [Citation Graph (, )][DBLP]


  6. Distack -- A Framework for Anomaly-Based Large-Scale Attack Detection. [Citation Graph (, )][DBLP]


  7. Team--Based MAC Policy over Security--Enhanced Linux. [Citation Graph (, )][DBLP]


  8. Prototyping a New Identity Authentication Framework for IP Telephony. [Citation Graph (, )][DBLP]


  9. Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets. [Citation Graph (, )][DBLP]


  10. Security Patterns for Capturing Encryption-Based Access Control to Sensor Data. [Citation Graph (, )][DBLP]


  11. Security Policy Management for Peer Group Meetings. [Citation Graph (, )][DBLP]


  12. FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole Attacks. [Citation Graph (, )][DBLP]


  13. Proving Trust Locally. [Citation Graph (, )][DBLP]


  14. A Security Framework for Input Validation. [Citation Graph (, )][DBLP]


  15. Defending E-Banking Services: Antiphishing Approach. [Citation Graph (, )][DBLP]


  16. Preventing Insider Information Leakage for Enterprises. [Citation Graph (, )][DBLP]


  17. Analysis of the Impact of Intensive Attacks on the Self-Similarity Degree of the Network Traffic. [Citation Graph (, )][DBLP]


  18. Scalable Detection of SIP Fuzzing Attacks. [Citation Graph (, )][DBLP]


  19. Authentication Mechanisms for Mobile Ad-Hoc Networks and Resistance to Sybil Attack. [Citation Graph (, )][DBLP]


  20. The Automatic Discovery, Identification and Measurement of Botnets. [Citation Graph (, )][DBLP]


  21. A Protection Scheme against the Attacks Deployed by Hiding the Violation of the Same Origin Policy. [Citation Graph (, )][DBLP]


  22. Email Worm Mitigation by Controlling the Name Server Response Rate. [Citation Graph (, )][DBLP]


  23. Anti-counterfeiting with a Random Pattern. [Citation Graph (, )][DBLP]


  24. Efficient Anomaly Detection System for Mobile Handsets. [Citation Graph (, )][DBLP]


  25. Providing Secure Access to Unsecure Web Services. [Citation Graph (, )][DBLP]


  26. Towards Decentralised Security Policies for e-Health Collaborations. [Citation Graph (, )][DBLP]


  27. Rating Agencies Interoperation for Peer-to-Peer Online Transactions. [Citation Graph (, )][DBLP]


  28. Optimal Trust Network Analysis with Subjective Logic. [Citation Graph (, )][DBLP]


  29. From Monitoring Templates to Security Monitoring and Threat Detection. [Citation Graph (, )][DBLP]


  30. A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  31. Family of Parameterized Hash Algorithms. [Citation Graph (, )][DBLP]


  32. Public Key Cryptography: A Dynamical Systems Perspective. [Citation Graph (, )][DBLP]


  33. A Related-Key Attack on TREYFER. [Citation Graph (, )][DBLP]


  34. Security and Adoption of Internet Payment. [Citation Graph (, )][DBLP]


  35. Appraisal of the Effectiveness and Efficiency of an Information Security Management System Based on ISO 27001. [Citation Graph (, )][DBLP]


  36. Generic and Complete Three-Level Identity Management Model. [Citation Graph (, )][DBLP]


  37. A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography. [Citation Graph (, )][DBLP]


  38. A New Anti-phishing Method in OpenID. [Citation Graph (, )][DBLP]


  39. Toward the Engineering of Security of Information Systems (ESIS): UML and the IS Confidentiality. [Citation Graph (, )][DBLP]


  40. Designing an Undergraduate Software Security Course. [Citation Graph (, )][DBLP]


  41. High-Speed Private Information Retrieval Computation on GPU. [Citation Graph (, )][DBLP]


  42. Vulnerability Dependencies in Antivirus Software. [Citation Graph (, )][DBLP]


  43. Security Governance for Enterprise VoIP Communication. [Citation Graph (, )][DBLP]


  44. ToLeRating UR-STD. [Citation Graph (, )][DBLP]


  45. Collaborative Approach to Automatic Classification of Heterogeneous Information Security. [Citation Graph (, )][DBLP]


  46. Infusing Information Assurance into an Undergraduate CS Curriculum. [Citation Graph (, )][DBLP]


  47. On the Portability of Trained Machine Learning Classifiers for Early Application Identification. [Citation Graph (, )][DBLP]


  48. Activity- and Inactivity-BasedApproaches to Analyze an Assisted Living Environment. [Citation Graph (, )][DBLP]


  49. Analysis of Computer Infection Risk Factors Based on Customer Network Usage. [Citation Graph (, )][DBLP]


  50. Design-Time Learning for Operational Planning Improvement. [Citation Graph (, )][DBLP]


  51. Molecular Approach Paves the Way towards High Resilience for Large Mission-Critical Information Systems. [Citation Graph (, )][DBLP]


  52. Heuristics to Perform Molecular Decomposition of Large Mission-Critical Information Systems. [Citation Graph (, )][DBLP]


  53. Generation of Diagnostic Plans for Large ICT Systems. [Citation Graph (, )][DBLP]


  54. Dependability Analysis of Information Systems with Hierarchical Reconfiguration of Services. [Citation Graph (, )][DBLP]


  55. Hierarchical Approach to Dependability Analysis of Information Systems by Modeling and Simulation. [Citation Graph (, )][DBLP]


  56. Towards the Definition of a Web Service Based Management Framework. [Citation Graph (, )][DBLP]


  57. Dependability and Security Metrics in Controlling Infrastructure. [Citation Graph (, )][DBLP]


  58. Advanced Rule-Based Techniques in Mission Critical Systems. [Citation Graph (, )][DBLP]


  59. Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates. [Citation Graph (, )][DBLP]


  60. Event-Driven Architecture for Intrusion Detection Systems Based on Patterns. [Citation Graph (, )][DBLP]


  61. Agent Based Approach to Events Monitoring in Complex Information Systems. [Citation Graph (, )][DBLP]


  62. A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. [Citation Graph (, )][DBLP]


  63. On System Security Metrics and the Definition Approaches. [Citation Graph (, )][DBLP]


  64. Policy-Driven System Configuration for Dependability. [Citation Graph (, )][DBLP]


  65. A Dependability Case Approach to the Assessment of IP Networks. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002