Paper ID |
Authors and Title |
8 |
Mohamed Nassar, Radu State and Olivier Festor. A framework
for monitoring SIP enterprise networks |
12 |
Ion Alberdi, Vincent Nicomette and Philippe Owezarski.
Luth: Composing and Parallelizing Midpoint Inspection
Devices |
19 |
Kun Peng and Feng Bao.
Efficient
Proof Of Validity Of Votes In Homomorphic E-Voting |
22 |
Sebastian Roschke, Feng Cheng and Christoph Meinel. A
Flexible and Efficient Alert Correlation Platform for
Distributed IDS |
23 |
McKay Williams, Sheldon Munns, Michael Temple and Michael
Mendenhall. RF-DNA Fingerprinting for Airport WiMax
Communications Security |
24 |
Thomas Clausen and Ulrich Herberg. Router and Link
Admittance Control in the Optimized Link State Routing
Protocol version 2 (OLSRv2) |
25 |
Cynthia Wagner, Gerard Wagener, Radu State, Alexandre
Dulaunoy and Thomas Engel. Breaking Tor Anonymity with Game
Theory and Data Mining |
26 |
Hao Gao, Jun Yan and Yi Mu. Dynamic Trust Model for
Federated Identity Management |
29 |
Peter Danner, Daniel Hein and Stefan Kraxberger.
Securing Emergency Response Operations Using
Distributed Trust Decisions |
31 |
Qiang Liu, Jian-ping Yin, Zhi-ping Cai and Ming Zhu. A
Novel Threat Assessment Method for DDoS Early Warning Using
Network Vulnerability Analysis |
34 |
Mohammed Alzomai and Audun Josang. The Mobile Phone as a
Multi OTP Device Using Trusted Computing |
41 |
Jinchao Xu and Guosun Zeng. A software watermarking
algorithm based on stack states transition graph |
43 |
Mansoor Alicherry and Angelos Keromytis. DIPLOMA:
Distributed Policy Enforcement Architecture for MANETs |
45 |
Xiaoxun Sun and Hua Wang. Towards Identify Anonymization in
Large Survey Rating Data |
46 |
alban gabillon and leo letouzey. A view based access
control model for SPARQL |
48 |
Li Lin, Christopher Leckie and Chenfeng Zhou. Comparative
Analysis of HTTP Anomaly Detection Algorithms: DFA vs
N-Grams |
50 |
Andrew White, Alan Tickle and Andrew Clark. Overcoming
Reputation and Proof-of-Work Systems in Botnets |
59 |
Yinghua Guo and Matthew Simon. Network forensics in MANET:
traffic analysis of source spoofed DoS attacks |
66 |
chunli lv, XiaoQi Jia, Li-Jun TIAN and JiWu Jing. Efficient
Ideal Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR
operations |
70 |
Aashish Sharma, Zbigniew Kalbarczyk, Ravishankar Iyer and
James Barlow. Analysis of Credentials Stealing Attacks in an
Open Networked Environment |
72 |
Richard Sinnott and Sardar Hussain. Security-oriented
Workflows for the Social Sciences |
78 |
Fengyu Wang, Bin Gong, Shanqing Guo and Xiaofeng Wang.
Monitoring Heavy-Hitter Flows in High-Speed Network
Concurrently |
80 |
Abdelberi Chaabane, Pere Manils and Mohamed Ali Kaafar. A
Deep Analysis of the Tor Anonymizing Network |
81 |
Suriadi Suriadi, Andrew Clark and Desmond Schmidt.
Validating Denial of Service Vulnerabilities in Web Services |
86 |
Juan E. Tapiador and John A. Clark. Information-Theoretic
Detection of Masquerade Mimicry Attacks |
89 |
Reginald Lal and Andrew Chiou. Computational Intelligence
Utilisation in Simulation of Congestion Control in TCP/IP
Edge Network |
91 |
Yang Liu and Kai Han. Behavior-based Attack Detection and
Reporting in Wireless Sensor Networks |
104 |
Kobra Khanmohammadi and Siv Hilde Houmb. Business
Process-based Information Security Risk Assessment |
109 |
Wael Kanoun, Nora Cuppens-Boulahia, FrĄ§¦dĄ§¦ric Cuppens and
Samuel Dubus. Risk-aware Framework for Activating and
Deactivating Policy-based Response |
121 |
Shan Juan Xie, Sook Yoon and Dong Sun Park. Fingerprint
Reference Point Determination Based on Orientation Features |
122 |
Anya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Claire
Goursault, CĄ§¦dric Lauradoux and Marine Minier. Energy
Friendly Integrity for Network Coding in Wireless Sensor
Networks |
125 |
Alessandro Artale, Bruno Crispo, Fausto Giunchiglia, Fatih
Turkmen and Rui Zhang.
Reasoning
about Relation Based Access Control |
127 |
Hua Wang and Li Sun. Trust-involved access control in
collaborative open social networks |
128 |
Sheng Wen and Wanlei Zhou. CALD: Surviving Various
Application-Layer DDoS Attacks That Mimic Flash Crowd |
Paper ID |
Authors and Title |
10 |
Islam Tharwat, Hossam Fahmy, Ayman M. Bahaa El-Din and
Mohamed hassan El-Shafie. Agent-Based Trusted On-Demand
Routing Protocol for Mobile Ad-hoc Networks |
17 |
Celia Li, Zhuang Wang and Cungang Yang. Secure Routing for
Wireless Mesh Networks |
38 |
Sheila Becker, Humberto Abdelnur, Jorge Lucangeli Obes,
Radu State and Olivier Festor. Improving Fuzz Testing using
Game Theory |
44 |
Rodrigo Roman, Javier Lopez, Cristina Alcaraz and Pablo
Najera.
Wireless
Sensor Networks and the Internet of Things: Do We Need a
Complete Integration? |
47 |
Adonis P.H. Fung and K.W. Cheung. HTTPSLock: Enforcing
HTTPS in Unmodified Browsers with Cached Javascript |
49 |
Raihana Ferdous, Vallipuram Muthukkumarasamy and Abdul
Sattar. A Node-based Trust Management Scheme for Mobile
Ad-Hoc Networks |
54 |
Lifang Zi, John Yearwood and Xinwen Wu. Adaptive Clustering
with Feature Ranking for DDoS Attacks Detection |
56 |
Ahmad Jabas, wael abdulal and Ramachandram Sirandas. An
Efficient and High Scalable Key distribution Scheme for
Mobile Ad Hoc Network through Mining Traffic Meta-data
Patterns |
57 |
Yinghua Guo and Ivan Lee. Forensic analysis of DoS attack
traffic in MANET |
58 |
Yingjie Zhou and Guangmin Hu. Graph Based Network-Wide
Concealed Anomaly Detection |
64 |
Robert Koch and Gabi Dreo. Command Evaluation in Encrypted
Remote Sessions |
67 |
Rong-Jian Chen, Yu-Cheng Peng, Jun-Jian Lin, Jui-Lin Lai
and Shi-Jinn Horng. Novel Multi-bit Bitwise Adaptive
Embedding Algorithms with Minimum Error for Data Hiding |
71 |
Qussai Yaseen and Brajendra Panda. Organizing Access
Privileges: Maximizing the Availability and Mitigating the
Threat of Insiders¡¯ Knowledgebase |
77 |
Mao Huang, Liangfu Lu, Mehmet Orgun and Jiawan Zhang. An
Improved Wavelet Analysis Method for Detecting DDoS Attacks |
79 |
Patryk Szewczyk and Craig Valli. Ignorant Experts: Computer
and Network Security Support from Internet Service Providers |
94 |
Ray Hunt and jill Slay. The Design of Real-time Adaptive
Forensically Sound Secure Critical Infrastructure |
97 |
Eun-Jun Yoon and kee-Young Yoo. A Three-Factor
Authenticated Key Agreement Scheme for SIP on Elliptic
Curves |
98 |
Ron van Schyndel, Udaya Parampalli, Oscar Moreno and Andrew
Tirkel. New Families of 2D & 3D Arrays for Sub-Image
Watermarking |
102 |
Manzur Murshed, Tishna Sabrina, Anindya Iqbal and Kh
Mahmudul Alam. A Novel Anonymization Technique to Trade-off
Location Privacy and Data Integrity in Participatory Sensing
System |
103 |
Shamsul Kamal Ahmad Khalid, Jacob Zimmermann, Diane Corney
and Colin Fidge. Automatic Generation of Assertions to
Detect Potential Security Vulnerabilities in C Programs That
Use Union and Pointer Types |
113 |
Thaneswaran Velauthapillai, Aaron Harwood and Shanika
Karunasekera. Global Detection of Flooding-Based DDoS
Attacks Using a Cooperative Overlay Network |
117 |
Steven Simpson, Adam Lindsay and David Hutchison.
Identifying Legitimate Clients under Distributed
Denial-of-Service Attacks |
123 |
Matthieu-P. Schapranow. A Dynamic Mutual RFID
Authentication Model Preventing Unauthorized Third-Party
Access |
126 |
Ping Li, Wanlei Zhou and Yini Wang. Getting the Real-Time
Precise Round-Trip Time for Stepping Stone Detection |
129 |
Kamaruddin Mohamad, jemal abawajy and Mustafa Deris. DQT-Based
Data Hiding Technique in Digital Images |