


default search action
3rd NSS 2009: Gold Coast, Australia
- Yang Xiang, Javier López, Haining Wang, Wanlei Zhou:

Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3838-9
Distributed Attack Systems and Mechanisms
- John Clark, Sylvain P. Leblanc

, Scott Knight:
Hardware Trojan Horse Device Based on Unintended USB Channels. 1-8 - Ke Li, Wanlei Zhou

, Ping Li, Jing Hai, Jianwen Liu:
Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics. 9-17 - Jemal H. Abawajy:

Enhancing RFID Tag Resistance against Cloning Attack. 18-23 - Mohd Fadzli Marhusin

, Chris Lokan, Henry Larkin, David Cornforth:
A Data Mining Approach for Detection of Self-Propagating Worms. 24-29 - Nasim Vatani, Amir Masoud Rahmani

, Mohammad Ebrahim Shiri:
An Information Filtering Approach. 30-35
Security Architecture in Distributed Network Systems
- Rong-Jian Chen, Yu-Cheng Peng, Jui-Lin Lai, Shi-Jinn Horng:

Architecture Design of High Efficient and Non-memory AES Crypto Core for WPAN. 36-43 - Markus Hinkelmann, Andreas Jakoby, Nina Moebius, Tiark Rompf, Peer Stechert:

A Cryptographically t-Private Auction System. 44-51 - Tilman Wolf

, Russell Tessier:
Design of a Secure Router System for Next-Generation Networks. 52-59 - Robert Koch:

Changing Network Behavior. 60-66 - Olivier Flauzac, Florent Nolot

, Cyril Rabat
, Luiz Angelo Steffenel
:
Grid of Security: A New Approach of the Network Security. 67-72
Security Protocols
- Thaier Hayajneh

, Prashant Krishnamurthy, David Tipper
:
DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks. 73-80 - Yang Zhang:

Effective Attacks in the Tor Authentication Protocol. 81-86 - A. John Prakash

, V. Rhymend Uthariaraj:
Secure Authenticated Key Establishment Protocol for Ad Hoc Networks. 87-94 - Andre L. Alexander, Alexander L. Wijesinha, Ramesh K. Karne:

An Evaluation of Secure Real-Time Transport Protocol (SRTP) Performance for VoIP. 95-101 - Raphael C.-W. Phan

, Wei-Chuen Yau, Bok-Min Goi
:
Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols. 102-106
Security Algorithms and Applications
- Spyros Antonatos, Quang Hieu Vu:

Harnessing the Power of P2P Systems for Fast Attack Signature Validation. 107-114 - Zhongwen Li, Xiaochen Xu, Liang Shi, Jian Liu, Chen Liang:

Authentication in Peer-to-Peer Network: Survey and Research Directions. 115-122 - Dimitris Geneiatakis, Costas Lambrinoudakis

, Stefanos Gritzalis
:
A Hierarchical Model for Cross-Domain Communication of Health Care Units. 123-129 - Xiaoxun Sun, Hua Wang

, Lili Sun:
Extended K-Anonymity Models Against Attribute Disclosure. 130-136 - Kalvinder Singh, Vallipuram Muthukkumarasamy:

Implementation and Analysis of Sensor Security Protocols in a Home Health Care System. 137-142
Implementation, Deployment and Management of Security Systems
- Piyi Yang, Zhenfu Cao, Xiaolei Dong:

Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network. 143-150 - Nabil M. K. Mirza, Ziad Osman, Rached N. Zantout

, Mohamed El-Sayed:
Error Correction of Noisy Block Cipher Using Cipher and Plaintext Characteristics. 151-157 - Jan Muhammad

, Richard O. Sinnott
:
Policy-Driven Patch Management for Distributed Environments. 158-163 - Bruno Lage Srur, Vallipuram Muthukkumarasamy:

Enhancing Trust on e-Government: A Decision Fusion Module. 164-169 - Fernando Bernal-Hidalgo, Manuel Sánchez, Gabriel López, Antonio Fernandez Gómez-Skarmeta

, Óscar Cánovas Reverte:
Trusted Network Access Control in the Eduroam Federation. 170-175
Intelligent Defense Agents and Systems
- Leslie Huin, Danielle Boulanger, Eric Disson:

ACSIS: Agents for Cooperative Secured Information Systems. 176-183 - Rossilawati Sulaiman

, Dharmendra Sharma
, Wanli Ma
, Dat Tran
:
A Multi-agent Security Architecture. 184-191 - Wei Chen, Li Zhu, Xiaomei Cao, Yang Geng:

A Novel Fuzzy Identity-Based Signature with Dynamic Threshold. 192-198 - Bing Sun, Ya-Ping Zhang, Ning Zhang:

Self-Protection Model Based on Intelligent Agent. 199-202 - Shaomin Zhang, Yue Zou, Baoyi Wang:

A Novel Grid Trust Model Based on Fuzzy Theory. 203-207
Security and Privacy in Wireless Networks
- Yang Zhang:

A Pseudonym-Based Signature Scheme for Dynamic Clusters in Ad Hoc Networks. 208-215 - Boyeon Song, Chris J. Mitchell

:
Scalable RFID Pseudonym Protocol. 216-224 - Neila Krichene, Noureddine Boudriga:

Securing Roaming and Vertical Handover in Fourth Generation Networks. 225-231 - Qin Li, Qingkai Zeng:

A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network Protocols. 232-239 - Robert Steele, Kyongho Min:

Flexible Wireless Trust Through Ontology-Based Mapping and Its Attendant Semantic Limitations. 240-245
Distributed Access Control and Trust Management
- Giovanni Russello, Naranker Dulay:

xDUCON: Coordinating Usage Control Policies in Distributed Domains. 246-253 - Pedro Chávez Lugo, Juan Manuel Garcia Garcia, Juan J. Flores

:
A System for Distributed SELinux Policy Management. 254-261 - Marco Ramilli, Marco Prandini

:
A Messaging-Based System for Remote Server Administration. 262-269 - Jinwei Hu, Ruixuan Li, Zhengding Lu:

On Role Mappings for RBAC-Based Secure Interoperation. 270-277 - Aarthi Nagarajan, Vijay Varadharajan

, Michael Hitchens
, Eimear Gallery:
Property Based Attestation and Trusted Computing: Analysis and Challenges. 278-285
Security Theory and Tools
- Qi Zhang, Yi Mu, Minjie Zhang

, Robert Huijie Deng
:
Secure Mobile Agents with Designated Hosts. 286-293 - Yining Liu, Keqiu Li, Yong Zhang, Wenyu Qu:

A Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc Networks. 294-301 - Hua Guo, Xiyong Zhang, Yi Mu, Zhoujun Li:

An Efficient Certificateless Encryption Scheme in the Standard Model. 302-309 - Huiqiang Wang, Hongwu Lv, Guangsheng Feng:

A Self-Reflection Model for Autonomic Computing Systems Based on p-Calculus. 310-315 - Sami Harari:

FSS2-Id/A Fast Safe Identity-Based Multi Signature Scheme. 316-320
Distributed Intrusion Detection/Prevention Systems
- Farah Barika Ktata

, Nabil El-Kadhi
, Khaled Ghédira:
Distributed Agent Architecture for Intrusion Detection Based on New Metrics. 321-327 - Hyunhee Park, Meejoung Kim, Chul-Hee Kang:

F-TAD: Traffic Anomaly Detection for Sub-networks Using Fisher Linear Discriminant. 328-335 - Ming-Ming Xiao, Shun-Zheng Yu, Yu Wang

:
Automatic Network Protocol Automaton Extraction. 336-343 - Alif Wahid, Christopher Leckie

, Chenfeng Vincent Zhou:
Characterising the Evolution in Scanning Activity of Suspicious Hosts. 344-350 - Shui Yu

, Theerasak Thapngam, Jianwen Liu, Su Wei, Wanlei Zhou
:
Discriminating DDoS Flows from Flash Crowds Using Information Distance. 351-356
Security Simulation, Methods and Tools
- Carlos Queiroz, Abdun Naser Mahmood

, Jiankun Hu
, Zahir Tari
, Xinghuo Yu
:
Building a SCADA Security Testbed. 357-364 - Van-Hau Pham, Marc Dacier

:
Honeypot Traces Forensics: The Observation Viewpoint Matters. 365-372 - Matús Harvan, Alexander Pretschner:

State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition. 373-380 - W. Y. Chin, Evangelos P. Markatos, Spyros Antonatos, Sotiris Ioannidis:

HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing. 381-388 - Muhammad Awais Shibli, Sead Muftic, Alessandro Giambruno, Antonio Lioy

:
MagicNET: Security System for Development, Validation and Adoption of Mobile Agents. 389-396
FIAS 2009: Applications of Information Security Technologies
- Mansour M. Alsulaiman, Aasem N. Alyahya, Raed A. Alkharboush, Nasser S. Alghafis:

Intrusion Detection System Using Self-Organizing Maps. 397-402 - Sheeraz Memon, Margaret Lech, Namunu Chinthaka Maddage:

Speaker Verification Based on Different Vector Quantization Techniques with Gaussian Mixture Models. 403-408 - Chan Yeob Yeun

, Salman Mohammed Al-Marzouqi:
Practical Implementations for Securing VoIP Enabled Mobile Devices. 409-414 - Mohamed A. El-Kady, Essam A. Al-Ammar

:
Framework for Identification of Power System Operating Security Regions. 415-419
FIAS 2009: Advances in Information Assurance and Security
- Muhammad Khurram Khan

:
Enhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'. 420-424 - Sumayah Al-Rwais, Jalal Al-Muhtadi

:
A Context-Aware Access Control Model for Pervasive Environments. 425-430 - Ahmed Belkhirat, Abdelghani Bouras

, Abdelkader Belkhir
:
A New Similarity Measure for the Anomaly Intrusion Detection. 431-436 - Yong Jian Chin, Thian Song Ong

, Michael Kah Ong Goh
, Bee Yan Hiew:
Integrating Palmprint and Fingerprint for Identity Verification. 437-442 - Wei Li, Dawu Gu, Yong Wang, Juanru Li, Zhiqiang Liu:

An Extension of Differential Fault Analysis on AES. 443-446 - Ahmed Al-Nazer, Adnan Abdul-Aziz Gutub

:
Exploit Kashida Adding to Arabic e-Text for High Capacity Steganography. 447-451
IDSS-NDS 2009: Intelligent Methods and Algorithms
- Mohammed Md. Mazid, A. B. M. Shawkat Ali

, Kevin S. Tickle:
A Comparison Between Rule Based and Association Rule Mining Algorithms. 452-455 - Jesmin Nahar, Kevin S. Tickle, A. B. M. Shawkat Ali

, Yi-Ping Phoebe Chen
:
Early Breast Cancer Identification: Which Way to Go? Microarray or Image Based Computer Aided Diagnosis!. 456-461 - Lily D. Li

, Xinghuo Yu
, Xiaodong Li
, William W. Guo:
A Modified PSO Algorithm for Constrained Multi-objective Optimization. 462-467 - Reginald Lal, Andrew Chiou:

Significance of Computional Intelligence Method in Computer Networks. 468-473 - Tohari Ahmad

, Jiankun Hu
, Song Han:
An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography. 474-479
IDSS-NDS 2009: Intelligent Systems in Industrial Applications
- Noel Henry Patson:

Visualizing Global Patterns in Huge Digraphs. 480-483 - Wei Peng

, Qingmai Wang, Bin Wang, Xinghuo Yu
:
Putting Simple Hierarchy into Ant Foraging: Cluster-Based Soft-Bots. 484-488 - Roland Dodd, Andrew Chiou, Xinghuo Yu

, Ross Broadfoot:
Industrial Process Model Integration Using a Blackboard Model within a Pan Stage Decision Support System. 489-494 - Roland Dodd, Andrew Chiou, Xinghuo Yu

, Ross Broadfoot:
Functional Characteristics and Proposed Deployment Infrastructure of an Industrial Decision Support System within a Sugar Mill Crystallisation Stage. 495-500 - W. K. Daniel Pun, Ricardo Santa

:
If Cross-Functional Teams are the Answer, What is the Question?. 501-505 - Ananda Jeeva, William W. Guo:

Determining Supply Chain Flexibility Using Statistics and Nueral Networks: A Comparative Study. 506-509
DMAI 2009: Data Mining Algorithms and Applications
- Kit Yan Chan, Siow Yong Low, Sven Nordholm

, Ka Fai Cedric Yiu, Sai-Ho Ling
:
Speech Recognition Enhancement Using Beamforming and a Genetic Algorithm. 510-515 - Sai-Ho Ling

, Hung T. Nguyen
, Kit Yan Chan:
A New Particle Swarm Optimization Algorithm for Neural Network Optimization. 516-521 - Xiong Deng, Moustafa Ghanem

, Yike Guo
:
Real-Time Data Mining Methodology and a Supporting Framework. 522-527 - Khalid Iqbal, Sohail Asghar:

Generating Hierarchical Association Rules with the Use of Bayesian Network. 528-533
DMAI 2009: Advances in Artificial Intelligence
- John Mashford

, Dhammika De Silva, Donavan Marney, Stewart Burn:
An Approach to Leak Detection in Pipe Networks Using Analysis of Monitored Pressure Values by Support Vector Machine. 534-539 - Saroj Ratnoo

, Kamal Kant Bharadwaj:
Discovery of Exceptions: A Step towards Perfection. 540-545 - Fábio Fabris, Leticia Rosetti Margoto, Flávio Miguel Varejão:

Novel Approaches for Detecting Frauds in Energy Consumption. 546-551 - Miho Itoh:

Contextual Analysis Methods Capturing Knowledge Representation Related to the Reputation. 552-559 - Burcu Yurekli, Gökhan Çapan, Baris Yilmazel, Özgür Yilmazel:

Guided Navigation Using Query Log Mining through Query Expansion. 560-564
WMNS 2009: Advances in Wireless and Mobile Networks Security
- Dakila Reyes II, Cedric Angelo M. Festin, Susan Pancho-Festin:

Incentive-Based Self-Organized Public Key Management for Mobile Ad Hoc Networks. 565-570 - James Cannady:

Distributed Detection of Attacks in Mobile Ad Hoc Networks Using Learning Vector Quantization. 571-574 - Book-Sung Park, Dan Qi, Yanli Liu, Bolormaa Khurelbaatar, Chul-Ju Kim:

A Novel Quad-band Internal Antenna with Ni/Ag/Ni Structure for Wireless Mobile Handset. 575-578 - Omessaad Hamdi, Ammar Bouallegue, Sami Harari:

Weakness on Cryptographic Schemes Based on Chained Codes. 579-581

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














