Login / Signup
MMM-ACNS
2001
2007
2011
2017
2001
2017
Keyphrases
Publications
2017
Leonard J. Popyack
,
Jay Biernat
Race Condition Faults in Multi-core Systems.
MMM-ACNS
(2017)
Laurens Lemaire
,
Jan Vossaert
,
Bart De Decker
,
Vincent Naessens
Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems.
MMM-ACNS
(2017)
Alexander A. Grusho
,
Nick A. Grusho
,
Michael I. Zabezhailo
,
Alexander Zatsarinny
,
Elena E. Timonina
Information Security of SDN on the Basis of Meta Data.
MMM-ACNS
(2017)
Hubert Ostap
,
Ryszard Antkiewicz
A Concept of Clustering-Based Method for Botnet Detection.
MMM-ACNS
(2017)
Janusz Górski
,
Katarzyna Lukasiewicz
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile.
MMM-ACNS
(2017)
Evgenia Novikova
,
Ivan Murenin
Visualization-Driven Approach to Anomaly Detection in the Movement of Critical Infrastructure.
MMM-ACNS
(2017)
Anton Kopeikin
,
Arnur G. Tokhtabayev
,
Nurlan Tashatov
,
Dina Satybaldina
tLab: A System Enabling Malware Clustering Based on Suspicious Activity Trees.
MMM-ACNS
(2017)
An Braeken
,
Sergey Bezzateev
,
Abdellah Touhafi
,
Natalia Voloshina
HEPPA: Highly Efficient Privacy Preserving Authentication for ITS.
MMM-ACNS
(2017)
Deeraj Nagothu
,
Andrey M. Dolgikh
iCrawl: A Visual High Interaction Web Crawler.
MMM-ACNS
(2017)
Nanda Kumar Thanigaivelan
,
Ethiopia Nigussie
,
Seppo Virtanen
,
Jouni Isoaho
Towards Self-aware Approach for Mobile Devices Security.
MMM-ACNS
(2017)
Albert Sitek
,
Zbigniew Kotulski
Cardholder's Reputation System for Contextual Risk Management in Payment Transactions.
MMM-ACNS
(2017)
Stig Fr. Mjølsnes
,
Ruxandra F. Olimid
Easy 4G/LTE IMSI Catchers for Non-Programmers.
MMM-ACNS
(2017)
Steven Drager
,
Janusz Zalewski
A Novel and Unifying View of Trustworthiness in Cyberphysical Systems.
MMM-ACNS
(2017)
Marcin Niemiec
,
Maciej Francikiewicz
Security Assessment of Cryptographic Algorithms.
MMM-ACNS
(2017)
Jerzy Konorski
,
Karol Rydzewski
Nodal Cooperation Equilibrium Analysis in Multi-hop Wireless Ad Hoc Networks with a Reputation System.
MMM-ACNS
(2017)
Alexander A. Grusho
Data Mining and Information Security.
MMM-ACNS
(2017)
Qi Dong
,
Zekun Yang
,
Yu Chen
,
Xiaohua Li
,
Kai Zeng
Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis.
MMM-ACNS
(2017)
Andrew Hutchison
Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking Models.
MMM-ACNS
(2017)
Omar Iraqi
,
Hanan El Bakkali
Toward Third-Party Immune Applications.
MMM-ACNS
(2017)
Roberto Metere
,
Changyu Dong
Automated Cryptographic Analysis of the Pedersen Commitment Scheme.
MMM-ACNS
(2017)
Maxim Kolomeec
,
Gustavo Gonzalez Granadillo
,
Elena Doynikova
,
Andrey Chechulin
,
Igor V. Kotenko
,
Hervé Debar
Choosing Models for Security Metrics Visualization.
MMM-ACNS
(2017)
Vasileios Gkioulos
,
Stephen D. Wolthusen
Security Requirements for the Deployment of Services Across Tactical SOA.
MMM-ACNS
(2017)
Alexander Branitskiy
,
Igor V. Kotenko
Network Anomaly Detection Based on an Ensemble of Adaptive Binary Classifiers.
MMM-ACNS
(2017)
Valery I. Korzhik
,
Ivan Fedyanin
,
Artur Godlewski
,
Guillermo Morales-Luna
Steganalysis Based on Statistical Properties of the Encrypted Messages.
MMM-ACNS
(2017)
Matthew Davis
,
Emrah Korkmaz
,
Andrey M. Dolgikh
,
Victor A. Skormin
Resident Security System for Government/Industry Owned Computers.
MMM-ACNS
(2017)
Vasileios Mavroeidis
,
Mathew Nicho
Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks.
MMM-ACNS
(2017)
Arnur G. Tokhtabayev
,
Anton Kopeikin
,
Nurlan Tashatov
,
Dina Satybaldina
Malware Analysis and Detection via Activity Trees in User-Dependent Environment.
MMM-ACNS
(2017)
Emrah Korkmaz
,
Matthew Davis
,
Andrey M. Dolgikh
,
Victor A. Skormin
Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs.
MMM-ACNS
(2017)
volume 10446, 2017
Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings
MMM-ACNS
10446 (2017)
2012
Tyrone Cadenhead
,
Murat Kantarcioglu
,
Vaibhav Khadilkar
,
Bhavani M. Thuraisingham
Design and Implementation of a Cloud-Based Assured Information Sharing System.
MMM-ACNS
(2012)
Vladimir A. Oleshchuk
Trust-Aware RBAC.
MMM-ACNS
(2012)
Andrey M. Dolgikh
,
Tomas Nykodym
,
Victor A. Skormin
,
Zachary Birnbaum
Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks.
MMM-ACNS
(2012)
Fabio Martinelli
,
Ilaria Matteucci
,
Charles Morisset
From Qualitative to Quantitative Enforcement of Security Policy.
MMM-ACNS
(2012)
Vasily Desnitsky
,
Igor V. Kotenko
,
Andrey Chechulin
Configuration-Based Approach to Embedded Device Security.
MMM-ACNS
(2012)
Gianluca Dini
,
Fabio Martinelli
,
Andrea Saracino
,
Daniele Sgandurra
MADAM: A Multi-level Anomaly Detector for Android Malware.
MMM-ACNS
(2012)
Roland Rieke
,
Luigi Coppolino
,
Andrew Hutchison
,
Elsa Prieto
,
Chrystel Gaber
Security and Reliability Requirements for Advanced Security Event Management.
MMM-ACNS
(2012)
Peter D. Zegzhda
,
Dmitry P. Zegzhda
,
Maxim O. Kalinin
,
Artem S. Konoplev
Security Modeling of Grid Systems Using Petri Nets.
MMM-ACNS
(2012)
Viktor Yakovlev
,
Valery I. Korzhik
,
Mihail Bakaev
,
Guillermo Morales-Luna
Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries.
MMM-ACNS
(2012)
Dmitry P. Zegzhda
,
Tatiana V. Stepanova
Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems.
MMM-ACNS
(2012)
Joe-Kai Tsay
,
Stig Fr. Mjølsnes
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols.
MMM-ACNS
(2012)
Brendan Kerrigan
,
Yu Chen
A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts.
MMM-ACNS
(2012)
Chaitanya Yavvari
,
Arnur G. Tokhtabayev
,
Huzefa Rangwala
,
Angelos Stavrou
Malware Characterization Using Behavioral Components.
MMM-ACNS
(2012)
Zhaohui Wang
,
Ryan Johnson
,
Rahul Murmuria
,
Angelos Stavrou
Exposing Security Risks for Commercial Mobile Devices.
MMM-ACNS
(2012)
Julian Schütte
,
Roland Rieke
,
Timo Winkelvos
Model-Based Security Event Management.
MMM-ACNS
(2012)
Peter D. Zegzhda
,
Dmitry P. Zegzhda
,
Alexey V. Nikolskiy
Using Graph Theory for Cloud System Security Modeling.
MMM-ACNS
(2012)
Alexander A. Moldovyan
,
Nikolay A. Moldovyan
,
Evgenia Novikova
Blind 384-bit Digital Signature Scheme.
MMM-ACNS
(2012)
Tigran Avanesov
,
Yannick Chevalier
,
Michaël Rusinowitch
,
Mathieu Turuani
Towards the Orchestration of Secured Services under Non-disclosure Policies.
MMM-ACNS
(2012)
Xin Jin
,
Ravi S. Sandhu
,
Ram Krishnan
RABAC: Role-Centric Attribute-Based Access Control.
MMM-ACNS
(2012)
Benjamin Livshits
Finding Malware on a Web Scale.
MMM-ACNS
(2012)
volume 7531, 2012
Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings
MMM-ACNS
7531 (2012)