​
Login / Signup
CyberSecurity
2012
2012
2012
Keyphrases
Publications
2012
Satyajeet Nimgaonkar
,
Srujan Kotikela
,
Mahadevan Gomathisankaran
CTrust: A Framework for Secure and Trustworthy Application Execution in Cloud Computing.
CyberSecurity
(2012)
Hanchen Song
,
Chris Muelder
,
Kwan-Liu Ma
Crucial Nodes Centric Visual Monitoring and Analysis of Computer Networks.
CyberSecurity
(2012)
Pallavi Patil
,
Pavol Zavarsky
,
Dale Lindskog
,
Ron Ruhl
Fault Tree Analysis of Accidental Insider Security Events.
CyberSecurity
(2012)
Tanja Zseby
Is IPv6 Ready for the Smart Grid?
CyberSecurity
(2012)
Bo Zhou
,
David Llewellyn-Jones
,
Qi Shi
,
Muhammad Asim
,
Madjid Merabti
,
David J. Lamb
A Compose Language-Based Framework for Secure Service Composition.
CyberSecurity
(2012)
Fernando Sanchez
,
Zhenhai Duan
A Sender-Centric Approach to Detecting Phishing Emails.
CyberSecurity
(2012)
Wade Gasior
,
Li Yang
Exploring Covert Channel in Android Platform.
CyberSecurity
(2012)
Marlies Rybnicek
,
Rainer Poisel
,
Manfred Ruzicka
,
Simon Tjoa
A Generic Approach to Critical Infrastructure Modeling and Simulation.
CyberSecurity
(2012)
Ahmed AlEroud
,
George Karabatis
A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks.
CyberSecurity
(2012)
Chung-Wei Lin
,
Alberto L. Sangiovanni-Vincentelli
Cyber-Security for the Controller Area Network (CAN) Communication Protocol.
CyberSecurity
(2012)
Nazari Skrupsky
,
Maliheh Monshizadeh
,
Prithvi Bisht
,
Timothy L. Hinrichs
,
V. N. Venkatakrishnan
,
Lenore D. Zuck
WAVES: Automatic Synthesis of Client-Side Validation Code for Web Applications.
CyberSecurity
(2012)
Todd Baumeister
,
Yingfei Dong
,
Zhenhai Duan
,
Guanyu Tian
A Routing Table Insertion (RTI) Attack on Freenet.
CyberSecurity
(2012)
Simon Reay Atkinson
,
David Walker
,
Kevin Beaulne
,
Liaquat Hossain
Cyber - Transparencies, Assurance and Deterrence.
CyberSecurity
(2012)
Denise Ferebee
,
Dipankar Dasgupta
,
Qishi Wu
A Cyber-Security Storm MAP.
CyberSecurity
(2012)
Johannes de Vries
,
Hans Hoogstraaten
,
Jan van den Berg
,
Semir Daskapan
Systems for Detecting Advanced Persistent Threats: A Development Roadmap Using Intelligent Data Analysis.
CyberSecurity
(2012)
Paul Giura
,
Wei Wang
A Context-Based Detection Framework for Advanced Persistent Threats.
CyberSecurity
(2012)
Sharif Hassan
,
Ratan Guha
Security and Integrity Analysis Using Indicators.
CyberSecurity
(2012)
Olga Kulikova
,
Ronald Heil
,
Jan van den Berg
,
Wolter Pieters
Cyber Crisis Management: A Decision-Support Framework for Disclosing Security Incident Information.
CyberSecurity
(2012)
Shlomi Dolev
,
Niv Gilboa
,
Marina Kopeetsky
Permanent Revocation in Attribute Based Broadcast Encryption.
CyberSecurity
(2012)
Alex Doyal
,
Justin Zhan
,
Huiming Anna Yu
Towards Defeating DDoS Attacks.
CyberSecurity
(2012)
Kazuya Kishimoto
,
Kenji Ohira
,
Yukiko Yamaguchi
,
Hirofumi Yamaki
,
Hiroki Takakura
An Adaptive Honeypot System to Capture IPv6 Address Scans.
CyberSecurity
(2012)
Anass Bayaga
,
Stephen Flowerday
Principal Causes of Information Communication Technology (ICT) Risk Failure in an SME.
CyberSecurity
(2012)
Munene W. Kanampiu
,
Justin Zhan
A Dynamic Covert Passive Actors Detection Scheme for a Healthy Networked Community.
CyberSecurity
(2012)
2012 ASE International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012
CyberSecurity
(2012)
Woohyun Shim
,
Luca Allodi
,
Fabio Massacci
Crime Pays If You Are Just an Average Hacker.
CyberSecurity
(2012)
Andre Abadie
,
Duminda Wijesekera
Leveraging an Inventory of the Cognitive Radio Attack Surface.
CyberSecurity
(2012)
Jun Dai
,
Xiaoyan Sun
,
Peng Liu
,
Nicklaus A. Giacobe
Gaining Big Picture Awareness through an Interconnected Cross-Layer Situation Knowledge Reference Model.
CyberSecurity
(2012)
Robert F. Erbacher
,
Steve E. Hutchinson
Extending Case-Based Reasoning to Network Alert Reporting.
CyberSecurity
(2012)
Shams Zawoad
,
Ragib Hasan
I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics.
CyberSecurity
(2012)