Login / Signup
WOSIS
2004
2008
2010
2014
2004
2014
Keyphrases
Publications
2014
Ajay Nagarajan
,
Arun Sood
SCIT Based Moving Target Defense Reduces and Shifts Attack Surface.
WOSIS
(2014)
David Kelm
,
Melanie Volkamer
Towards a Social Engineering Test Framework.
WOSIS
(2014)
WOSIS 2014 - Proceedings of the 11th International Workshop on Security in Information Systems, Lisbon, Portugal, 27 April, 2014
WOSIS
(2014)
Andrey Jivsov
WCFB: A Wide Block Encryption for Large Data Sets.
WOSIS
(2014)
Christian Schmitt
,
Peter Liggesmeyer
Implications of the Operational Environmental on Software Security Requirements Engineering.
WOSIS
(2014)
Luis Márquez Alcañiz
,
David G. Rosado
,
Daniel Mellado
,
Eduardo Fernández-Medina
Security in Legacy Systems Migration to the Cloud: A Systematic Mapping Study.
WOSIS
(2014)
Francisco Martín-Fernández
,
Pino Caballero-Gil
,
Cándido Caballero-Gil
,
Jezabel Molina-Gil
Increasing Privacy and Trust in Cooperative Social Platforms for Vehicular Applications.
WOSIS
(2014)
Vivaksha J. Jariwala
,
Devesh C. Jinwala
Privacy and Integrity Preserving Secure Data Aggregation in Wireless Sensor Networks.
WOSIS
(2014)
Changwei Liu
,
Anoop Singhal
,
Duminda Wijesekera
A Model Towards Using Evidence from Security Events for Network Attack Analysis.
WOSIS
(2014)
2011
Jaime Devesa
,
Xabier Cantero
,
Gonzalo Álvarez Marañón
,
Pablo García Bringas
An efficient Security Solution for Dealing with Shortened URL Analysis.
WOSIS
(2011)
WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011
WOSIS
(2011)
Min-Hua Shao
,
Yi-Ping Lee
,
Yen-Fen Hou
,
Cheng-Yi Ho
A Trusted Routing Based Service Discovery Protocol with Backup Nodes in MANETs.
WOSIS
(2011)
Ye Hou
,
Ping Gao
,
Richard Heeks
The Influence of Institutional Forces on Employee Compliance with Information Security Policies.
WOSIS
(2011)
Hannes Holm
,
Teodor Sommestad
,
Ulrik Franke
,
Mathias Ekstedt
Expert Assessment on the Probability of Successful Remote Code Execution Attacks.
WOSIS
(2011)
Sergey Butakov
,
Craig Barber
,
Vadim Diagilev
,
Alexey Mikhailov
Architecture of Plagiarism Detection Service that Does Not Violate Intellectual Property of the Student.
WOSIS
(2011)
Jérôme Dossogne
,
Stephane Fernandes Medeiros
Enhancing Cryptographic Code against Side Channel Cryptanalysis with Aspects.
WOSIS
(2011)
Oscar Rebollo
,
Daniel Mellado
,
Eduardo Fernández-Medina
A Comparative Review of Cloud Security Proposals with ISO/IEC 27002.
WOSIS
(2011)
Antonio Santos-Olmo Parra
,
Luís Enrique Sanchez
,
Eduardo Fernández-Medina
,
Mario Piattini
Desirable Characteristics for an ISMS oriented to SMEs.
WOSIS
(2011)
Angel Gallego
,
Antonio Santos-Olmo Parra
,
Luís Enrique Sanchez
,
Eduardo Fernández-Medina
Automated Security Metrics in ISMSs to Discover the Level of Security of OSs and DBMSs.
WOSIS
(2011)
Santiago Moral-García
,
Santiago Moral-Rubio
,
Eduardo Fernández-Medina
Security Pattern Mining: Systematic Review and Proposal.
WOSIS
(2011)
Jezabel Molina-Gil
,
Pino Caballero-Gil
,
Cándido Caballero-Gil
Enhancing Cooperation in Wireless Vehicular Networks.
WOSIS
(2011)
Dina Satybaldina
,
Altynbek Sharipbayev
,
Aigul Adamova
Implementation of the Finite Automaton Public Key Cryptosystem on FPGA.
WOSIS
(2011)
Roberto Ortiz
,
Santiago Moral-Rubio
,
Javier Garzás
,
Eduardo Fernández-Medina
Towards a Pattern-based Security Methodology to Build Secure Information Systems.
WOSIS
(2011)
Waldo Rocha Flores
,
Mathias Ekstedt
Information Security Governance Analysis Using Probabilistic Relational Models.
WOSIS
(2011)
Alban Gabillon
A Privacy Model for Social Networks.
WOSIS
(2011)
HonGian Karen Lu
Accessing Cloud through API in a More Secure and Usable Way.
WOSIS
(2011)
Haibo Hu
,
Dan Yang
,
Hong Xiang
,
Li Fu
,
Chunxiao Ye
,
Ren Li
Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases.
WOSIS
(2011)