Sign in
WOSIS
2004
2007
2011
2014
2004
2014
Keyphrases
Publications
2014
Ajay Nagarajan
,
Arun Sood
SCIT Based Moving Target Defense Reduces and Shifts Attack Surface.
WOSIS
(2014)
David Kelm
,
Melanie Volkamer
Towards a Social Engineering Test Framework.
WOSIS
(2014)
WOSIS 2014 - Proceedings of the 11th International Workshop on Security in Information Systems, Lisbon, Portugal, 27 April, 2014
WOSIS
(2014)
Andrey Jivsov
WCFB: A Wide Block Encryption for Large Data Sets.
WOSIS
(2014)
Christian Schmitt
,
Peter Liggesmeyer
Implications of the Operational Environmental on Software Security Requirements Engineering.
WOSIS
(2014)
Luis Márquez Alcañiz
,
David G. Rosado
,
Daniel Mellado
,
Eduardo Fernández-Medina
Security in Legacy Systems Migration to the Cloud: A Systematic Mapping Study.
WOSIS
(2014)
Francisco Martín-Fernández
,
Pino Caballero-Gil
,
Cándido Caballero-Gil
,
Jezabel Molina-Gil
Increasing Privacy and Trust in Cooperative Social Platforms for Vehicular Applications.
WOSIS
(2014)
Vivaksha J. Jariwala
,
Devesh C. Jinwala
Privacy and Integrity Preserving Secure Data Aggregation in Wireless Sensor Networks.
WOSIS
(2014)
Changwei Liu
,
Anoop Singhal
,
Duminda Wijesekera
A Model Towards Using Evidence from Security Events for Network Attack Analysis.
WOSIS
(2014)
2011
Jaime Devesa
,
Xabier Cantero
,
Gonzalo Álvarez Marañón
,
Pablo García Bringas
An efficient Security Solution for Dealing with Shortened URL Analysis.
WOSIS
(2011)
WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011
WOSIS
(2011)
Min-Hua Shao
,
Yi-Ping Lee
,
Yen-Fen Hou
,
Cheng-Yi Ho
A Trusted Routing Based Service Discovery Protocol with Backup Nodes in MANETs.
WOSIS
(2011)
Ye Hou
,
Ping Gao
,
Richard Heeks
The Influence of Institutional Forces on Employee Compliance with Information Security Policies.
WOSIS
(2011)
Hannes Holm
,
Teodor Sommestad
,
Ulrik Franke
,
Mathias Ekstedt
Expert Assessment on the Probability of Successful Remote Code Execution Attacks.
WOSIS
(2011)
Sergey Butakov
,
Craig Barber
,
Vadim Diagilev
,
Alexey Mikhailov
Architecture of Plagiarism Detection Service that Does Not Violate Intellectual Property of the Student.
WOSIS
(2011)
Jérôme Dossogne
,
Stephane Fernandes Medeiros
Enhancing Cryptographic Code against Side Channel Cryptanalysis with Aspects.
WOSIS
(2011)
Oscar Rebollo
,
Daniel Mellado
,
Eduardo Fernández-Medina
A Comparative Review of Cloud Security Proposals with ISO/IEC 27002.
WOSIS
(2011)
Antonio Santos-Olmo Parra
,
Luís Enrique Sanchez
,
Eduardo Fernández-Medina
,
Mario Piattini
Desirable Characteristics for an ISMS oriented to SMEs.
WOSIS
(2011)
Angel Gallego
,
Antonio Santos-Olmo Parra
,
Luís Enrique Sanchez
,
Eduardo Fernández-Medina
Automated Security Metrics in ISMSs to Discover the Level of Security of OSs and DBMSs.
WOSIS
(2011)
Santiago Moral-García
,
Santiago Moral-Rubio
,
Eduardo Fernández-Medina
Security Pattern Mining: Systematic Review and Proposal.
WOSIS
(2011)
Jezabel Molina-Gil
,
Pino Caballero-Gil
,
Cándido Caballero-Gil
Enhancing Cooperation in Wireless Vehicular Networks.
WOSIS
(2011)
Dina Satybaldina
,
Altynbek Sharipbayev
,
Aigul Adamova
Implementation of the Finite Automaton Public Key Cryptosystem on FPGA.
WOSIS
(2011)
Roberto Ortiz
,
Santiago Moral-Rubio
,
Javier Garzás
,
Eduardo Fernández-Medina
Towards a Pattern-based Security Methodology to Build Secure Information Systems.
WOSIS
(2011)
Waldo Rocha Flores
,
Mathias Ekstedt
Information Security Governance Analysis Using Probabilistic Relational Models.
WOSIS
(2011)
Alban Gabillon
A Privacy Model for Social Networks.
WOSIS
(2011)
HonGian Karen Lu
Accessing Cloud through API in a More Secure and Usable Way.
WOSIS
(2011)
Haibo Hu
,
Dan Yang
,
Hong Xiang
,
Li Fu
,
Chunxiao Ye
,
Ren Li
Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases.
WOSIS
(2011)
2009
Basel Alomair
,
Radha Poovendran
Unconditionally Secure Authenticated Encryption with Shorter Keys.
WOSIS
(2009)
Candelaria Hernández-Goya
,
Pino Caballero-Gil
,
Amparo Fúster-Sabater
Rethinking Self-organized Public-key Management for Mobile Ad-Hoc Networks.
WOSIS
(2009)
Víctor Torres
,
Jaime Delgado
,
Xavier Maroñas
,
Silvia Llorente
,
Marc Gauvin
Enhancing Rights Management Systems through the Development of Trusted Value Networks.
WOSIS
(2009)
Pino Caballero-Gil
,
Amparo Fúster-Sabater
,
Candelaria Hernández-Goya
Deterministic Cryptanalysis of some Stream Ciphers.
WOSIS
(2009)
Óscar Sánchez Ramón
,
Fernando Molina
,
Jesús García Molina
,
José Ambrosio Toval Álvarez
A Model Driven Approach for Generating Code from Security Requirements.
WOSIS
(2009)
Mukhtiar Memon
,
Michael Hafner
,
Ruth Breu
Security as a Service - A Reference Architecture for SOA Security.
WOSIS
(2009)
Corrado Aaron Visaggio
,
Francesca de Rosa
Managing Security Knowledge through Case based Reasoning.
WOSIS
(2009)
William R. Claycomb
,
Dongwan Shin
An Enhanced Approach to using Virtual Directories for Protecting Sensitive Information.
WOSIS
(2009)
Boustia Narhimene
,
Aïcha Mokhtari
DLδε-OrBAC: Context based Access Control.
WOSIS
(2009)
Jonathan White
,
Brajendra Panda
,
Quassai Yassen
,
Khanh Nguyen
,
Weihan Li
Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation.
WOSIS
(2009)
Axel Schröpfer
,
Florian Kerschbaum
,
Dagmar Sadkowiak
,
Richard Pibernik
Risk-Aware Secure Supply Chain Master Planning.
WOSIS
(2009)
Luís Enrique Sanchez
,
Antonio Santos-Olmo Parra
,
Eduardo Fernández-Medina
,
Mario Piattini
MMSM-SME: Methodology for the Management of Security and its Maturity in SME.
WOSIS
(2009)
Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009
WOSIS
(2009)
Juan Jose Roque
SLSB: Improving the Steganographic Algorithm LSB.
WOSIS
(2009)
2008
Min-Hua Shao
,
Shin-Jia Huang
Trust-Aware Anonymous and Efficient Routing for Mobile Ad-Hoc Networks.
WOSIS
(2008)
Cameron Ross Dunne
,
Thibault Candebat
,
David Gray
An Access Control Model for Location based Services.
WOSIS
(2008)
Marco Ramilli
,
Marco Prandini
Adaptive Filtering of Comment Spam in Multi-user Forums and Blogs.
WOSIS
(2008)
William M. Fitzgerald
,
Simon N. Foley
,
Mícheál Ó Foghlú
Network Access Control Interoperation using Semantic Web Techniques.
WOSIS
(2008)
Koen Buyens
,
Bart De Win
,
Wouter Joosen
Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization.
WOSIS
(2008)
Sergio Pozo
,
Rafael Ceballos
,
Rafael M. Gasca
Firewall Rule Set Inconsistency Characterization by Clustering.
WOSIS
(2008)
Asmaa Adnane
,
Christophe Bidan
,
Rafael T. de Sousa Jr.
Effectiveness of Trust Reasoning for Attack Detection in OLSR.
WOSIS
(2008)
Pino Caballero-Gil
,
Amparo Fúster-Sabater
,
Maria Eugenia Pazo-Robles
New Attack Strategy for the Shrinking Generator.
WOSIS
(2008)
Heinz Lothar Grob
,
Gereon Strauch
,
Jan Hermans
Conceptual Design of a Method to Support IS Security Investment Decisions within the Context of Critical Business Processes.
WOSIS
(2008)