Login / Signup
Security and Management
2003
2006
2010
2003
2010
Keyphrases
Publications
2010
Raymond Wu
,
Masayuki Hisada
,
Atsushi Kara
,
Takafumi Hayashi
Event Capture Approaches for Vulnerability Detection.
Security and Management
(2010)
Do-Hoon Kim
,
Hoh Peter In
,
Hyun-Cheol Jeong
Learning-based Threshold Estimation Model for Detection of Botnet Malicious Activities.
Security and Management
(2010)
Levent Ertaul
,
S. Singhal
,
Gökay Saldamli
Security Challenges in Cloud Computing.
Security and Management
(2010)
Vivek Patole
,
Vinod Keshaorao Pachghare
,
Parag Kulkarni
Performance Analysis of Intrusion Detection System at Training Time Using AdaBoost Algorithm.
Security and Management
(2010)
Michael Kozma
,
Jeffrey Scaparra
,
Aaron Doty
,
Matthew Simmons
The Potential Pitfalls and Security Risks of IPv6.
Security and Management
(2010)
David Pearson
,
Sumita Mishra
,
Yin Pan
Security Attacks And Defenses In Sensor Networks.
Security and Management
(2010)
Michael R. Grimaila
,
Robert F. Mills
,
Michael W. Haas
,
Douglas J. Kelly
Mission Assurance: Issues and Challenges.
Security and Management
(2010)
Kevin Daimi
,
Jinnan Song
An Approach to Secure E-Visit Systems.
Security and Management
(2010)
Robert Hakobyan
,
Hovhannes Hovsepyan
Object Recognition on the Securing Area.
Security and Management
(2010)
Jezabel Molina-Gil
,
Cándido Caballero-Gil
,
Pino Caballero-Gil
Group Proposal to Secure Vehicular Ad-Hoc Networks.
Security and Management
(2010)
Jong-Hyuk Kim
,
Jae-Chel Ryou
,
Hee-Bong Choi
,
Keon-Woo Kang
Development Document Framework of IT Security Products for CC.
Security and Management
(2010)
Joseph Weiss
The Need for Interdisciplinary Programs for Cyber Security of Industrial Control Systems.
Security and Management
(2010)
Souvik Bhattacharyya
,
Goutam Sanyal
Hiding Data in Images Using Pixel Mapping Method (PMM).
Security and Management
(2010)
Pedro Diaz-Gomez
,
Gregory Steen
A Hacking View of Access Control.
Security and Management
(2010)
Vinod Naga
,
John M. Colombi
,
Michael R. Grimaila
,
Kenneth M. Hopkinson
Enabling Performance of Mission-Oriented Networks Through Quality of Service Methods.
Security and Management
(2010)
Gevorg Margarov
,
Vahan Markarov
Digital Image Steganography Using Matrix Addition.
Security and Management
(2010)
Jonathan Z. Sun
The Application of One-Way Hash Functions in Information Security Protocols.
Security and Management
(2010)
Richard Wasniowski
Multiagent Based Approach for Supporting Situation Assessment.
Security and Management
(2010)
Linda Markowsky
An SELinux Sourcebook for Cybersecurity Educators.
Security and Management
(2010)
Jonathan Citty
,
Dugald Ralph Hutchings
Design and Evaluation of an Image-based Authentication System for Small Touch-screens.
Security and Management
(2010)
Dinesh Kumar Saini
,
Wail M. Omar
,
Hemraj Saini
Cyber Defense Architecture for Campus Intranet.
Security and Management
(2010)
Suhair Amer
,
John Hamilton
Resource Evaluation of Positive and Negative Selection.
Security and Management
(2010)
Abrar A. Qureshi
,
Kamel Rekab
,
Carlos E. Otero
A Statistical Approach for Anomaly-Based Network Intrusion Detection Using Logistic Regression.
Security and Management
(2010)
Vahan Markarov
,
Armen Ghazaryan
Detection of Distributed Attacks Based on Hybrid Neural Networks.
Security and Management
(2010)
Nattakant Utakrit
A Review of Approaching Customer Online Banking Authentication Against Cyber Attacks.
Security and Management
(2010)
Sunil V. K. Gaddam
,
Manohar Lal
A New Approach For Formulating Randomized Cryptographic Key Generation Using Cancelable Biometrics.
Security and Management
(2010)
Ahmad Ghafarian
,
Jonathan Strahan
Asset Identification and Valuation.
Security and Management
(2010)
Ryu Watanabe
,
Yuto Nakano
,
Toshiaki Tanaka
Single Sign-on Techniques with PKI-based Authentication for Mobile Phones.
Security and Management
(2010)
Ali Emdadi
,
Ramesh K. Karne
,
Alexander L. Wijesinha
TLS Timings On A Bare PC.
Security and Management
(2010)
Hsiang-Cheh Huang
,
Wai-Chi Fang
Reversible Data Hiding Using Characteristics of Original Contents.
Security and Management
(2010)
Xiaodong Meng
,
Nandita Bhattacharjee
Blind Audio Watermarking Based on Neighbouring Energy Feature.
Security and Management
(2010)
Chialin Chen
,
Elijah Mike
,
Fan Wu
Investigating Forensic Software Solutions to Acquire Information from Mobile Device.
Security and Management
(2010)
Mohssen M. Z. E. Mohammed
,
H. Anthony Chan
,
Neco Ventura
,
Mohsin Hashim
,
Izzeldin Amin
Zero-day Polymorphic Worms Detection Using A modified Boyer-Moore Algorithm.
Security and Management
(2010)
Saman Shojae Chaeikar
,
Hamidreza Sabet Moghaddam
,
Hossein Rouhani Zeidanloo
Node Based Interpretative Key Management Framework.
Security and Management
(2010)
Victor Gayoso Martínez
,
Luis Hernández Encinas
,
Carmen Sanchez-Avila
A Java Implementation of the Elliptic Curve Integrated Encryption Scheme.
Security and Management
(2010)
Jack Horner
A Phylogenetic Approach to Analyzing IP-Address Artifacts of Cyber-Attacks.
Security and Management
(2010)
Chi Sing Chum
,
Xiaowen Zhang
Applying Hash Functions in the Latin Square Based Secret Sharing Schemes.
Security and Management
(2010)
Bruce Hartpence
,
Daryl Johnson
A Re-examination of Network Address Translation Security.
Security and Management
(2010)
Xiangwei Kong
,
Xingang You
,
Bo Wang
,
Shize Shang
,
Linjie Shen
Laser Printer Source Forensics for Arbitrary Chinese Characters.
Security and Management
(2010)
Mauro Migliardi
,
Gianluca Stringhini
Travelling Information For Intrusion Prevention Systems.
Security and Management
(2010)
Muhammad Nadeem Sial
,
Muhammed Nauman Qureshi
Design, Evaluation and Implementation Technique for Cryptographically Secure Dynamic S-Boxes.
Security and Management
(2010)
Artur Mkrtchyan
,
Donara Gabrielyan
On Information Security Knowledge Assessment.
Security and Management
(2010)
Arnur G. Tokhtabayev
,
Victor A. Skormin
,
Andrey M. Dolgikh
Behavioral Obfuscation in Malware and its Mitigation via Signature Generalization.
Security and Management
(2010)
David Cooper
,
Damon Pollard
,
Christopher Bolan
Forensic Data Reocvery on the 8GB Fifth Generation iPod Nano.
Security and Management
(2010)
David Sorrels
,
Michael R. Grimaila
Towards Predictive Mission Risk Analysis to Operationalize Mission Assured Networking.
Security and Management
(2010)
Maha Tolba
,
Tigran Andreasyan
,
Vahan Markarov
A New Approach for Fingerprint Minutia Extraction Algorithm.
Security and Management
(2010)
Rami Baroody
,
Nizar Al-Holou
Designing a Course on Jini-Based Vehicle Network Security.
Security and Management
(2010)
Wook Shin
,
Shinsaku Kiyomoto
,
Kazuhide Fukushima
,
Toshiaki Tanaka
A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework.
Security and Management
(2010)
Yang Liang
,
Nandita Bhattacharjee
,
Xiaodong Meng
A Secure Image Watermarking Scheme for Image Copy Control and Copyright Protection Using Biometrics.
Security and Management
(2010)
Takumi Yamamoto
,
Yuma Usui
,
Fumihiko Magata
,
Yoshimi Teshigawara
,
Ryôichi Sasaki
,
Masakatsu Nishigaki
A Security Measure Selection Scheme with Consideration of Potential Lawsuits.
Security and Management
(2010)