Login / Signup
SECURWARE
2007
2010
2007
2010
Keyphrases
Publications
2010
Homam El-Taj
,
Omar Abouabdalla
,
Ahmed M. Manasrah
,
Ahmed Al-Madi
,
Muhammad Imran Sarwar
,
Sureswaran Ramadass
Forthcoming Aggregating Intrusion Detection System Alerts Framework.
SECURWARE
(2010)
Kun Peng
,
Feng Bao
A Shuffling Scheme with Strict and Strong Security.
SECURWARE
(2010)
Tamás Paulik
,
Ádám Máté Földes
,
Gábor György Gulyás
BlogCrypt: Private Content Publishing on the Web.
SECURWARE
(2010)
Bilal Khan
,
Muhammad Khurram Khan
,
Maqsood Mahmud
,
Khaled Alghathbar
Security Analysis of Firewall Rule Sets in Computer Networks.
SECURWARE
(2010)
Jonas Pfoh
,
Christian A. Schneider
,
Claudia Eckert
Exploiting the x86 Architecture to Derive Virtual Machine State Information.
SECURWARE
(2010)
Pierre de Leusse
,
Theo Dimitrakos
SOA-Based Security Governance Middleware.
SECURWARE
(2010)
Sarosh Hashmi
,
John Brooke
Towards Sybil Resistant Authentication in Mobile Ad Hoc Networks.
SECURWARE
(2010)
Manfred Schäfer
,
Wolf-Dietrich Moeller
Strategies for Managed Software Integrity Protection.
SECURWARE
(2010)
Jonathan Rouzaud-Cornabas
,
Patrice Clemente
,
Christian Toinard
An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OS.
SECURWARE
(2010)
Wolfgang Boehmer
Analysis of Strongly and Weakly Coupled Management Systems in Information Security.
SECURWARE
(2010)
S. Hasan Mirjalili
,
Arjen K. Lenstra
Towards a Structural Secure Design Process.
SECURWARE
(2010)
Jin Tamura
Improving the Efficiency of a Highly-Used Access Control Scheme.
SECURWARE
(2010)
Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010
SECURWARE
(2010)
Fan Wu
,
Chung-Han Chen
,
Hira N. Narang
An Efficient Acceleration of Symmetric Key Cryptography Using General Purpose Graphics Processing Unit.
SECURWARE
(2010)
Masaru Takesue
Cascaded Simple Filters for Accurate and Lightweight Email-Spam Detection.
SECURWARE
(2010)
Praveen Bommannavar
,
Nicholas Bambos
Patch Scheduling for Risk Exposure Mitigation under Service Disruption Constraints.
SECURWARE
(2010)
Keunwoo Rhee
,
Byunghee Lee
,
Dongho Won
,
Hac Yun Na
,
Seungjoo Kim
Vulnerabilities and Improvements of Du-Xiao-Chen-Wu's Secure Cell Relay Routing Protocol for Sensor Networks.
SECURWARE
(2010)
Francesco Beritelli
,
Salvatore Casale
,
Rosario Grasso
,
Andrea Spadaccini
Performance Evaluation of SNR Estimation Methods in Forensic Speaker Recognition.
SECURWARE
(2010)
Pierluigi Failla
Heuristic Search in Encrypted Graphs.
SECURWARE
(2010)
Cagatay Karabat
,
Mehmet Keskinoz
Blind Detectors in Spread Spectrum Watermarking for Interference Reduction.
SECURWARE
(2010)
Rainer Falk
,
Hans-Joachim Hof
Industrial Sensor Network Security Architecture.
SECURWARE
(2010)
Thomas Ormerod
,
Lingyu Wang
,
Mourad Debbabi
,
Amr M. Youssef
,
Hamad Binsalleeh
,
Amine Boukhtouta
,
Prosenjit Sinha
Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat.
SECURWARE
(2010)
Daniel Hartung
,
Christoph Busch
Biometric Transaction Authentication Protocol.
SECURWARE
(2010)
Mathieu Blanc
,
Jérémy Briffaut
,
Thibault Coullet
,
Maxime Fonda
,
Christian Toinard
Protection of a Shared HPC Cluster.
SECURWARE
(2010)
Ahlem Bouchahda
,
Nhan Le Thanh
,
Adel Bouhoula
,
Faten Labbene
RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases.
SECURWARE
(2010)
Boulares Ouchenne
,
Ousmane Koné
A Security Control Architecture for SOAP-Based Services.
SECURWARE
(2010)
Dongkyun Ahn
,
Gyungho Lee
Prospect of Fine Grain Dynamic Memory Access Control with Profiling.
SECURWARE
(2010)
Reijo M. Savola
,
Petri Heinonen
Security-Measurability-Enhancing Mechanisms for a Distributed Adaptive Security Monitoring System.
SECURWARE
(2010)
Francesco Beritelli
,
Andrea Spadaccini
A Statistical Approach to Biometric Identity Verification Based on Heart Sounds.
SECURWARE
(2010)
Cynthia Y. Lester
Shifting the Paradigm: Training Undergraduate Students in Software Security.
SECURWARE
(2010)
Hiroto Kakiuchi
,
Takao Kawamura
,
Toshihiko Sasama
,
Kazunori Sugahara
Detection Methods Improving Reliability of Automatic Human Tracking System.
SECURWARE
(2010)
Jaziar Radianti
Eliciting Information on the Vulnerability Black Market from Interviews.
SECURWARE
(2010)
Danilo Valeros Bernardo
,
Doan Hoang
Protecting Next Generation High Speed Network Protocol - UDT through Generic Security Service Application Program Interface - GSS-API.
SECURWARE
(2010)
Tewfiq El Maliki
,
Jean-Marc Seigneur
A Security Adaptation Reference Monitor (SARM) for Highly Dynamic Wireless Environments.
SECURWARE
(2010)
Donghai Tian
,
Deguang Kong
,
Changzhen Hu
,
Peng Liu
Protecting Kernel Data through Virtualization Technology.
SECURWARE
(2010)
Francisco José Bellido Outeiriño
,
Pedro Canales Aranda
,
José Luis de la Cruz Fernández
,
Benito Pérez Jarauta
Universal Bluetooth Access Control and Security System for e-Keys Enviroments.
SECURWARE
(2010)
Mohit Soni
,
Sandesh Gupta
,
M. S. Rao
,
Phalguni Gupta
An Efficient Vein Pattern-Based Recognition System.
SECURWARE
(2010)
Ravishankar Borgaonkar
An Analysis of the Asprox Botnet.
SECURWARE
(2010)
Abdel Alim Kamal
,
Amr M. Youssef
Applications of SAT Solvers to AES Key Recovery from Decayed Key Schedule Images.
SECURWARE
(2010)
Sedat Soydan
Analyzing the DPA Leakage of the Masked S-box via Digital Simulation and Reducing the Leakage by Inserting Delay Cells.
SECURWARE
(2010)
Pekka Pietikäinen
,
Kati Karjalainen
,
Juha Röning
,
Juhani Eronen
Socio-technical Security Assessment of a VoIP System.
SECURWARE
(2010)
Xavier Titi
,
Jean-Marc Seigneur
Verifying Hotspot Quality User Rating with Certified QoS Evidence.
SECURWARE
(2010)
Jaziar Radianti
A Study of a Social Behavior inside the Online Black Markets.
SECURWARE
(2010)
Anders Fongen
Identity Management without Revocation.
SECURWARE
(2010)
Alireza Shahrestani
,
Maryam Feily
,
Rodina Binti Ahmad
,
Sureswaran Ramadass
Discovery of Invariant Bot Behavior through Visual Network Monitoring System.
SECURWARE
(2010)
Ali Ahmed
,
Ning Zhang
An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation.
SECURWARE
(2010)
2009
Gh. Rasool Begh
,
Ajaz Hussain Mir
Quantification of the Effect of Security on Performance in Wireless LANs.
SECURWARE
(2009)
Gábor György Gulyás
,
Róbert Schulcz
,
Sándor Imre
Modeling Role-Based Privacy in Social Networking Services.
SECURWARE
(2009)
Reijo Savola
,
Habtamu Abie
Identification of Basic Measurable Security Components for a Distributed Messaging System.
SECURWARE
(2009)
Antonietta Stango
,
Neeli R. Prasad
,
Dimitris M. Kyriazanos
A Threat Analysis Methodology for Security Evaluation and Enhancement Planning.
SECURWARE
(2009)