Login / Signup
CyberSec
2012
2015
2012
2015
Keyphrases
Publications
2015
Chyquitha Danuputri
,
Teddy Mantoro
,
Mardi Hardjianto
Data Security Using LSB Steganography and Vigenere Chiper in an Android Environment.
CyberSec
(2015)
Muhammad Hilmi Kamarudin
,
Carsten Maple
,
Tim Watson
,
Hasliza Sofian
Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R Attacks.
CyberSec
(2015)
Ryohei Koizumi
,
Ryôichi Sasaki
Study on Countermeasures Using Mitigation Software against Vulnerability Attacks.
CyberSec
(2015)
P. D. Persadha
,
A. A. Waskita
,
S. Yazid
Comparative Study of Cyber Security Policies among Malaysia, Australia, Indonesia: A Responsibility Perspective.
CyberSec
(2015)
Nabil Laoufi
From Risk Analysis to the Expression of Security Requirements for Systems Information.
CyberSec
(2015)
Normaziah Abdul Aziz
,
Fakhrulrazi Mokhti
,
M. Nadhar M. Nozri
Mobile Device Forensics: Extracting and Analysing Data from an Android-Based Smartphone.
CyberSec
(2015)
Sriram Raghavan
,
S. V. Raghavan
Estimating Posterior Probabilities to Identify Breach Points during Cyber-attacks.
CyberSec
(2015)
Teddy Mantoro
,
M. Iman Wahyudi
,
Media A. Ayu
,
Wendi Usino
Real-Time Printed Document Authentication Using Watermarked QR Code.
CyberSec
(2015)
Dwiki Jatikusumo
,
Hanny Hikmayanti H.
,
Feriadi
,
Wendi Usino
Securing Official Account Twitter Using Social Media Management System: Accuracy of the Data and Information Publish with Twitter.
CyberSec
(2015)
Delwar Alam
,
Md. Alamgir Kabir
,
Touhid Bhuiyan
,
Tanjila Farah
A Case Study of SQL Injection Vulnerabilities Assessment of .bd Domain Web Applications.
CyberSec
(2015)
Kazuki Hashimoto
,
Hiroyuki Hiruma
,
Takashi Matsumoto
,
Kosetus Kayama
,
Yoshio Kaikizaki
,
Hiroshi Yamaki
,
Tetsutaro Uehara
,
Ryôichi Sasaki
Development of Intellectual Network Forensic System LIFT against Targeted Attacks.
CyberSec
(2015)
Hyoseok Yoon
,
Se-Ho Park
,
Kyung-Taek Lee
Exploiting Ambient Light Sensor for Authentication on Wearable Devices.
CyberSec
(2015)
Ahmad Budi Setiawan
,
Aries Syamsudin
,
Ashwin Sasongko
Implementation of Secure Smart Grid as Critical Information Infrastructure in Indonesia: A Case Study in Smart Grid Electricity.
CyberSec
(2015)
Ahmad Luthfi
,
Yudi Prayudi
Process Model of Digital Forensics Readiness Scheme (DFRS) as a Recommendation of Digital Evidence Preservation.
CyberSec
(2015)
Ali Tamimi
,
D. Subbaram Naidu
,
Sanaz Kavianpour
An Intrusion Detection System Based on NSGA-II Algorithm.
CyberSec
(2015)
Mikhail Styugin
Analysis of Awareness Structures in Information Security Systems.
CyberSec
(2015)
Makoto Sato
,
Akihiko Sugimoto
,
Naoki Hayashi
,
Yoshiaki Isobe
,
Ryôichi Sasaki
Proposal of a Method for Identifying the Infection Route for Targeted Attacks Based on Malware Behavior in a Network.
CyberSec
(2015)
Victor Wahanggara
,
Yudi Prayudi
Malware Detection through Call System on Android Smartphone Using Vector Machine Method.
CyberSec
(2015)
Abdullah Said Alkalbani
,
Teddy Mantoro
,
Sardjoeni Moedjiono
,
Media A. Ayu
Hybrid Solution for Secured and Energy Aware Routing Path in Wireless Sensor Networks.
CyberSec
(2015)
Manh Cong Tran
,
Yasuhiro Nakamura
An Approach to Mine Suspicious Domain Based on HTTP Automated Software Communication Behavior.
CyberSec
(2015)
Naoto Nakagawa
,
Yoshimi Teshigawara
,
Ryôichi Sasaki
Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation.
CyberSec
(2015)
Herny Ramadhani Mohd Husny Hamid
,
Megat Ahmad Izzat bin Megat Ahmad Kamil
,
Norhaiza Ya Abdullah
Portable Toolkit for Penetration Testing and Firewall Configuration.
CyberSec
(2015)
Norhaiza Ya Abdullah
,
Herny Ramadhani Mohd Husny Hamid
Folder Lock by Using Multimodal Biometric: Fingerprint and Signature Authentication.
CyberSec
(2015)
Herny Ramadhani Mohd Husny Hamid
,
Norhaiza Ya Abdullah
Physical Authentication Using Random Number Generated (RNG) Keypad Based on One Time Pad (OTP) Concept.
CyberSec
(2015)
Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015
CyberSec
(2015)
Mohammad Imran
,
Muhammad Tanvir Afzal
,
Muhammad Abdul Qadir
Similarity-Based Malware Classification Using Hidden Markov Model.
CyberSec
(2015)
Mohammad Ahmad Abu Allawi
,
Ali Hadi
,
Arafat Awajan
MLDED: Multi-layer Data Exfiltration Detection System.
CyberSec
(2015)
Takumi Akiyama
,
Kazuya Otani
,
Yoshio Kakizaki
,
Ryôichi Sasaki
Evaluation of a Risk-Based Management Method for Online Accounts.
CyberSec
(2015)
2014
Mohd Najwadi Yusoff
,
Ramlan Mahmod
,
Mohd Taufik Abdullah
,
Ali Dehghantanha
Mobile forensic data acquisition in Firefox OS.
CyberSec
(2014)
Victor R. Kebande
,
Hein S. Venter
A cognitive approach for botnet detection using Artificial Immune System in the cloud.
CyberSec
(2014)
M. Kaddour
,
Nourdine Ait Tmazirte
,
Maan El Badaoui El Najjar
,
Z. Naja
,
Nazih Moubayed
Autonomous integrity monitoring for GNSS localization using informational approach and iono-free measurements.
CyberSec
(2014)
Emsaieb Geepalla
Comparison between Alloy and Timed Automata for modelling and analysing of access control specifications.
CyberSec
(2014)
Zakaria Zakaria Hassan
,
Talaat A. Elgarf
,
Abdelhalim Zekry
Modifying authentication techniques in mobile communication systems.
CyberSec
(2014)
Mohd Najwadi Yusoff
,
Ramlan Mahmod
,
Ali Dehghantanha
,
Mohd Taufik Abdullah
An approach for forensic investigation in Firefox OS.
CyberSec
(2014)
Eric Holm
,
Geraldine Mackenzie
The importance of mandatory data breach notification to identity crime.
CyberSec
(2014)
Murdoch Watney
Challenges pertaining to cyber war under international law.
CyberSec
(2014)
Omer K. Jasim Mohammad
,
Safia Abbas
,
El-Sayed M. El-Horbaty
,
Abdel-Badeeh M. Salem
Statistical analysis for random bits generation on quantum key distribution.
CyberSec
(2014)
Heshem A. El Zouka
,
Mustafa M. Hosni
On the power of quantum cryptography and computers.
CyberSec
(2014)
Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014
CyberSec
(2014)
Neila Rjaibi
,
Nawel Gannouni
,
Latifa Ben Arfa Rabai
,
Anis Ben Aissa
Modeling the propagation of security threats: An e-learning case study.
CyberSec
(2014)
Iman Ahmeid Mohamed
,
Azizah Bt Abdul Manaf
An enhancement of traceability model based-on scenario for digital forensic investigation process.
CyberSec
(2014)
2012
Ramya Dharam
,
Sajjan G. Shiva
Runtime monitors for tautology based SQL injection attacks.
CyberSec
(2012)
Sina Manavi
,
Sadra Mohammadalian
,
Nur Izura Udzir
,
Azizol Abdullah
Hierarchical secure virtualization model for cloud.
CyberSec
(2012)
K. SuganyaDevi
,
N. Malmurugan
,
R. Sivakumar
OF-SMED: An optimal foreground detection method in surveillance system for traffic monitoring.
CyberSec
(2012)
Maryam Savari
,
Mohammad Montazerolzohour
,
Eng-Thiam Yeoh
Combining encryption methods in multipurpose smart card.
CyberSec
(2012)
Salasiah Sulaiman
,
Zaiton Muda
,
Julia Juremi
The new approach of Rijndael key schedule.
CyberSec
(2012)
Ghassan Samara
,
Wafaa A. H. Ali Alsalihy
A new security mechanism for vehicular communication networks.
CyberSec
(2012)
Davoud Mougouei
,
Wan Nurhayati Wan Ab. Rahman
,
Mohammad Moein Almasi
Evaluating fault tolerance in security requirements of web services.
CyberSec
(2012)
Liam Smit
,
Adrie Stander
,
Jacques Ophoff
Investigating the accuracy of base station information for estimating cellphone location.
CyberSec
(2012)
Kee-Won Kim
,
Jun-Cheol Jeon
Cellular semi-systolic Montgomery Multiplier on finite fields.
CyberSec
(2012)