![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
7th SIN 2014: Glasgow, Scotland, UK
- Ron Poet, Muttukrishnan Rajarajan:
Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014. ACM 2014, ISBN 978-1-4503-3033-6
Keynote Talk
- Atilla Elçi:
Isn't the Time Ripe for a Standard Ontology on Security of Information and Networks? 1
Assurance and Trust
- Brian A. Soeder, K. Suzanne Barber:
Trustworthiness of Identity Attributes. 4 - Md. Sadek Ferdous
, Gethin Norman
, Ron Poet:
Mathematical Modelling of Identity, Identity Management and Other Related Topics. 9 - Christoph Hochreiner
, Markus Huber, Georg Merzdovnik
, Edgar R. Weippl:
Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices. 17 - Sebastian Abt, Sebastian Gärtner, Harald Baier:
A Small Data Approach to Identification of Individuals on the Transport Layer using Statistical Behaviour Templates. 25 - Neila Rjaibi, Latifa Ben Arfa Rabai
:
Deploying Suitable Countermeasures to Solve the Security Problems within an E-learning Environment. 33 - Amardeep Singh, Divya Bansal, Sanjeev Sofat:
An Approach of Privacy Preserving based Publishing in Twitter. 39 - Artem Garkusha, Evgeny Sergeevich Abramov, Oleg B. Makarevich
:
An effectiveness of application of <<Capture The Flag>> competitions concept within higher education (Student contribution). 43 - Ahmad Kamal Ramli
, Karim Djemame
:
Autonomic management for convergent networks to support robustness of appliance technologies. 47 - Anatoly Malyuk, Natalia G. Miloslavskaya
:
Information Security Theory Development. 52 - Mehrdad Sepehri Sharbaf:
A New Perspective to Information Security: Total Quality Information Security Management. 56 - Hervé Cholez, Christophe Feltus
:
Towards an Innovative Systemic Approach of Risk Management. 61 - Chalee Vorakulpipat, Chantri Polprasert, Siwaruk Siwamogsatham:
Managing Mobile Device Security in Critical Infrastructure Sectors. 65 - Greig Paul, James Irvine
:
A Protocol For Storage Limitations and Upgrades in Decentralised Networks. 69 - Yogachandran Rahulamathavan, Pramod S. Pawar, Pete Burnap
, Muttukrishnan Rajarajan, Omer F. Rana
, George Spanoudakis:
Analysing Security requirements in Cloud-based Service Level Agreements. 73 - Bob Duncan
, Mark Whittington:
Compliance with standards, assurance and audit: does this equal security? 77 - Nicolas Mayer
, Jocelyn Aubert
:
Sector-Specific Tool for Information Security Risk Management in the Context of Telecommunications Regulation (Tool demo). 85 - Natalia G. Miloslavskaya
, Mikhail Senatorov, Alexander I. Tolstoy
, Sergey Zapechnikov
:
Big Data Information Security Maintenance. 89 - Fawad Khan
, Sarmad Ullah Khan, Muhammad Roman, Muhammad Usman Abbasi:
Location Identity Based Content Security Scheme for Content Centric Networking. 95 - Ivan Gudymenko:
A Privacy-Preserving E-Ticketing System for Public Transportation Supporting Fine-Granular Billing and Local Validation. 101 - Christophe Feltus
, Damien Nicolas, Claude Poupart:
Towards a HL7 based Metamodeling Integration Approach for Embracing the Privacy of Healthcare Patient Records Administration. 109 - Greig Paul, James Irvine
:
Privacy Implications of Wearable Health Devices. 117 - Edward Caprin, Yan Zhang:
Negotiation Based Framework for Attribute-Based Access Control Policy Evaluation. 122
Cryptographic Techniques
- Mohammad A. AlAhmad, Imad Fakhri Alshaikhli:
Design and Analysis of a New Hash Function Gear. 128 - Giovanni Agosta
, Alessandro Barenghi
, Gerardo Pelosi
, Michele Scandale:
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis. 137 - Cihangir Tezcan
, Halil Kemal Taskin, Murat Demircioglu:
Improbable Differential Attacks on Serpent using Undisturbed Bits. 145 - Sufyan Salim Mahmood AlDabbagh, Imad Fakhri Taha Al Shaikhli, Mohammad A. AlAhmad:
HISEC: A New Lightweight Block Cipher Algorithm. 151 - Alina Trepacheva, Liudmila Babenko
:
Known Plaintexts Attack on Polynomial based Homomorphic Encryption. 157 - Maryam Farajzadeh-Zanjani, Seyed Masoud Alavi Abhari
, Alexander G. Chefranov
:
Group Key Exchange Protocol Based on Diffie-Hellman Technique in Ad-Hoc Network. 166 - Alwyn Goh, Geong Sen Poh, Voon-Yee Vee, Kok Boon Chong, Xin Zhe Khooi
, Chanan Zhuo Ern Loh, Zhi Yuan Eng:
Human Visualisation of Cryptographic Code Using Progressive Multi-Scale Resolution. 170 - Sergey Agafin, Anton Krasnopevtsev:
Memory access time as entropy source for RNG. 176 - Valeriy O. Osipyan:
Mathematical model of the polyalphabetic information security system based on the normal generalized knapsack. 180 - Philipp Burtyka, Oleg B. Makarevich
:
Symmetric Fully Homomorphic Encryption Using Decidable Matrix Equations. 186 - Ecem Ünal, Erkay Savas:
Bandwidth-Optimized Parallel Private Information Retrieval. 197 - Alina Trepacheva:
Cryptanalysis of Polynomial based Homomorphic Encryption. 205 - Vikas Jaiman, Gaurav Somani:
An Order Preserving Encryption Scheme for Cloud Computing. 211
Human Factors and Biometrics
- Shivam Aggarwal, Vishal Kumar
, S. D. Sudarsan:
Identification and Detection of Phishing Emails Using Natural Language Processing Techniques. 217 - Abdulaziz Almehmadi, Khalil El-Khatib:
On the Possibility of Insider Threat Detection Using Physiological Signal Monitoring. 223 - Soumik Mondal
, Patrick Bours:
Continuous Authentication using Fuzzy Logic. 231 - Kiran B. Raja, Ramachandra Raghavendra
, Christoph Busch, Soumik Mondal
:
An Empirical Study of Smartphone Based Iris Recognition in Visible Spectrum. 239 - Monika Singh
, Divya Bansal, Sanjeev Sofat:
Detecting Malicious Users in Twitter using Classifiers. 247 - Muhammad Adnan, Antonio Lima, Luca Rossi
, Suresh Veluru, Paul A. Longley, Mirco Musolesi
, Muttukrishnan Rajarajan:
The Uncertainty of Identity Toolset: Analysing Digital Traces for User Profiling. 254 - Maria Evangelopoulou, Christopher W. Johnson:
Implementation of Safety Techniques in a Cyber Domain. 261 - Soumyadeb Chowdhury
, Ron Poet, Lewis Mackenzie:
Exploring the Guessability of Image Passwords. 264 - Hani Moaiteq Aljahdali, Ron Poet:
Educated Guessing Attacks on Culturally Familiar Graphical Passwords Using Personal Information on Social Networks. 272 - Hani Moaiteq Aljahdali, Ron Poet:
Users' Perceptions of Recognition-Based Graphical Passwords: A Qualitative Study on Culturally Familiar Graphical Passwords. 279 - Parth Bhatt, Johny de Souza, Nelson Uto, Jefferson Capovilla, Jose Resende, Danilo Suiama:
Implementation Aspects of MeterGoat, a Smart Meter Security Training Platform. 284
Networks and Defence
- Ahmed Saeed
, Ali Ahmadinia, Mike Just
, Christophe Bobda:
An ID and Address Protection Unit for NoC based Communication Architectures. 288 - Xavier J. A. Bellekens
, Christos Tachtatzis
, Robert C. Atkinson
, Craig Renfrew, Tony Kirkham:
GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing. 295 - Xavier J. A. Bellekens
, Christos Tachtatzis
, Robert C. Atkinson
, Craig Renfrew, Tony Kirkham:
A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated Intrusion Detection Systems. 302 - Ecir U. Küçüksille
, Mehmet Ali Yalçinkaya, Ozan Uçar:
Physical Dangers in the Cyber Security and Precautions to be Taken. 310 - Naghmeh Moradpoor Sheykhkanloo
:
Employing Neural Networks for the Detection of SQL Injection Attack. 318 - Peter Pisarcík, Pavol Sokol
:
Framework for distributed virtual honeynets. 324 - Emmanouil Vasilomanolakis
, Shankar Karuppayah
, Max Mühlhäuser, Mathias Fischer:
HosTaGe: a Mobile Honeypot for Collaborative Defense. 330 - Mohammad Puttaroo, Peter Komisarczuk, Renato Cordeiro de Amorim:
Challenges in developing Capture-HPC exclusion lists. 334 - Ludmila K. Babenko
, Oleg B. Makarevich
, Dmitry Bespalov
, Roman Chesnokov, Yaroslav Trubnikov:
Instrumental System for Analysis of Information Systems Using Smart Cards Protection. 339 - Tobias F. Pfeffer, Paula Herber, Jörg Schneider:
Reverse Engineering of ARM Binaries Using Formal Transformations. 345 - Rahul Kumar, Indraveni K, Aakash Kumar Goel:
Automated Session Fixation Vulnerability Detection in Web Applications using the Set-Cookie HTTP response header in cookies. 351 - Bernd Conrad, Fatemeh Shirazi:
Analyzing the Effectiveness of DoS Attacks on Tor. 355 - Hossain Shahriar
, Hisham M. Haddad:
Content Provider Leakage Vulnerability Detection in Android Applications. 359 - Avani Sharma
, Rajbir Kaur:
Non-cryptographic Detection Approach and Countermeasure for JFDV Attack. 367 - Jikku Kuriakose, Vinod P.:
Towards the Detection of Undetectable Metamorphic Malware. 373 - Ashok Singh Sairam
, Rahul Kumar, Pratima Biswas:
Implementation of an Adaptive Traffic-aware Firewall. 385 - Ibrahim Lahmer, Ning Zhang:
MapReduce: MR Model Abstraction for Future Security Study. 392 - Hifaa Bait Baraka, Huaglory Tianfield
:
Intrusion Detection System for Cloud Environment. 399 - Thu Yein Win, Huaglory Tianfield
, Quentin Mair, Taimur Al Said, Omer F. Rana
:
Virtual Machine Introspection. 405 - Shahid Alam
, Issa Traoré, Ibrahim Sogukpinar
:
Current Trends and the Future of Metamorphic Malware Detection. 411 - Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
Integrated Framework for Classification of Malwares. 417 - Komminist Weldemariam, Hossain Shahriar
, Vamshee Krishna Devendran:
Dynamic Analysis of Web Objects. 423 - Ashish Saini, Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
Classification of PE Files using Static Analysis. 429 - Peter Aufner, Georg Merzdovnik
, Markus Huber, Edgar R. Weippl:
Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations. 434 - Nishant Garg, Kuldeep Pareek, Manoj Singh Gaur, Vijay Laxmi
, Chhagan Lal
:
Analysis of Identity Forging Attack in MANETs. 441 - Niaz Morshed Chowdhury, Lewis M. Mackenzie:
Development of a Threat Model for Vehicular Ad-hoc Network based Accident Warning Systems. 447 - Giovanni Bottazzi, Gianluigi Me
:
The Botnet Revenue Model. 459 - Marco Tiloca:
Efficient Protection of Response Messages in DTLS-Based Secure Multicast Communication. 466 - Shahid Alam
, Ibrahim Sogukpinar
, Issa Traoré, Yvonne Coady:
In-Cloud Malware Analysis and Detection: State of the Art. 473 - Tatiana V. Stepanova, Dmitry P. Zegzhda:
Applying Large-scale Adaptive Graphs to Modeling Internet of Things Security. 479
Posters
- Paraskevas Sarris, Lewis Mackenzie, Soumyadeb Chowdhury:
A Novel Authentication Scheme for Online Transactions. 483 - Ali Reza Honarvar, Ashkan Sami
:
CBR Clone Based Software Flaw Detection Issues. 487 - Hui Lin, Adam J. Slagell, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster). 492 - Dusan Klinec, Vashek Matyás:
Traversing symmetric NAT with predictable port allocation. 543
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.