![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
WorldCIS 2014: London, United Kingdom
- 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014. IEEE 2014, ISBN 978-1-908320-42-1
Session 1: Information Security
- Francesco Buccafurri
, Gianluca Lax
, Serena Nicolazzo
, Antonino Nocera
:
Fortifying TripAdvisor against reputation-system attacks. 20-21 - Bhawani Shanker Bhati, Pallapa Venkataram:
Data privacy preserving scheme in MANETs. 22-23 - Tamir Tsegaye
, Stephen Flowerday
:
Controls for protecting critical information infrastructure from cyberattacks. 24-29 - Hiroyuki Yoshimura:
Fingerprint templates generated by the fractional fourier, cosine and sine transforms and their generation conditions. 30-34
Session 2: Information Security
- Liezel Cilliers, Stephen Flowerday
:
Information security in a public safety, participatory crowdsourcing smart city project. 36-41 - Natasa Suteva, Aleksandra Mileva
, Mario Loleski:
Computer forensic analisys of some web attacks. 42-47 - Dalal Al-Azizy, David E. Millard, Nigel Shadbolt, Kieron O'Hara:
Deanonymisation in Linked Data: A research roadmap. 48-52 - Zeyad S. Aaber, Richard M. Crowder, Nawfal F. Fadhel
, Gary B. Wills:
Preventing document leakage through active document. 53-58
Session 3: Internet Applications and Cyber Security
- Nihar Vuppalapati, Joon S. Park:
Online Behavioral Advertising (OBA) with privacy protection. 60-65 - Akinola Ajijola, Pavol Zavarsky, Ron Ruhl:
A review and comparative evaluation of forensics guidelines of NIST SP 800-101 Rev.1: 2014 and ISO/IEC 27037: 2012. 66-73 - Samuel Laurén, Petteri Mäki, Sampsa Rauti, Shohreh Hosseinzadeh, Sami Hyrynsalmi
, Ville Leppänen
:
Symbol diversification of linux binaries. 74-79 - Roxanne Piderit, Stephen Flowerday
:
The risk relationship between trust and information sharing in automotive supply chains. 80-85
Session 4: Information and Network Security
- Pryde N. Sema, Pavol Zavarsky, Ron Ruhl:
A critical review of attack scenarios on the IAEA Technical Guidance NSS 17 Computer Security at Nuclear Facilities. 87-90 - Nawfal F. Fadhel
, Richard M. Crowder, Fatimah Y. Akeel, Gary B. Wills:
Component for 3D printing provenance framework: Security properties components for provenance framework. 91-96 - Omer Ozulku, Nawfal F. Fadhel
, David Argles, Gary B. Wills
:
Anomaly detection system: Towards a framework for enterprise log management of security services. 97-102
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.