:facetid:toc:\"db/conf/nss/nss2009.bht\"OK:facetid:toc:db/conf/nss/nss2009.bhtJemal H. AbawajyEnhancing RFID Tag Resistance against Cloning Attack.NSS18-232009Conference and Workshop Papersclosedconf/nss/Abawajy0910.1109/NSS.2009.101https://doi.org/10.1109/NSS.2009.101https://dblp.org/rec/conf/nss/Abawajy09URL#5191454Tohari AhmadJiankun HuSong Han 0006An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography.NSS474-4792009Conference and Workshop Papersclosedconf/nss/AhmadHH0910.1109/NSS.2009.57https://doi.org/10.1109/NSS.2009.57https://dblp.org/rec/conf/nss/AhmadHH09URL#5191455Ahmed Al-NazerAdnan Abdul-Aziz GutubExploit Kashida Adding to Arabic e-Text for High Capacity Steganography.NSS447-4512009Conference and Workshop Papersclosedconf/nss/Al-NazerG0910.1109/NSS.2009.21https://doi.org/10.1109/NSS.2009.21https://dblp.org/rec/conf/nss/Al-NazerG09URL#5191456Sumayah Al-RwaisJalal Al-MuhtadiA Context-Aware Access Control Model for Pervasive Environments.NSS425-4302009Conference and Workshop Papersclosedconf/nss/Al-RwaisA0910.1109/NSS.2009.66https://doi.org/10.1109/NSS.2009.66https://dblp.org/rec/conf/nss/Al-RwaisA09URL#5191457Andre L. AlexanderAlexander L. WijesinhaRamesh K. KarneAn Evaluation of Secure Real-Time Transport Protocol (SRTP) Performance for VoIP.NSS95-1012009Conference and Workshop Papersclosedconf/nss/AlexanderWK0910.1109/NSS.2009.90https://doi.org/10.1109/NSS.2009.90https://dblp.org/rec/conf/nss/AlexanderWK09URL#5191458Mansour M. AlsulaimanAasem N. AlyahyaRaed A. AlkharboushNasser S. AlghafisIntrusion Detection System Using Self-Organizing Maps.NSS397-4022009Conference and Workshop Papersclosedconf/nss/AlsulaimanAAA0910.1109/NSS.2009.62https://doi.org/10.1109/NSS.2009.62https://dblp.org/rec/conf/nss/AlsulaimanAAA09URL#5191459Spyros AntonatosQuang Hieu VuHarnessing the Power of P2P Systems for Fast Attack Signature Validation.NSS107-1142009Conference and Workshop Papersclosedconf/nss/AntonatosV0910.1109/NSS.2009.64https://doi.org/10.1109/NSS.2009.64https://dblp.org/rec/conf/nss/AntonatosV09URL#5191460Ahmed BelkhiratAbdelghani BourasAbdelkader BelkhirA New Similarity Measure for the Anomaly Intrusion Detection.NSS431-4362009Conference and Workshop Papersclosedconf/nss/BelkhiratBB0910.1109/NSS.2009.20https://doi.org/10.1109/NSS.2009.20https://dblp.org/rec/conf/nss/BelkhiratBB09URL#5191461Fernando Bernal-HidalgoManuel SánchezGabriel López 0001Antonio Fernandez Gómez-SkarmetaÓscar Cánovas ReverteTrusted Network Access Control in the Eduroam Federation.NSS170-1752009Conference and Workshop Papersclosedconf/nss/Bernal-HidalgoSLGR0910.1109/NSS.2009.47https://doi.org/10.1109/NSS.2009.47https://dblp.org/rec/conf/nss/Bernal-HidalgoSLGR09URL#5191462James CannadyDistributed Detection of Attacks in Mobile Ad Hoc Networks Using Learning Vector Quantization.NSS571-5742009Conference and Workshop Papersclosedconf/nss/Cannady0910.1109/NSS.2009.99https://doi.org/10.1109/NSS.2009.99https://dblp.org/rec/conf/nss/Cannady09URL#5191463Kit Yan ChanSiow Yong LowSven NordholmKa Fai Cedric YiuSai-Ho LingSpeech Recognition Enhancement Using Beamforming and a Genetic Algorithm.NSS510-5152009Conference and Workshop Papersclosedconf/nss/ChanLNYL0910.1109/NSS.2009.44https://doi.org/10.1109/NSS.2009.44https://dblp.org/rec/conf/nss/ChanLNYL09URL#5191464Rong-Jian ChenYu-Cheng PengJui-Lin LaiShi-Jinn HorngArchitecture Design of High Efficient and Non-memory AES Crypto Core for WPAN.NSS36-432009Conference and Workshop Papersclosedconf/nss/ChenPLH0910.1109/NSS.2009.54https://doi.org/10.1109/NSS.2009.54https://dblp.org/rec/conf/nss/ChenPLH09URL#5191465Wei ChenLi ZhuXiaomei CaoYang GengA Novel Fuzzy Identity-Based Signature with Dynamic Threshold.NSS192-1982009Conference and Workshop Papersclosedconf/nss/ChenZCG0910.1109/NSS.2009.40https://doi.org/10.1109/NSS.2009.40https://dblp.org/rec/conf/nss/ChenZCG09URL#5191466W. Y. ChinEvangelos P. MarkatosSpyros AntonatosSotiris IoannidisHoneyLab: Large-Scale Honeypot Deployment and Resource Sharing.NSS381-3882009Conference and Workshop Papersclosedconf/nss/ChinMAI0910.1109/NSS.2009.65https://doi.org/10.1109/NSS.2009.65https://dblp.org/rec/conf/nss/ChinMAI09URL#5191467Yong Jian ChinThian Song OngMichael Goh Kah OngBee Yan HiewIntegrating Palmprint and Fingerprint for Identity Verification.NSS437-4422009Conference and Workshop Papersclosedconf/nss/ChinOGH0910.1109/NSS.2009.25https://doi.org/10.1109/NSS.2009.25https://dblp.org/rec/conf/nss/ChinOGH09URL#5191468John Clark 0002Sylvain P. LeblancScott KnightHardware Trojan Horse Device Based on Unintended USB Channels.NSS1-82009Conference and Workshop Papersclosedconf/nss/ClarkLK0910.1109/NSS.2009.48https://doi.org/10.1109/NSS.2009.48https://dblp.org/rec/conf/nss/ClarkLK09URL#5191469Xiong DengMoustafa GhanemYike GuoReal-Time Data Mining Methodology and a Supporting Framework.NSS522-5272009Conference and Workshop Papersclosedconf/nss/DengGG0910.1109/NSS.2009.49https://doi.org/10.1109/NSS.2009.49https://dblp.org/rec/conf/nss/DengGG09URL#5191470Roland DoddAndrew ChiouXinghuo Yu 0001Ross BroadfootIndustrial Process Model Integration Using a Blackboard Model within a Pan Stage Decision Support System.NSS489-4942009Conference and Workshop Papersclosedconf/nss/DoddCYB0910.1109/NSS.2009.73https://doi.org/10.1109/NSS.2009.73https://dblp.org/rec/conf/nss/DoddCYB09URL#5191471Roland DoddAndrew ChiouXinghuo Yu 0001Ross BroadfootFunctional Characteristics and Proposed Deployment Infrastructure of an Industrial Decision Support System within a Sugar Mill Crystallisation Stage.NSS495-5002009Conference and Workshop Papersclosedconf/nss/DoddCYB09a10.1109/NSS.2009.74https://doi.org/10.1109/NSS.2009.74https://dblp.org/rec/conf/nss/DoddCYB09aURL#5191472Mohamed A. El-KadyEssam A. Al-AmmarFramework for Identification of Power System Operating Security Regions.NSS415-4192009Conference and Workshop Papersclosedconf/nss/El-KadyA0910.1109/NSS.2009.16https://doi.org/10.1109/NSS.2009.16https://dblp.org/rec/conf/nss/El-KadyA09URL#5191473Fábio FabrisLeticia Rosetti MargotoFlávio Miguel VarejãoNovel Approaches for Detecting Frauds in Energy Consumption.NSS546-5512009Conference and Workshop Papersclosedconf/nss/FabrisMV0910.1109/NSS.2009.17https://doi.org/10.1109/NSS.2009.17https://dblp.org/rec/conf/nss/FabrisMV09URL#5191474Olivier FlauzacFlorent NolotCyril RabatLuiz Angelo SteffenelGrid of Security: A New Approach of the Network Security.NSS67-722009Conference and Workshop Papersclosedconf/nss/FlauzacNRS0910.1109/NSS.2009.53https://doi.org/10.1109/NSS.2009.53https://dblp.org/rec/conf/nss/FlauzacNRS09URL#5191475Dimitris GeneiatakisCostas LambrinoudakisStefanos GritzalisA Hierarchical Model for Cross-Domain Communication of Health Care Units.NSS123-1292009Conference and Workshop Papersclosedconf/nss/GeneiatakisLG0910.1109/NSS.2009.84https://doi.org/10.1109/NSS.2009.84https://dblp.org/rec/conf/nss/GeneiatakisLG09URL#5191476Hua GuoXiyong ZhangYi Mu 0001Zhoujun Li 0001An Efficient Certificateless Encryption Scheme in the Standard Model.NSS302-3092009Conference and Workshop Papersclosedconf/nss/GuoZML0910.1109/NSS.2009.31https://doi.org/10.1109/NSS.2009.31https://dblp.org/rec/conf/nss/GuoZML09URL#5191477Omessaad HamdiAmmar BouallegueSami HarariWeakness on Cryptographic Schemes Based on Chained Codes.NSS579-5812009Conference and Workshop Papersclosedconf/nss/HamdiBH0910.1109/NSS.2009.22https://doi.org/10.1109/NSS.2009.22https://dblp.org/rec/conf/nss/HamdiBH09URL#5191478Sami HarariFSS2-Id/A Fast Safe Identity-Based Multi Signature Scheme.NSS316-3202009Conference and Workshop Papersclosedconf/nss/Harari0910.1109/NSS.2009.102https://doi.org/10.1109/NSS.2009.102https://dblp.org/rec/conf/nss/Harari09URL#5191479Matús HarvanAlexander PretschnerState-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition.NSS373-3802009Conference and Workshop Papersclosedconf/nss/HarvanP0910.1109/NSS.2009.51https://doi.org/10.1109/NSS.2009.51https://dblp.org/rec/conf/nss/HarvanP09URL#5191480Thaier HayajnehPrashant KrishnamurthyDavid TipperDeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks.NSS73-802009Conference and Workshop Papersclosedconf/nss/HayajnehKT0910.1109/NSS.2009.85https://doi.org/10.1109/NSS.2009.85https://dblp.org/rec/conf/nss/HayajnehKT09URL#5191481Markus HinkelmannAndreas JakobyNina MoebiusTiark RompfPeer StechertA Cryptographically t-Private Auction System.NSS44-512009Conference and Workshop Papersclosedconf/nss/HinkelmannJMRS0910.1109/NSS.2009.41https://doi.org/10.1109/NSS.2009.41https://dblp.org/rec/conf/nss/HinkelmannJMRS09URL#5191482Jinwei HuRuixuan Li 0001Zhengding LuOn Role Mappings for RBAC-Based Secure Interoperation.NSS270-2772009Conference and Workshop Papersclosedconf/nss/HuLL0910.1109/NSS.2009.76https://doi.org/10.1109/NSS.2009.76https://dblp.org/rec/conf/nss/HuLL09URL#5191483Leslie HuinDanielle BoulangerEric DissonACSIS: Agents for Cooperative Secured Information Systems.NSS176-1832009Conference and Workshop Papersclosedconf/nss/HuinBD0910.1109/NSS.2009.63https://doi.org/10.1109/NSS.2009.63https://dblp.org/rec/conf/nss/HuinBD09URL#5191484Khalid IqbalSohail AsgharGenerating Hierarchical Association Rules with the Use of Bayesian Network.NSS528-5332009Conference and Workshop Papersclosedconf/nss/IqbalA0910.1109/NSS.2009.43https://doi.org/10.1109/NSS.2009.43https://dblp.org/rec/conf/nss/IqbalA09URL#5191485Miho ItohContextual Analysis Methods Capturing Knowledge Representation Related to the Reputation.NSS552-5592009Conference and Workshop Papersclosedconf/nss/Itoh0910.1109/NSS.2009.36https://doi.org/10.1109/NSS.2009.36https://dblp.org/rec/conf/nss/Itoh09URL#5191486Ananda JeevaWilliam W. GuoDetermining Supply Chain Flexibility Using Statistics and Nueral Networks: A Comparative Study.NSS506-5092009Conference and Workshop Papersclosedconf/nss/JeevaG0910.1109/NSS.2009.87https://doi.org/10.1109/NSS.2009.87https://dblp.org/rec/conf/nss/JeevaG09URL#5191487Farah Barika KtataNabil El-KadhiKhaled GhédiraDistributed Agent Architecture for Intrusion Detection Based on New Metrics.NSS321-3272009Conference and Workshop Papersclosedconf/nss/KatataEG0910.1109/NSS.2009.50https://doi.org/10.1109/NSS.2009.50https://dblp.org/rec/conf/nss/KatataEG09URL#5191488Muhammad Khurram KhanEnhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'.NSS420-4242009Conference and Workshop Papersclosedconf/nss/Khan0910.1109/NSS.2009.100https://doi.org/10.1109/NSS.2009.100https://dblp.org/rec/conf/nss/Khan09URL#5191489Robert Koch 0002Changing Network Behavior.NSS60-662009Conference and Workshop Papersclosedconf/nss/Koch0910.1109/NSS.2009.55https://doi.org/10.1109/NSS.2009.55https://dblp.org/rec/conf/nss/Koch09URL#5191490Neila KricheneNoureddine BoudrigaSecuring Roaming and Vertical Handover in Fourth Generation Networks.NSS225-2312009Conference and Workshop Papersclosedconf/nss/KricheneB0910.1109/NSS.2009.14https://doi.org/10.1109/NSS.2009.14https://dblp.org/rec/conf/nss/KricheneB09URL#5191491Reginald LalAndrew ChiouSignificance of Computional Intelligence Method in Computer Networks.NSS468-4732009Conference and Workshop Papersclosedconf/nss/LalC0910.1109/NSS.2009.92https://doi.org/10.1109/NSS.2009.92https://dblp.org/rec/conf/nss/LalC09URL#5191492Wei Li 0013Dawu GuYong WangJuanru LiZhiqiang Liu 0001An Extension of Differential Fault Analysis on AES.NSS443-4462009Conference and Workshop Papersclosedconf/nss/LiGWLL0910.1109/NSS.2009.26https://doi.org/10.1109/NSS.2009.26https://dblp.org/rec/conf/nss/LiGWLL09URL#5191493Zhongwen LiXiaochen XuLiang ShiJian LiuChen LiangAuthentication in Peer-to-Peer Network: Survey and Research Directions.NSS115-1222009Conference and Workshop Papersclosedconf/nss/LiXSLL0910.1109/NSS.2009.30https://doi.org/10.1109/NSS.2009.30https://dblp.org/rec/conf/nss/LiXSLL09URL#5191494Lily D. LiXinghuo Yu 0001Xiaodong Li 0001William W. GuoA Modified PSO Algorithm for Constrained Multi-objective Optimization.NSS462-4672009Conference and Workshop Papersclosedconf/nss/LiYLG0910.1109/NSS.2009.72https://doi.org/10.1109/NSS.2009.72https://dblp.org/rec/conf/nss/LiYLG09URL#5191495Qin LiQingkai ZengA Security Calculus of Concurrent Objects for Verifying Ad Hoc Network Protocols.NSS232-2392009Conference and Workshop Papersclosedconf/nss/LiZ0910.1109/NSS.2009.12https://doi.org/10.1109/NSS.2009.12https://dblp.org/rec/conf/nss/LiZ09URL#5191496Ke LiWanlei Zhou 0001Ping Li 0019Jing HaiJianwen LiuDistinguishing DDoS Attacks from Flash Crowds Using Probability Metrics.NSS9-172009Conference and Workshop Papersclosedconf/nss/LiZLHL0910.1109/NSS.2009.35https://doi.org/10.1109/NSS.2009.35https://dblp.org/rec/conf/nss/LiZLHL09URL#5191497Sai-Ho LingHung T. Nguyen 0001Kit Yan ChanA New Particle Swarm Optimization Algorithm for Neural Network Optimization.NSS516-5212009Conference and Workshop Papersclosedconf/nss/LingNC0910.1109/NSS.2009.39https://doi.org/10.1109/NSS.2009.39https://dblp.org/rec/conf/nss/LingNC09URL#5191498Yining Liu 0002Keqiu LiYong Zhang 0030Wenyu QuA Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc Networks.NSS294-3012009Conference and Workshop Papersclosedconf/nss/LiuLZQ0910.1109/NSS.2009.68https://doi.org/10.1109/NSS.2009.68https://dblp.org/rec/conf/nss/LiuLZQ09URL#5191499Pedro Chávez LugoJuan Manuel Garcia GarciaJuan J. FloresA System for Distributed SELinux Policy Management.NSS254-2612009Conference and Workshop Papersclosedconf/nss/LugoGF0910.1109/NSS.2009.91https://doi.org/10.1109/NSS.2009.91https://dblp.org/rec/conf/nss/LugoGF09URL#5191500Mohd Fadzli MarhusinChris LokanHenry LarkinDavid CornforthA Data Mining Approach for Detection of Self-Propagating Worms.NSS24-292009Conference and Workshop Papersclosedconf/nss/MarhusinLLC0910.1109/NSS.2009.88https://doi.org/10.1109/NSS.2009.88https://dblp.org/rec/conf/nss/MarhusinLLC09URL#5191501John MashfordDhammika De SilvaDonavan MarneyStewart BurnAn Approach to Leak Detection in Pipe Networks Using Analysis of Monitored Pressure Values by Support Vector Machine.NSS534-5392009Conference and Workshop Papersclosedconf/nss/MashfordSMB0910.1109/NSS.2009.38https://doi.org/10.1109/NSS.2009.38https://dblp.org/rec/conf/nss/MashfordSMB09URL#5191502Mohammed Md. MazidA. B. M. Shawkat AliKevin S. TickleA Comparison Between Rule Based and Association Rule Mining Algorithms.NSS452-4552009Conference and Workshop Papersclosedconf/nss/MazidAT0910.1109/NSS.2009.81https://doi.org/10.1109/NSS.2009.81https://dblp.org/rec/conf/nss/MazidAT09URL#5191503Sheeraz MemonMargaret LechNamunu Chinthaka MaddageSpeaker Verification Based on Different Vector Quantization Techniques with Gaussian Mixture Models.NSS403-4082009Conference and Workshop Papersclosedconf/nss/MemonLM0910.1109/NSS.2009.19https://doi.org/10.1109/NSS.2009.19https://dblp.org/rec/conf/nss/MemonLM09URL#5191504Nabil M. K. MirzaZiad OsmanRached N. ZantoutMohamed El-Sayed 0005Error Correction of Noisy Block Cipher Using Cipher and Plaintext Characteristics.NSS151-1572009Conference and Workshop Papersclosedconf/nss/MirzaOZE0910.1109/NSS.2009.42https://doi.org/10.1109/NSS.2009.42https://dblp.org/rec/conf/nss/MirzaOZE09URL#5191505Jan MuhammadRichard O. SinnottPolicy-Driven Patch Management for Distributed Environments.NSS158-1632009Conference and Workshop Papersclosedconf/nss/MuhammadS0910.1109/NSS.2009.67https://doi.org/10.1109/NSS.2009.67https://dblp.org/rec/conf/nss/MuhammadS09URL#5191506Aarthi NagarajanVijay VaradharajanMichael HitchensEimear GalleryProperty Based Attestation and Trusted Computing: Analysis and Challenges.NSS278-2852009Conference and Workshop Papersclosedconf/nss/NagarajanVHG0910.1109/NSS.2009.83https://doi.org/10.1109/NSS.2009.83https://dblp.org/rec/conf/nss/NagarajanVHG09URL#5191507Jesmin NaharKevin S. TickleA. B. M. Shawkat AliYi-Ping Phoebe ChenEarly Breast Cancer Identification: Which Way to Go? Microarray or Image Based Computer Aided Diagnosis!.NSS456-4612009Conference and Workshop Papersclosedconf/nss/NaharTAC0910.1109/NSS.2009.75https://doi.org/10.1109/NSS.2009.75https://dblp.org/rec/conf/nss/NaharTAC09URL#5191508Hyunhee ParkMeejoung KimChul-Hee KangF-TAD: Traffic Anomaly Detection for Sub-networks Using Fisher Linear Discriminant.NSS328-3352009Conference and Workshop Papersclosedconf/nss/ParkKK0910.1109/NSS.2009.60https://doi.org/10.1109/NSS.2009.60https://dblp.org/rec/conf/nss/ParkKK09URL#5191509Book-Sung ParkDan QiYanli LiuBolormaa KhurelbaatarChul-Ju KimA Novel Quad-band Internal Antenna with Ni/Ag/Ni Structure for Wireless Mobile Handset.NSS575-5782009Conference and Workshop Papersclosedconf/nss/ParkQLKK0910.1109/NSS.2009.86https://doi.org/10.1109/NSS.2009.86https://dblp.org/rec/conf/nss/ParkQLKK09URL#5191510Noel Henry PatsonVisualizing Global Patterns in Huge Digraphs.NSS480-4832009Conference and Workshop Papersclosedconf/nss/Patson0910.1109/NSS.2009.37https://doi.org/10.1109/NSS.2009.37https://dblp.org/rec/conf/nss/Patson09URL#5191511Wei PengQingmai WangBin WangXinghuo Yu 0001Putting Simple Hierarchy into Ant Foraging: Cluster-Based Soft-Bots.NSS484-4882009Conference and Workshop Papersclosedconf/nss/PengWWY0910.1109/NSS.2009.89https://doi.org/10.1109/NSS.2009.89https://dblp.org/rec/conf/nss/PengWWY09URL#5191512Van-Hau PhamMarc DacierHoneypot Traces Forensics: The Observation Viewpoint Matters.NSS365-3722009Conference and Workshop Papersclosedconf/nss/PhamD0910.1109/NSS.2009.46https://doi.org/10.1109/NSS.2009.46https://dblp.org/rec/conf/nss/PhamD09URL#5191513Raphael C.-W. PhanWei-Chuen YauBok-Min GoiAnalysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols.NSS102-1062009Conference and Workshop Papersclosedconf/nss/PhanYG0910.1109/NSS.2009.56https://doi.org/10.1109/NSS.2009.56https://dblp.org/rec/conf/nss/PhanYG09URL#5191514A. John PrakashV. Rhymend UthariarajSecure Authenticated Key Establishment Protocol for Ad Hoc Networks.NSS87-942009Conference and Workshop Papersclosedconf/nss/PrakashU0910.1109/NSS.2009.61https://doi.org/10.1109/NSS.2009.61https://dblp.org/rec/conf/nss/PrakashU09URL#5191515W. K. Daniel PunRicardo SantaIf Cross-Functional Teams are the Answer, What is the Question?.NSS501-5052009Conference and Workshop Papersclosedconf/nss/PunS0910.1109/NSS.2009.93https://doi.org/10.1109/NSS.2009.93https://dblp.org/rec/conf/nss/PunS09URL#5191516Carlos QueirozAbdun Naser MahmoodJiankun HuZahir TariXinghuo Yu 0001Building a SCADA Security Testbed.NSS357-3642009Conference and Workshop Papersclosedconf/nss/QueirozMHTY0910.1109/NSS.2009.82https://doi.org/10.1109/NSS.2009.82https://dblp.org/rec/conf/nss/QueirozMHTY09URL#5191517Marco RamilliMarco PrandiniA Messaging-Based System for Remote Server Administration.NSS262-2692009Conference and Workshop Papersclosedconf/nss/RamilliP0910.1109/NSS.2009.34https://doi.org/10.1109/NSS.2009.34https://dblp.org/rec/conf/nss/RamilliP09URL#5191518Saroj RatnooKamal Kant BharadwajDiscovery of Exceptions: A Step towards Perfection.NSS540-5452009Conference and Workshop Papersclosedconf/nss/RatnooB0910.1109/NSS.2009.32https://doi.org/10.1109/NSS.2009.32https://dblp.org/rec/conf/nss/RatnooB09URL#5191519Dakila Reyes IICedric Angelo M. FestinSusan Pancho-FestinIncentive-Based Self-Organized Public Key Management for Mobile Ad Hoc Networks.NSS565-5702009Conference and Workshop Papersclosedconf/nss/ReyesFP0910.1109/NSS.2009.95https://doi.org/10.1109/NSS.2009.95https://dblp.org/rec/conf/nss/ReyesFP09URL#5191520Giovanni RusselloNaranker DulayxDUCON: Coordinating Usage Control Policies in Distributed Domains.NSS246-2532009Conference and Workshop Papersclosedconf/nss/RusselloD0910.1109/NSS.2009.77https://doi.org/10.1109/NSS.2009.77https://dblp.org/rec/conf/nss/RusselloD09URL#5191521Muhammad Awais ShibliSead MufticAlessandro GiambrunoAntonio LioyMagicNET: Security System for Development, Validation and Adoption of Mobile Agents.NSS389-3962009Conference and Workshop Papersclosedconf/nss/ShibliMGL0910.1109/NSS.2009.33https://doi.org/10.1109/NSS.2009.33https://dblp.org/rec/conf/nss/ShibliMGL09URL#5191522Kalvinder SinghVallipuram MuthukkumarasamyImplementation and Analysis of Sensor Security Protocols in a Home Health Care System.NSS137-1422009Conference and Workshop Papersclosedconf/nss/SinghM0910.1109/NSS.2009.79https://doi.org/10.1109/NSS.2009.79https://dblp.org/rec/conf/nss/SinghM09URL#5191523Boyeon SongChris J. MitchellScalable RFID Pseudonym Protocol.NSS216-2242009Conference and Workshop Papersclosedconf/nss/SongM0910.1109/NSS.2009.15https://doi.org/10.1109/NSS.2009.15https://dblp.org/rec/conf/nss/SongM09URL#5191524Bruno Lage SrurVallipuram MuthukkumarasamyEnhancing Trust on e-Government: A Decision Fusion Module.NSS164-1692009Conference and Workshop Papersclosedconf/nss/SrurM0910.1109/NSS.2009.58https://doi.org/10.1109/NSS.2009.58https://dblp.org/rec/conf/nss/SrurM09URL#5191525Robert SteeleKyongho MinFlexible Wireless Trust Through Ontology-Based Mapping and Its Attendant Semantic Limitations.NSS240-2452009Conference and Workshop Papersclosedconf/nss/SteeleM0910.1109/NSS.2009.80https://doi.org/10.1109/NSS.2009.80https://dblp.org/rec/conf/nss/SteeleM09URL#5191526Rossilawati SulaimanDharmendra Sharma 0001Wanli MaDat Tran 0001A Multi-agent Security Architecture.NSS184-1912009Conference and Workshop Papersclosedconf/nss/SulaimanSMT0910.1109/NSS.2009.78https://doi.org/10.1109/NSS.2009.78https://dblp.org/rec/conf/nss/SulaimanSMT09URL#5191527Xiaoxun SunHua Wang 0002Lili SunExtended K-Anonymity Models Against Attribute Disclosure.NSS130-1362009Conference and Workshop Papersclosedconf/nss/SunWS0910.1109/NSS.2009.23https://doi.org/10.1109/NSS.2009.23https://dblp.org/rec/conf/nss/SunWS09URL#5191528Bing SunYa-Ping ZhangNing ZhangSelf-Protection Model Based on Intelligent Agent.NSS199-2022009Conference and Workshop Papersclosedconf/nss/SunZZ0910.1109/NSS.2009.18https://doi.org/10.1109/NSS.2009.18https://dblp.org/rec/conf/nss/SunZZ09URL#5191529Nasim VataniAmir Masoud RahmaniMohammad Ebrahim ShiriAn Information Filtering Approach.NSS30-352009Conference and Workshop Papersclosedconf/nss/VataniRS0910.1109/NSS.2009.45https://doi.org/10.1109/NSS.2009.45https://dblp.org/rec/conf/nss/VataniRS09URL#5191530Alif WahidChristopher LeckieChenfeng Vincent ZhouCharacterising the Evolution in Scanning Activity of Suspicious Hosts.NSS344-3502009Conference and Workshop Papersclosedconf/nss/WahidLZ0910.1109/NSS.2009.13https://doi.org/10.1109/NSS.2009.13https://dblp.org/rec/conf/nss/WahidLZ09URL#5191531Huiqiang WangHongwu LvGuangsheng FengA Self-Reflection Model for Autonomic Computing Systems Based on p-Calculus.NSS310-3152009Conference and Workshop Papersclosedconf/nss/WangLF0910.1109/NSS.2009.28https://doi.org/10.1109/NSS.2009.28https://dblp.org/rec/conf/nss/WangLF09URL#5191532Tilman WolfRussell TessierDesign of a Secure Router System for Next-Generation Networks.NSS52-592009Conference and Workshop Papersclosedconf/nss/WolfT0910.1109/NSS.2009.70https://doi.org/10.1109/NSS.2009.70https://dblp.org/rec/conf/nss/WolfT09URL#5191533Ming-Ming XiaoShun-Zheng YuYu Wang 0017Automatic Network Protocol Automaton Extraction.NSS336-3432009Conference and Workshop Papersclosedconf/nss/XiaoYW0910.1109/NSS.2009.71https://doi.org/10.1109/NSS.2009.71https://dblp.org/rec/conf/nss/XiaoYW09URL#5191534Piyi YangZhenfu CaoXiaolei DongCertificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network.NSS143-1502009Conference and Workshop Papersclosedconf/nss/YangCD0910.1109/NSS.2009.11https://doi.org/10.1109/NSS.2009.11https://dblp.org/rec/conf/nss/YangCD09URL#5191535Chan Yeob YeunSalman Mohammed Al-MarzouqiPractical Implementations for Securing VoIP Enabled Mobile Devices.NSS409-4142009Conference and Workshop Papersclosedconf/nss/YeunA0910.1109/NSS.2009.24https://doi.org/10.1109/NSS.2009.24https://dblp.org/rec/conf/nss/YeunA09URL#5191536Shui Yu 0001Theerasak ThapngamJianwen LiuSu WeiWanlei Zhou 0001Discriminating DDoS Flows from Flash Crowds Using Information Distance.NSS351-3562009Conference and Workshop Papersclosedconf/nss/YuTLWZ0910.1109/NSS.2009.29https://doi.org/10.1109/NSS.2009.29https://dblp.org/rec/conf/nss/YuTLWZ09URL#5191537Burcu YurekliGökhan ÇapanBaris YilmazelÖzgür YilmazelGuided Navigation Using Query Log Mining through Query Expansion.NSS560-5642009Conference and Workshop Papersclosedconf/nss/YurekliCYY0910.1109/NSS.2009.27https://doi.org/10.1109/NSS.2009.27https://dblp.org/rec/conf/nss/YurekliCYY09URL#5191538Yang ZhangEffective Attacks in the Tor Authentication Protocol.NSS81-862009Conference and Workshop Papersclosedconf/nss/Zhang0910.1109/NSS.2009.94https://doi.org/10.1109/NSS.2009.94https://dblp.org/rec/conf/nss/Zhang09URL#5191539Yang ZhangA Pseudonym-Based Signature Scheme for Dynamic Clusters in Ad Hoc Networks.NSS208-2152009Conference and Workshop Papersclosedconf/nss/Zhang09a10.1109/NSS.2009.69https://doi.org/10.1109/NSS.2009.69https://dblp.org/rec/conf/nss/Zhang09aURL#5191540Qi ZhangYi Mu 0001Minjie ZhangRobert Huijie DengSecure Mobile Agents with Designated Hosts.NSS286-2932009Conference and Workshop Papersclosedconf/nss/ZhangMZD0910.1109/NSS.2009.59https://doi.org/10.1109/NSS.2009.59https://dblp.org/rec/conf/nss/ZhangMZD09URL#5191541Shaomin ZhangYue ZouBaoyi WangA Novel Grid Trust Model Based on Fuzzy Theory.NSS203-2072009Conference and Workshop Papersclosedconf/nss/ZhangZW0910.1109/NSS.2009.10https://doi.org/10.1109/NSS.2009.10https://dblp.org/rec/conf/nss/ZhangZW09URL#5191542Yang Xiang 0001Javier López 0001Haining WangWanlei Zhou 0001Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009NSSIEEE Computer Society2009Editorshipconf/nss/2009https://ieeexplore.ieee.org/xpl/conhome/5328291/proceedinghttps://dblp.org/rec/conf/nss/2009URL#5221645