Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/sin/sin2015.bht:"
@inproceedings{DBLP:conf/sin/AbramovBM15, author = {Evgeny Sergeevich Abramov and Elena Basan and Oleg B. Makarevich}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Trust management system for mobile cluster-based wireless sensor network}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {203--209}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800001}, doi = {10.1145/2799979.2800001}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AbramovBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AlexandrovnaU15, author = {Evstifeeva Natalia Alexandrovna and Evstifeeva Olga Urievna}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Approbation of the methodology for web monitoring of terrorism- and extremism-related content}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {100--102}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800031}, doi = {10.1145/2799979.2800031}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AlexandrovnaU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AlkhasovTT15, author = {S. S. Alkhasov and Alexander N. Tselykh and Alexey A. Tselykh}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Application of cluster analysis for the assessment of the share of fraud victims among bank card holders}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {103--106}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800033}, doi = {10.1145/2799979.2800033}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AlkhasovTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AmirkhanyanSG0M15, author = {Aragats Amirkhanyan and Andrey Sapegin and Marian Gawron and Feng Cheng and Christoph Meinel}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Simulation user behavior on a security testbed using user behavior states graph}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {217--223}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799985}, doi = {10.1145/2799979.2799985}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/AmirkhanyanSG0M15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Anikeev15, author = {Maxim Anikeev}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Improvement of treeless signature schemes implementation by random oracle buffering}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {90--92}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800045}, doi = {10.1145/2799979.2800045}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/Anikeev15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AnikinE15, author = {Igor Anikin and Lilia Yu. Emaletdinova}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Information security risk management in computer networks based on fuzzy logic and cost/benefit ratio estimation}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {8--11}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800022}, doi = {10.1145/2799979.2800022}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/AnikinE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AwanAABR15, author = {Malik S. K. Awan and Mohammed A. AlGhamdi and Sultan H. Almotiri and Pete Burnap and Omer F. Rana}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {A classification framework for distinct cyber-attacks based on occurrence patterns}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {165--168}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800037}, doi = {10.1145/2799979.2800037}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AwanAABR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BabenkoBMT15, author = {Ludmila K. Babenko and Philipp Burtyka and Oleg B. Makarevich and Alina Trepacheva}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {The general model of secure computation system}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {177--184}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800006}, doi = {10.1145/2799979.2800006}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/BabenkoBMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BabenkoT15, author = {Ludmila K. Babenko and Alina Trepacheva}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Cryptanalysis of factoring-based fully homomorphic encryption}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {80--83}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800038}, doi = {10.1145/2799979.2800038}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/BabenkoT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BanerjeeDB15, author = {Subhasish Banerjee and Manash Pratim Dutta and Chandan Tilak Bhunia}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {A perfect dynamic-id and biometric based remote user authentication scheme under multi-server environments using smart cards}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {58--64}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799984}, doi = {10.1145/2799979.2799984}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/BanerjeeDB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BarabanovM15, author = {Alexander Barabanov and Alexey Markov}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Modern trends in the regulatory framework of the information security compliance assessment in Russia based on common criteria}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {30--33}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799980}, doi = {10.1145/2799979.2799980}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/BarabanovM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BarabanovMFTS15, author = {Alexander Barabanov and Alexey Markov and Andrey Fadin and Valentin Tsirlov and Igor Shakhalov}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Synthesis of secure software development controls}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {93--97}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799998}, doi = {10.1145/2799979.2799998}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/BarabanovMFTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BhandariGLGZA15, author = {Shweta Bhandari and Rishabh Gupta and Vijay Laxmi and Manoj Singh Gaur and Akka Zemmari and Maxim Anikeev}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {{DRACO:} DRoid analyst combo an android malware analysis framework}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {283--289}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800003}, doi = {10.1145/2799979.2800003}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/BhandariGLGZA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Boruchinkin15, author = {A. Yu. Boruchinkin}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Secure voice communication system with hardware encryption of data on hands-free headset}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {76--79}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800030}, doi = {10.1145/2799979.2800030}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/Boruchinkin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BuccafurriFFGGT15, author = {Francesco Buccafurri and Lidia Fotia and Angelo Furfaro and Alfredo Garro and Matteo Giacalone and Andrea Tundis}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {An analytical processing approach to supporting cyber security compliance assessment}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {46--53}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800007}, doi = {10.1145/2799979.2800007}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/BuccafurriFFGGT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BuddhdevBGL15, author = {Bharat Buddhdev and Rati Bhan and Manoj Singh Gaur and Vijay Laxmi}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {DynaDroid: dynamic binary instrumentation based app behavior monitoring framework}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {322--325}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800036}, doi = {10.1145/2799979.2800036}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/BuddhdevBGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BurtykaM15, author = {Philipp Burtyka and Oleg B. Makarevich}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Execution of data-dependent programs over encrypted data}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {84--89}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800010}, doi = {10.1145/2799979.2800010}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/BurtykaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ChakrabortyM15, author = {Nilesh Chakraborty and Samrat Mondal}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Few notes towards making honeyword system more secure and usable}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {237--245}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799992}, doi = {10.1145/2799979.2799992}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/ChakrabortyM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ChukovaA15, author = {Daria Chukova and Alexey Pakhomov}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Profile-based students assignment to core financial intelligence unit departments}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {107--108}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800018}, doi = {10.1145/2799979.2800018}, timestamp = {Fri, 20 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/ChukovaA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/DmitryAGDAEAA15, author = {Dmitry Mikhaylov and Andrey Starikovskiy and Grigoriy Lebedev and Dmitry Rubin and Alexey Egorov and Eugeniy Uleykin and Alexander Boruchinkin and Anastasia M. Tolstaya}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Developing a system for text-messages protection}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {326--329}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800041}, doi = {10.1145/2799979.2800041}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/DmitryAGDAEAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/EliseevS15, author = {Vladimir Eliseev and Yury Shabalin}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Dynamic response recognition by neural network to detect network host anomaly activity}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {246--249}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799991}, doi = {10.1145/2799979.2799991}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/EliseevS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/EpishkinaK15, author = {Anna Epishkina and Konstantin Kogos}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Protection from binary and multi-symbol packet length covert channels}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {196--202}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799994}, doi = {10.1145/2799979.2799994}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/EpishkinaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/GajraniSTLGC15, author = {Jyoti Gajrani and Jitendra Sarswat and Meenakshi Tripathi and Vijay Laxmi and Manoj Singh Gaur and Mauro Conti}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {A robust dynamic analysis system preventing SandBox detection by Android malware}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {290--295}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800004}, doi = {10.1145/2799979.2800004}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/GajraniSTLGC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Garkusha15, author = {Artem Garkusha}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Building data in motion {DLP} system from scratch using opensource software and confirming its effectiveness within "capture the flag" competitions}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {54--57}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800044}, doi = {10.1145/2799979.2800044}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/Garkusha15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/GawronA0M15, author = {Marian Gawron and Aragats Amirkhanyan and Feng Cheng and Christoph Meinel}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Automatic vulnerability detection for weakness visualization and advisory creation}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {229--236}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799986}, doi = {10.1145/2799979.2799986}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/GawronA0M15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/GeorgeV15, author = {Princy George and P. Vinod}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Machine learning approach for filtering spam emails}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {271--274}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800043}, doi = {10.1145/2799979.2800043}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/GeorgeV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/GlukhovIA15, author = {Vladimir V. Glukhov and Igor V. Ilin and A. B. Anisiforov}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Problems of data protection in industrial corporations enterprise architecture}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {34--37}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800032}, doi = {10.1145/2799979.2800032}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/GlukhovIA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/GoswamiBDB15, author = {Rajat Subhra Goswami and Subhasish Banerjee and Manash Pratim Dutta and Chandan Tilak Bhunia}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Absolute key variation technique of automatic variable key in cryptography}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {65--67}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800021}, doi = {10.1145/2799979.2800021}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/GoswamiBDB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/HanifiBT15, author = {Hamid Hanifi and Leemon C. Baird III and Ramakrishna Thurimella}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {A new algorithm for unkeyed jam resistance}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {210--216}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800008}, doi = {10.1145/2799979.2800008}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/HanifiBT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/JohnVD15, author = {Meenu Mary John and P. Vinod and K. A. Dhanya}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Hartley's test ranked opcodes for Android malware analysis}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {304--311}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2801037}, doi = {10.1145/2799979.2801037}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/JohnVD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KnyazevaTTP15, author = {Margarita Knyazeva and Alexander N. Tselykh and Alexey A. Tselykh and Elena Popkova}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {A graph-based data mining approach to preventing financial fraud: a case study}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {109--113}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800002}, doi = {10.1145/2799979.2800002}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/KnyazevaTTP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KonoplevB15, author = {Artem S. Konoplev and Alexey G. Busygin}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Steganographic methods of communications in distributed computing networks}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {131--134}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800024}, doi = {10.1145/2799979.2800024}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/KonoplevB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KucuksilleYG15, author = {Ecir Ugur K{\"{u}}{\c{c}}{\"{u}}ksille and Mehmet Ali Yal{\c{c}}inkaya and Samet Ganal}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Developing a penetration test methodology in ensuring router security and testing it in a virtual laboratory}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {189--195}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799989}, doi = {10.1145/2799979.2799989}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/KucuksilleYG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KumarS15, author = {N. V. Narendra Kumar and R. K. Shyamasundar}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Labelled mobile ambients model for information flow security in distributed systems}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {330--337}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800012}, doi = {10.1145/2799979.2800012}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/KumarS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Lapin15, author = {Sergey Lapin}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Access control model {D-TBAC} subject to the requirements to tasks' performing}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {42--45}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800034}, doi = {10.1145/2799979.2800034}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/Lapin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/LeonDP15, author = {Elvia Le{\'{o}}n and Brayan S. Reyes Daza and Octavio J. Salcedo Parra}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Comparison between safety and efficient security of the {ARP} protocol}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {318--321}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800035}, doi = {10.1145/2799979.2800035}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/LeonDP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/MiloslavskayaTP15, author = {Natalia G. Miloslavskaya and Alexander I. Tolstoy and Vladislav Petrov}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Secure e-Learning portal for teaching business continuity and information security management}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {38--41}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800020}, doi = {10.1145/2799979.2800020}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/MiloslavskayaTP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/MininK15, author = {Alexander Minin and Maxim O. Kalinin}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Information security in computer networks with dynamic topology}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {127--130}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800023}, doi = {10.1145/2799979.2800023}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/MininK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/MoskvinI15, author = {Dmitry V. Moskvin and Denis Ivanov}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Cybersecurity of ad-hoc distributed systems}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {150--153}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800028}, doi = {10.1145/2799979.2800028}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/MoskvinI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/MukhtarBK15, author = {Naila Mukhtar and Muhammad Shamim Baig and L. A. Khan}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Improved trust based key management for end-to-end secure communication in cellular networks}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {68--75}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800014}, doi = {10.1145/2799979.2800014}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/MukhtarBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/NassrS15, author = {Nezar Nassr and Eric Steegmans}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Mitigating conflicts of interest by authorization policies}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {118--126}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800013}, doi = {10.1145/2799979.2800013}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/NassrS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Osipyan15, author = {Valeriy O. Osipyan}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Mathematical modelling of cryptosystems based on Diophantine problem with gamma superposition method}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {338--341}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800026}, doi = {10.1145/2799979.2800026}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/Osipyan15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/PetrovskiRP15, author = {Andrei Petrovski and Prapa Rattadilok and Sergey Petrovski}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Designing a context-aware cyber physical system for detecting security threats in motor vehicles}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {267--270}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800029}, doi = {10.1145/2799979.2800029}, timestamp = {Thu, 03 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/PetrovskiRP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Poet15, author = {Ron Poet}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {The use of mobile devices in authentication}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {5}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799982}, doi = {10.1145/2799979.2799982}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/Poet15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/RaphelV15, author = {Jithu Raphel and P. Vinod}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Information theoretic method for classification of packed and encoded files}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {296--303}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800015}, doi = {10.1145/2799979.2800015}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/RaphelV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/RifautFTK15, author = {Andr{\'{e}} Rifaut and Christophe Feltus and Slim Turki and Djamel Khadraoui}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Analysis of the impact of ethical issues on the management of the access rights}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {12--19}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799996}, doi = {10.1145/2799979.2799996}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/RifautFTK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/SainiGLN15, author = {Anil Saini and Manoj Singh Gaur and Vijay Laxmi and Priyadarsi Nanda}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {sandFOX: secure sandboxed and isolated environment for firefox browser}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {20--27}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800000}, doi = {10.1145/2799979.2800000}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/SainiGLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/SaudI15, author = {Zainab Saud and M. Hasan Islam}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Towards proactive detection of advanced persistent threat {(APT)} attacks using honeypots}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {154--157}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800042}, doi = {10.1145/2799979.2800042}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/SaudI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ShalyapinZ15, author = {Andrey Shalyapin and Vadim Zhukov}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Case based analysis in information security incidents management system}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {312--317}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799990}, doi = {10.1145/2799979.2799990}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/ShalyapinZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Shcherba15, author = {Evgeny Shcherba}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Two formal problems of network security and a theory of boolean-valued flow networks}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {185--188}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800040}, doi = {10.1145/2799979.2800040}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/Shcherba15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Sheykhkanloo15, author = {Naghmeh Moradpoor Sheykhkanloo}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {{SQL-IDS:} evaluation of SQLi attack detection and classification based on machine learning techniques}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {258--266}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800011}, doi = {10.1145/2799979.2800011}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/Sheykhkanloo15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ShukhmanPULTB15, author = {Alexander Shukhman and Petr Polezhaev and Yuri Ushakov and Leonid Legashev and Veniamin N. Tarasov and Nadezhda F. Bakhareva}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Development of network security tools for enterprise software-defined networks}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {224--228}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800009}, doi = {10.1145/2799979.2800009}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/ShukhmanPULTB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/SomaniGS15, author = {Gaurav Somani and Manoj Singh Gaur and Dheeraj Sanghi}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {DDoS/EDoS attack in cloud: affecting everyone out there!}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {169--176}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800005}, doi = {10.1145/2799979.2800005}, timestamp = {Thu, 14 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/SomaniGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/StepanovaPL15, author = {Tatiana V. Stepanova and Alexander I. Pechenkin and Daria S. Lavrova}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {142--149}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799995}, doi = {10.1145/2799979.2799995}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/StepanovaPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/StepanovaZ15, author = {Tatiana V. Stepanova and Dmitry P. Zegzhda}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Large-scale systems security evolution: control theory approach}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {135--141}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799993}, doi = {10.1145/2799979.2799993}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/StepanovaZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Tarasov15, author = {Alexander Tarasov}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Modern techniques of function-level fault tolerance in MFM-systems}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {28--29}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800016}, doi = {10.1145/2799979.2800016}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/Tarasov15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ThurimellaDM15, author = {Ramakrishna Thurimella and Rinku Dewri and William Mitchell}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Record linkage applications in health services research: opportunities and challenges}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799983}, doi = {10.1145/2799979.2799983}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/ThurimellaDM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/TselykhP15, author = {Alexey A. Tselykh and Dmitry Petukhov}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Web service for detecting credit card fraud in near real-time}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {114--117}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800039}, doi = {10.1145/2799979.2800039}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/TselykhP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Vasilomanolakis15, author = {Emmanouil Vasilomanolakis and Shankar Karuppayah and Panayotis Kikiras and Max M{\"{u}}hlh{\"{a}}user}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {A honeypot-driven cyber incident monitor: lessons learned and steps ahead}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {158--164}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799999}, doi = {10.1145/2799979.2799999}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/Vasilomanolakis15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/WangMJ15, author = {Xuefei Wang and Hengtai Ma and Lisha Jing}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {A dynamic marking method for implicit information flow in dynamic taint analysis}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {275--282}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799988}, doi = {10.1145/2799979.2799988}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/WangMJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ZapechnikovMT15, author = {Sergey Zapechnikov and Natalia G. Miloslavskaya and Alexander I. Tolstoy}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Modeling of next-generation firewalls as queueing services}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {250--257}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799997}, doi = {10.1145/2799979.2799997}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/ZapechnikovMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Zhukov15, author = {Alexey Zhukov}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Lightweight cryptography: modern development paradigms}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {7}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799981}, doi = {10.1145/2799979.2799981}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/Zhukov15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sin/2015, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2799979}, isbn = {978-1-4503-3453-2}, timestamp = {Wed, 29 Mar 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.