Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:conf/cybersec:"
@inproceedings{DBLP:conf/cybersec/AbdullahH15, author = {Norhaiza Ya Abdullah and Herny Ramadhani Mohd Husny Hamid}, title = {Folder Lock by Using Multimodal Biometric: Fingerprint and Signature Authentication}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {140--145}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.35}, doi = {10.1109/CYBERSEC.2015.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/AbdullahH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/AkiyamaOKS15, author = {Takumi Akiyama and Kazuya Otani and Yoshio Kakizaki and Ry{\^{o}}ichi Sasaki}, title = {Evaluation of a Risk-Based Management Method for Online Accounts}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {52--57}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.19}, doi = {10.1109/CYBERSEC.2015.19}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/AkiyamaOKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/AlamKBF15, author = {Delwar Alam and Md. Alamgir Kabir and Touhid Bhuiyan and Tanjila Farah}, title = {A Case Study of {SQL} Injection Vulnerabilities Assessment of .bd Domain Web Applications}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {73--77}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.23}, doi = {10.1109/CYBERSEC.2015.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/AlamKBF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/AlkalbaniMMA15, author = {Abdullah Said Alkalbani and Teddy Mantoro and Sardjoeni Moedjiono and Media A. Ayu}, title = {Hybrid Solution for Secured and Energy Aware Routing Path in Wireless Sensor Networks}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {78--83}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.24}, doi = {10.1109/CYBERSEC.2015.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/AlkalbaniMMA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/AllawiHA15, author = {Mohammad Ahmad Abu Allawi and Ali Hadi and Arafat Awajan}, title = {{MLDED:} Multi-layer Data Exfiltration Detection System}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {107--112}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.29}, doi = {10.1109/CYBERSEC.2015.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/AllawiHA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/AzizMN15, author = {Normaziah Abdul Aziz and Fakhrulrazi Mokhti and M. Nadhar M. Nozri}, title = {Mobile Device Forensics: Extracting and Analysing Data from an Android-Based Smartphone}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {123--128}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.32}, doi = {10.1109/CYBERSEC.2015.32}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/AzizMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/DanuputriMH15, author = {Chyquitha Danuputri and Teddy Mantoro and Mardi Hardjianto}, title = {Data Security Using {LSB} Steganography and Vigenere Chiper in an Android Environment}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {22--27}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.14}, doi = {10.1109/CYBERSEC.2015.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/DanuputriMH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/HamidA15, author = {Herny Ramadhani Mohd Husny Hamid and Norhaiza Ya Abdullah}, title = {Physical Authentication Using Random Number Generated {(RNG)} Keypad Based on One Time Pad {(OTP)} Concept}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {135--139}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.34}, doi = {10.1109/CYBERSEC.2015.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/HamidA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/HamidKA15, author = {Herny Ramadhani Mohd Husny Hamid and Megat Ahmad Izzat bin Megat Ahmad Kamil and Norhaiza Ya Abdullah}, title = {Portable Toolkit for Penetration Testing and Firewall Configuration}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {90--94}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.26}, doi = {10.1109/CYBERSEC.2015.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/HamidKA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/HashimotoHMKKYU15, author = {Kazuki Hashimoto and Hiroyuki Hiruma and Takashi Matsumoto and Kosetus Kayama and Yoshio Kaikizaki and Hiroshi Yamaki and Tetsutaro Uehara and Ry{\^{o}}ichi Sasaki}, title = {Development of Intellectual Network Forensic System {LIFT} against Targeted Attacks}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {16--21}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.13}, doi = {10.1109/CYBERSEC.2015.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/HashimotoHMKKYU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/ImranAQ15, author = {Mohammad Imran and Muhammad Tanvir Afzal and Muhammad Abdul Qadir}, title = {Similarity-Based Malware Classification Using Hidden Markov Model}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {129--134}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.33}, doi = {10.1109/CYBERSEC.2015.33}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/ImranAQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/JatikusumoHFU15, author = {Dwiki Jatikusumo and Hanny Hikmayanti H. and Feriadi and Wendi Usino}, title = {Securing Official Account Twitter Using Social Media Management System: Accuracy of the Data and Information Publish with Twitter}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {11--15}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.12}, doi = {10.1109/CYBERSEC.2015.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/JatikusumoHFU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/KamarudinMWS15, author = {Muhammad Hilmi Kamarudin and Carsten Maple and Tim Watson and Hasliza Sofian}, title = {Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting {R2L} and {U2R} Attacks}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {101--106}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.28}, doi = {10.1109/CYBERSEC.2015.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/KamarudinMWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/KoizumiS15, author = {Ryohei Koizumi and Ry{\^{o}}ichi Sasaki}, title = {Study on Countermeasures Using Mitigation Software against Vulnerability Attacks}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {28--33}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.15}, doi = {10.1109/CYBERSEC.2015.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/KoizumiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/Laoufi15, author = {Nabil Laoufi}, title = {From Risk Analysis to the Expression of Security Requirements for Systems Information}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {84--89}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.25}, doi = {10.1109/CYBERSEC.2015.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/Laoufi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/LuthfiP15, author = {Ahmad Luthfi and Yudi Prayudi}, title = {Process Model of Digital Forensics Readiness Scheme {(DFRS)} as a Recommendation of Digital Evidence Preservation}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {117--122}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.31}, doi = {10.1109/CYBERSEC.2015.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/LuthfiP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/MantoroWAU15, author = {Teddy Mantoro and M. Iman Wahyudi and Media A. Ayu and Wendi Usino}, title = {Real-Time Printed Document Authentication Using Watermarked {QR} Code}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {68--72}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.22}, doi = {10.1109/CYBERSEC.2015.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/MantoroWAU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/NakagawaTS15, author = {Naoto Nakagawa and Yoshimi Teshigawara and Ry{\^{o}}ichi Sasaki}, title = {Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {46--51}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.18}, doi = {10.1109/CYBERSEC.2015.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/NakagawaTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/PersadhaWY15, author = {P. D. Persadha and A. A. Waskita and S. Yazid}, title = {Comparative Study of Cyber Security Policies among Malaysia, Australia, Indonesia: {A} Responsibility Perspective}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {146--150}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.36}, doi = {10.1109/CYBERSEC.2015.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/PersadhaWY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/RaghavanR15, author = {Sriram Raghavan and S. V. Raghavan}, title = {Estimating Posterior Probabilities to Identify Breach Points during Cyber-attacks}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {113--116}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.30}, doi = {10.1109/CYBERSEC.2015.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/RaghavanR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/SatoSHIS15, author = {Makoto Sato and Akihiko Sugimoto and Naoki Hayashi and Yoshiaki Isobe and Ry{\^{o}}ichi Sasaki}, title = {Proposal of a Method for Identifying the Infection Route for Targeted Attacks Based on Malware Behavior in a Network}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {40--45}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.17}, doi = {10.1109/CYBERSEC.2015.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/SatoSHIS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/SetiawanSS15, author = {Ahmad Budi Setiawan and Aries Syamsudin and Ashwin Sasongko Sastrosubroto}, title = {Implementation of Secure Smart Grid as Critical Information Infrastructure in Indonesia: {A} Case Study in Smart Grid Electricity}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {34--39}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.16}, doi = {10.1109/CYBERSEC.2015.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/SetiawanSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/Styugin15, author = {Mikhail Styugin}, title = {Analysis of Awareness Structures in Information Security Systems}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {6--10}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.11}, doi = {10.1109/CYBERSEC.2015.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/Styugin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/TamimiNK15, author = {Ali Tamimi and D. Subbaram Naidu and Sanaz Kavianpour}, title = {An Intrusion Detection System Based on {NSGA-II} Algorithm}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {58--61}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.20}, doi = {10.1109/CYBERSEC.2015.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/TamimiNK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/TranN15, author = {Manh Cong Tran and Yasuhiro Nakamura}, title = {An Approach to Mine Suspicious Domain Based on {HTTP} Automated Software Communication Behavior}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.10}, doi = {10.1109/CYBERSEC.2015.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/TranN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/WahanggaraP15, author = {Victor Wahanggara and Yudi Prayudi}, title = {Malware Detection through Call System on Android Smartphone Using Vector Machine Method}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {62--67}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.21}, doi = {10.1109/CYBERSEC.2015.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/WahanggaraP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/YoonPL15, author = {Hyoseok Yoon and Se{-}Ho Park and Kyung{-}Taek Lee}, title = {Exploiting Ambient Light Sensor for Authentication on Wearable Devices}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {95--100}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.27}, doi = {10.1109/CYBERSEC.2015.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/YoonPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cybersec/2015, title = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7489990/proceeding}, isbn = {978-1-4673-8499-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/Geepalla14, author = {Emsaieb Geepalla}, title = {Comparison between Alloy and Timed Automata for modelling and analysing of access control specifications}, booktitle = {Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014}, pages = {16--21}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CyberSec.2014.6913965}, doi = {10.1109/CYBERSEC.2014.6913965}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/Geepalla14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/HassanEZ14, author = {Zakaria Zakaria Hassan and Talaat A. Elgarf and Abdelhalim Zekry}, title = {Modifying authentication techniques in mobile communication systems}, booktitle = {Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014}, pages = {38--44}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CyberSec.2014.6913969}, doi = {10.1109/CYBERSEC.2014.6913969}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/HassanEZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/HolmM14, author = {Eric Holm and Geraldine Mackenzie}, title = {The importance of mandatory data breach notification to identity crime}, booktitle = {Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014}, pages = {6--11}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CyberSec.2014.6913963}, doi = {10.1109/CYBERSEC.2014.6913963}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/HolmM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/KaddourTNNM14, author = {M. Kaddour and Nourdine Ait Tmazirte and Maan El Badaoui El Najjar and Z. Naja and Nazih Moubayed}, title = {Autonomous integrity monitoring for {GNSS} localization using informational approach and iono-free measurements}, booktitle = {Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014}, pages = {64--69}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CyberSec.2014.6913973}, doi = {10.1109/CYBERSEC.2014.6913973}, timestamp = {Fri, 19 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/KaddourTNNM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/KebandeV14, author = {Victor R. Kebande and Hein S. Venter}, title = {A cognitive approach for botnet detection using Artificial Immune System in the cloud}, booktitle = {Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014}, pages = {52--57}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CyberSec.2014.6913971}, doi = {10.1109/CYBERSEC.2014.6913971}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/KebandeV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/MohamedM14, author = {Iman Ahmeid Mohamed and Azizah Bt Abdul Manaf}, title = {An enhancement of traceability model based-on scenario for digital forensic investigation process}, booktitle = {Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014}, pages = {12--15}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CyberSec.2014.6913964}, doi = {10.1109/CYBERSEC.2014.6913964}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/MohamedM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/MohammadAES14, author = {Omer K. Jasim Mohammad and Safia Abbas and El{-}Sayed M. El{-}Horbaty and Abdel{-}Badeeh M. Salem}, title = {Statistical analysis for random bits generation on quantum key distribution}, booktitle = {Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014}, pages = {45--51}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CyberSec.2014.6913970}, doi = {10.1109/CYBERSEC.2014.6913970}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/MohammadAES14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/RjaibiGRA14, author = {Neila Rjaibi and Nawel Gannouni and Latifa Ben Arfa Rabai and Anis Ben Aissa}, title = {Modeling the propagation of security threats: An e-learning case study}, booktitle = {Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014}, pages = {32--37}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CyberSec.2014.6913968}, doi = {10.1109/CYBERSEC.2014.6913968}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/RjaibiGRA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/Watney14, author = {Murdoch Watney}, title = {Challenges pertaining to cyber war under international law}, booktitle = {Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CyberSec.2014.6913962}, doi = {10.1109/CYBERSEC.2014.6913962}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/Watney14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/YusoffMAD14, author = {Mohd Najwadi Yusoff and Ramlan Mahmod and Mohd Taufik Abdullah and Ali Dehghantanha}, title = {Mobile forensic data acquisition in Firefox {OS}}, booktitle = {Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014}, pages = {27--31}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CyberSec.2014.6913967}, doi = {10.1109/CYBERSEC.2014.6913967}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/YusoffMAD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/YusoffMDA14, author = {Mohd Najwadi Yusoff and Ramlan Mahmod and Ali Dehghantanha and Mohd Taufik Abdullah}, title = {An approach for forensic investigation in Firefox {OS}}, booktitle = {Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014}, pages = {22--26}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CyberSec.2014.6913966}, doi = {10.1109/CYBERSEC.2014.6913966}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/YusoffMDA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/ZoukaH14, author = {Heshem A. El Zouka and Mustafa M. Hosni}, title = {On the power of quantum cryptography and computers}, booktitle = {Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014}, pages = {58--63}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CyberSec.2014.6913972}, doi = {10.1109/CYBERSEC.2014.6913972}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/ZoukaH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cybersec/2014, title = {Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6908325/proceeding}, isbn = {978-1-4799-3905-3}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/AL-AmroE12, author = {Huyam Al{-}Amro and Eyas El{-}Qawasmeh}, title = {Discovering security vulnerabilities and leaks in {ASP.NET} websites}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {329--333}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246175}, doi = {10.1109/CYBERSEC.2012.6246175}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/AL-AmroE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/AbdullahY12, author = {Mohammad Faiz Liew Abdullah and A. Z. Yonis}, title = {Performance of {LTE} Release 8 and Release 10 in wireless communications}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {236--241}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246127}, doi = {10.1109/CYBERSEC.2012.6246127}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/AbdullahY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/AbdulrazegNB12, author = {Ala A. Abdulrazeg and Norita Md Norwawi and Nurlida Basir}, title = {Security metrics to improve misuse case model}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {94--99}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246129}, doi = {10.1109/CYBERSEC.2012.6246129}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/AbdulrazegNB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/AbusukhonT12, author = {Ahmad Abusukhon and Mohammad Talib}, title = {A novel network security algorithm based on private key encryption}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {33--37}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246080}, doi = {10.1109/CYBERSEC.2012.6246080}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/AbusukhonT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/AhmadYS12, author = {Rabiah Ahmad and Zahri Yunos and Shahrin Sahib}, title = {Understanding cyber terrorism: The grounded theory method applied}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {323--328}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246081}, doi = {10.1109/CYBERSEC.2012.6246081}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/AhmadYS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/AlZainSP12, author = {Mohammed A. Alzain and Ben Soh and Eric Pardede}, title = {A New approach using redundancy technique to improve security in cloud computing}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {230--235}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246174}, doi = {10.1109/CYBERSEC.2012.6246174}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/AlZainSP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/AliYA12, author = {Fakariah Hani Mohd Ali and Rozita Yunos and Mohd Azuan Mohamad Alias}, title = {Simple port knocking method: Against {TCP} replay attack and port scanning}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {247--252}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246118}, doi = {10.1109/CYBERSEC.2012.6246118}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/AliYA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/AlkhalifahD12, author = {Ali Alkhalifah and John D'Ambra}, title = {The role of Identity Management Systems in enhancing protection of user privacy}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {144--149}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246091}, doi = {10.1109/CYBERSEC.2012.6246091}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/AlkhalifahD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/AraboE12, author = {Abdullahi Arabo and Fadi El{-}Moussa}, title = {Security framework for smart devices}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {82--87}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246103}, doi = {10.1109/CYBERSEC.2012.6246103}, timestamp = {Mon, 02 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/AraboE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/AzmiZJ12, author = {Ida Madieha bt. Abdul Ghani Azmi and Sonny Zulhuda and Sigit Puspito Wigati Jarot}, title = {Data breach on the critical information infrastructures: Lessons from the Wikileaks}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {306--311}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246173}, doi = {10.1109/CYBERSEC.2012.6246173}, timestamp = {Fri, 15 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/AzmiZJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/AzuwaASS12, author = {M. P. Azuwa and Rabiah Ahmad and Shahrin Sahib and Solahuddin Shamsuddin}, title = {A propose technical security metrics model for {SCADA} systems}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {70--75}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246089}, doi = {10.1109/CYBERSEC.2012.6246089}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/AzuwaASS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/BindahmanZZ12, author = {Salah Bindahman and Nasriah Zakaria and Norsaadah Zakaria}, title = {3D body scanning technology: Privacy and ethical issues}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {150--154}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246113}, doi = {10.1109/CYBERSEC.2012.6246113}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/BindahmanZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/CanedoJCA12, author = {Edna Dias Canedo and Rafael Tim{\'{o}}teo de Sousa J{\'{u}}nior and Rhandy Rafhael de Carvalho and Robson de Oliveira Albuquerque}, title = {Trust model for private cloud}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {128--132}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246101}, doi = {10.1109/CYBERSEC.2012.6246101}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/CanedoJCA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/DaiZG12, author = {Xiangkun Dai and Caiyi Zhu and Yucui Guo}, title = {{P2P} dynamic trust management system based on trust network}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {165--170}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246132}, doi = {10.1109/CYBERSEC.2012.6246132}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/DaiZG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/DamshenasDMS12, author = {Mohsen Damshenas and Ali Dehghantanha and Ramlan Mahmoud and Solahuddin bin Shamsuddin}, title = {Forensics investigation challenges in cloud computing environments}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {190--194}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246092}, doi = {10.1109/CYBERSEC.2012.6246092}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/DamshenasDMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/DaryabarDUSS12, author = {Farid Daryabar and Ali Dehghantanha and Nur Izura Udzir and Nor Fazlida Binti Mohd Sani and Solahuddin bin Shamsuddin}, title = {Towards secure model for {SCADA} systems}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {60--64}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246111}, doi = {10.1109/CYBERSEC.2012.6246111}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/DaryabarDUSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/Dey12, author = {Somdip Dey}, title = {{SD-EI:} {A} cryptographic technique to encrypt images}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {28--32}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246123}, doi = {10.1109/CYBERSEC.2012.6246123}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/Dey12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/DezfouliDMSS12, author = {Farhood Norouzizadeh Dezfouli and Ali Dehghantanha and Ramlan Mahmoud and Nor Fazlida Binti Mohd Sani and Solahuddin bin Shamsuddin}, title = {Volatile memory acquisition using backup for forensic investigation}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {186--189}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246108}, doi = {10.1109/CYBERSEC.2012.6246108}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/DezfouliDMSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/DharamS12, author = {Ramya Dharam and Sajjan G. Shiva}, title = {Runtime monitors for tautology based {SQL} injection attacks}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {253--258}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246104}, doi = {10.1109/CYBERSEC.2012.6246104}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/DharamS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/EomKKC12, author = {Jung{-}Ho Eom and Nam{-}Uk Kim and Sung{-}Hwan Kim and Tai{-}Myoung Chung}, title = {Cyber military strategy for cyberspace superiority in cyber warfare}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {295--299}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246114}, doi = {10.1109/CYBERSEC.2012.6246114}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/EomKKC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/Evered12, author = {Mark Evered}, title = {A transitive access control model for dynamic roles and attributes}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {117--121}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246105}, doi = {10.1109/CYBERSEC.2012.6246105}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/Evered12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/Holm12, author = {Eric Holm}, title = {Identity crime: The challenges in the regulation of identity crime}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {176--179}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246078}, doi = {10.1109/CYBERSEC.2012.6246078}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/Holm12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/HowardK12, author = {Newton Howard and Sergey Kanareykin}, title = {Intention awareness in cyber security}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {6--11}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246079}, doi = {10.1109/CYBERSEC.2012.6246079}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/HowardK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/IbrahimAD12, author = {Mohammed Ibrahim and Mohd Taufik Abdullah and Ali Dehghantanha}, title = {VoIP evidence model: {A} new forensic method for investigating VoIP malicious attacks}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {201--206}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246116}, doi = {10.1109/CYBERSEC.2012.6246116}, timestamp = {Thu, 02 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/IbrahimAD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/IsaMMHSUD12, author = {Mohd Anuar Mat Isa and Jamalul{-}lail Ab Manan and Ramlan Mahmod and Habibah Hashim and Mar Yah Said and Nur Izura Udzir and Ali Dehghantanha}, title = {Finest authorizing member of common criteria certification}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {155--160}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246109}, doi = {10.1109/CYBERSEC.2012.6246109}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/IsaMMHSUD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/JalilR12, author = {Kamarularifin Abd. Jalil and Qatrunnada Binti Abdul Rahman}, title = {Multiple trusted devices authentication protocol for ubiquitous computing applications}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {225--229}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246093}, doi = {10.1109/CYBERSEC.2012.6246093}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/JalilR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/JuremiMS12, author = {Julia Juremi and Ramlan Mahmod and Salasiah Sulaiman}, title = {A proposal for improving {AES} S-box with rotation and key-dependent}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {38--42}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246172}, doi = {10.1109/CYBERSEC.2012.6246172}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/JuremiMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/KhanNOM12, author = {Sohail Khan and Mohammad Nauman and Abu Talib Othman and Shahrulniza Musa}, title = {How secure is your smartphone: An analysis of smartphone security mechanisms}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {76--81}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246082}, doi = {10.1109/CYBERSEC.2012.6246082}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/KhanNOM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/KhiabaniIM12, author = {Hamed Khiabani and Norbik Bashah Idris and Jamalul{-}lail Ab Manan}, title = {Leveraging Remote Attestation to enhance the Unified Trust Model for WSNs}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {139--143}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246090}, doi = {10.1109/CYBERSEC.2012.6246090}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/KhiabaniIM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/KhorasaniZadehIM12, author = {Hadi KhorasaniZadeh and Norbik Bashah Idris and Jamalul{-}lail Ab Manan}, title = {Distributed Intrusion Detection trust management through integrity and expertise evaluation}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {133--138}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246102}, doi = {10.1109/CYBERSEC.2012.6246102}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/KhorasaniZadehIM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/KimEC12, author = {Sung{-}Hwan Kim and Jung{-}Ho Eom and Tai{-}Myoung Chung}, title = {A study on optimization of security function for reducing vulnerabilities in {SCADA}}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {65--69}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246099}, doi = {10.1109/CYBERSEC.2012.6246099}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/KimEC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/KimJ12, author = {Kee{-}Won Kim and Jun{-}Cheol Jeon}, title = {Cellular semi-systolic Montgomery Multiplier on finite fields}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {1--5}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246094}, doi = {10.1109/CYBERSEC.2012.6246094}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/KimJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/KumarT12, author = {Sumit Kumar and Shashikala Tapaswi}, title = {A centralized detection and prevention technique against {ARP} poisoning}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {259--264}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246087}, doi = {10.1109/CYBERSEC.2012.6246087}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/KumarT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/MabutoV12, author = {Enos K. Mabuto and Hein S. Venter}, title = {User-generated digital forensic evidence in graphic design applications}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {195--200}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246107}, doi = {10.1109/CYBERSEC.2012.6246107}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/MabutoV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/MahboubianUSH12, author = {Mohammad Mahboubian and Nur Izura Udzir and Shamala Subramaniam and Nor Asilah Wati Abdul Hamid}, title = {An alert fusion model inspired by artificial immune system}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {317--322}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246083}, doi = {10.1109/CYBERSEC.2012.6246083}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/MahboubianUSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/ManaviMUA12, author = {Sina Manavi and Sadra Mohammadalian and Nur Izura Udzir and Azizol Abdullah}, title = {Hierarchical secure virtualization model for cloud}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {219--224}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246117}, doi = {10.1109/CYBERSEC.2012.6246117}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/ManaviMUA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/MougoueiRA12, author = {Davoud Mougouei and Wan Nurhayati Wan Ab. Rahman and Mohammad Moein Almasi}, title = {Evaluating fault tolerance in security requirements of web services}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {111--116}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246125}, doi = {10.1109/CYBERSEC.2012.6246125}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/MougoueiRA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/MurrayZF12, author = {Acklyn Murray and Sherali Zeadally and Angelyn Flowers}, title = {An assessment of {U.S.} legislation on cybersecurity}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {289--294}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246106}, doi = {10.1109/CYBERSEC.2012.6246106}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/MurrayZF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/NasirinejadY12, author = {Majid Nasirinejad and Alireza Ahmadian Yazdi}, title = {SASy username and password management on the cloud}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {242--246}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246084}, doi = {10.1109/CYBERSEC.2012.6246084}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/NasirinejadY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/NirkhiDT12, author = {S. M. Nirkhi and Rajiv V. Dharaskar and V. M. Thakre}, title = {Analysis of online messages for identity tracing in cybercrime investigation}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {300--305}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246131}, doi = {10.1109/CYBERSEC.2012.6246131}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/NirkhiDT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/NorJM12, author = {Fazli Bin Mat Nor and Kamarularifin Abd. Jalil and Jamalul{-}lail Ab Manan}, title = {An enhanced remote authentication scheme to mitigate man-in-the-browser attacks}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {271--276}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246086}, doi = {10.1109/CYBERSEC.2012.6246086}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/NorJM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/Owen12, author = {Gareth Owen}, title = {Automated forensic extraction of encryption keys using behavioral analysis}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {171--175}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246130}, doi = {10.1109/CYBERSEC.2012.6246130}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/Owen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/QuanZ12, author = {Xiaomei Quan and Hongbin Zhang}, title = {Copy-move forgery detection in digital images based on local dimension estimation}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {180--185}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246128}, doi = {10.1109/CYBERSEC.2012.6246128}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/QuanZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/RabaiJNAM12, author = {Latifa Ben Arfa Rabai and Mouna Jouini and Marwa Nafati and Anis Ben Aissa and Ali Mili}, title = {An economic model of security threats for cloud computing systems}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {100--105}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246112}, doi = {10.1109/CYBERSEC.2012.6246112}, timestamp = {Wed, 31 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/RabaiJNAM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/Rajaretnam12, author = {Thilla Rajaretnam}, title = {The problem to consent to the collection, use, and disclosure of personal information in cyberspace}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {283--288}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246124}, doi = {10.1109/CYBERSEC.2012.6246124}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/Rajaretnam12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/SabbaghK12, author = {Bilal Al Sabbagh and Stewart Kowalski}, title = {ST(CS)\({}^{\mbox{2}}\) - Featuring socio-technical cyber security warning systems}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {312--316}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246110}, doi = {10.1109/CYBERSEC.2012.6246110}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/SabbaghK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/SalehianMU12, author = {Solmaz Salehian and Farzaneh Masoumiyan and Nur Izura Udzir}, title = {Energy-efficient intrusion detection in Wireless Sensor Network}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {207--212}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246085}, doi = {10.1109/CYBERSEC.2012.6246085}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/SalehianMU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/SamaraA12, author = {Ghassan Samara and Wafaa A. H. Ali Alsalihy}, title = {A new security mechanism for vehicular communication networks}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {18--22}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246119}, doi = {10.1109/CYBERSEC.2012.6246119}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/SamaraA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/SavariM12, author = {Maryam Savari and Mohammad Montazerolzohour}, title = {All about encryption in smart card}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {54--59}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246122}, doi = {10.1109/CYBERSEC.2012.6246122}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/SavariM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/SavariMY12, author = {Maryam Savari and Mohammad Montazerolzohour and Eng{-}Thiam Yeoh}, title = {Combining encryption methods in multipurpose smart card}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {43--48}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246120}, doi = {10.1109/CYBERSEC.2012.6246120}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/SavariMY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/SavariMY12a, author = {Maryam Savari and Mohammad Montazerolzohour and Eng{-}Thiam Yeoh}, title = {Comparison of {ECC} and {RSA} algorithm in multipurpose smart card application}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {49--53}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246121}, doi = {10.1109/CYBERSEC.2012.6246121}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/SavariMY12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/SmitSO12, author = {Liam Smit and Adrie Stander and Jacques Ophoff}, title = {Investigating the accuracy of base station information for estimating cellphone location}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {88--93}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246171}, doi = {10.1109/CYBERSEC.2012.6246171}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/SmitSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/SuganyaDeviMS12, author = {K. SuganyaDevi and N. Malmurugan and R. Sivakumar}, title = {{OF-SMED:} An optimal foreground detection method in surveillance system for traffic monitoring}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {12--17}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246126}, doi = {10.1109/CYBERSEC.2012.6246126}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/SuganyaDeviMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/SulaimanMJ12, author = {Salasiah Sulaiman and Zaiton Muda and Julia Juremi}, title = {The new approach of Rijndael key schedule}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {23--27}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246100}, doi = {10.1109/CYBERSEC.2012.6246100}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/SulaimanMJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/Tamjidyamcholo12, author = {Alireza Tamjidyamcholo}, title = {Information security risk reduction based on genetic algorithm}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {122--127}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246088}, doi = {10.1109/CYBERSEC.2012.6246088}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/Tamjidyamcholo12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/TanhaTAH12, author = {Maryam Tanha and Seyed Dawood Sajjadi Torshizi and Mohd Taufik Abdullah and Fazirulhisyam Hashim}, title = {An overview of attacks against digital watermarking and their respective countermeasures}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {265--270}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246095}, doi = {10.1109/CYBERSEC.2012.6246095}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/TanhaTAH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/TehYT12, author = {Pin Shen Teh and Shigang Yue and Andrew Beng Jin Teoh}, title = {Improving keystroke dynamics authentication system via multiple feature fusion scheme}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {277--282}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246096}, doi = {10.1109/CYBERSEC.2012.6246096}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/TehYT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/YassinUMAA12, author = {Warusia Yassin and Nur Izura Udzir and Zaiton Muda and Azizol Abdullah and Mohd Taufik Abdullah}, title = {A Cloud-based Intrusion Detection Service framework}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {213--218}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246098}, doi = {10.1109/CYBERSEC.2012.6246098}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/YassinUMAA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/YazidFASS12, author = {S. A. I. Yazid and M. A. Faizal and Rabiah Ahmad and S. Shahrin and Solahuddin Shamsuddin}, title = {Enhancement of Asset value classification for Mobile devices}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {106--110}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246097}, doi = {10.1109/CYBERSEC.2012.6246097}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/YazidFASS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/ZhuD12, author = {Caiyi Zhu and Xiangkun Dai}, title = {Model of trust management based on finite state machine}, booktitle = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, pages = {161--164}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CyberSec.2012.6246115}, doi = {10.1109/CYBERSEC.2012.6246115}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/ZhuD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cybersec/2012, title = {2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6238218/proceeding}, isbn = {978-1-4673-1425-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.