Search dblp for Publications

export results for "stream:conf/cybersec:"

 download as .bib file

@inproceedings{DBLP:conf/cybersec/AbdullahH15,
  author       = {Norhaiza Ya Abdullah and
                  Herny Ramadhani Mohd Husny Hamid},
  title        = {Folder Lock by Using Multimodal Biometric: Fingerprint and Signature
                  Authentication},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {140--145},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.35},
  doi          = {10.1109/CYBERSEC.2015.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/AbdullahH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/AkiyamaOKS15,
  author       = {Takumi Akiyama and
                  Kazuya Otani and
                  Yoshio Kakizaki and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Evaluation of a Risk-Based Management Method for Online Accounts},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {52--57},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.19},
  doi          = {10.1109/CYBERSEC.2015.19},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/AkiyamaOKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/AlamKBF15,
  author       = {Delwar Alam and
                  Md. Alamgir Kabir and
                  Touhid Bhuiyan and
                  Tanjila Farah},
  title        = {A Case Study of {SQL} Injection Vulnerabilities Assessment of .bd
                  Domain Web Applications},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {73--77},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.23},
  doi          = {10.1109/CYBERSEC.2015.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/AlamKBF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/AlkalbaniMMA15,
  author       = {Abdullah Said Alkalbani and
                  Teddy Mantoro and
                  Sardjoeni Moedjiono and
                  Media A. Ayu},
  title        = {Hybrid Solution for Secured and Energy Aware Routing Path in Wireless
                  Sensor Networks},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {78--83},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.24},
  doi          = {10.1109/CYBERSEC.2015.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/AlkalbaniMMA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/AllawiHA15,
  author       = {Mohammad Ahmad Abu Allawi and
                  Ali Hadi and
                  Arafat Awajan},
  title        = {{MLDED:} Multi-layer Data Exfiltration Detection System},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {107--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.29},
  doi          = {10.1109/CYBERSEC.2015.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/AllawiHA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/AzizMN15,
  author       = {Normaziah Abdul Aziz and
                  Fakhrulrazi Mokhti and
                  M. Nadhar M. Nozri},
  title        = {Mobile Device Forensics: Extracting and Analysing Data from an Android-Based
                  Smartphone},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {123--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.32},
  doi          = {10.1109/CYBERSEC.2015.32},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/AzizMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/DanuputriMH15,
  author       = {Chyquitha Danuputri and
                  Teddy Mantoro and
                  Mardi Hardjianto},
  title        = {Data Security Using {LSB} Steganography and Vigenere Chiper in an
                  Android Environment},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {22--27},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.14},
  doi          = {10.1109/CYBERSEC.2015.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/DanuputriMH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/HamidA15,
  author       = {Herny Ramadhani Mohd Husny Hamid and
                  Norhaiza Ya Abdullah},
  title        = {Physical Authentication Using Random Number Generated {(RNG)} Keypad
                  Based on One Time Pad {(OTP)} Concept},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {135--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.34},
  doi          = {10.1109/CYBERSEC.2015.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/HamidA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/HamidKA15,
  author       = {Herny Ramadhani Mohd Husny Hamid and
                  Megat Ahmad Izzat bin Megat Ahmad Kamil and
                  Norhaiza Ya Abdullah},
  title        = {Portable Toolkit for Penetration Testing and Firewall Configuration},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {90--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.26},
  doi          = {10.1109/CYBERSEC.2015.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/HamidKA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/HashimotoHMKKYU15,
  author       = {Kazuki Hashimoto and
                  Hiroyuki Hiruma and
                  Takashi Matsumoto and
                  Kosetus Kayama and
                  Yoshio Kaikizaki and
                  Hiroshi Yamaki and
                  Tetsutaro Uehara and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Development of Intellectual Network Forensic System {LIFT} against
                  Targeted Attacks},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {16--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.13},
  doi          = {10.1109/CYBERSEC.2015.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/HashimotoHMKKYU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/ImranAQ15,
  author       = {Mohammad Imran and
                  Muhammad Tanvir Afzal and
                  Muhammad Abdul Qadir},
  title        = {Similarity-Based Malware Classification Using Hidden Markov Model},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {129--134},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.33},
  doi          = {10.1109/CYBERSEC.2015.33},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/ImranAQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/JatikusumoHFU15,
  author       = {Dwiki Jatikusumo and
                  Hanny Hikmayanti H. and
                  Feriadi and
                  Wendi Usino},
  title        = {Securing Official Account Twitter Using Social Media Management System:
                  Accuracy of the Data and Information Publish with Twitter},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {11--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.12},
  doi          = {10.1109/CYBERSEC.2015.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/JatikusumoHFU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/KamarudinMWS15,
  author       = {Muhammad Hilmi Kamarudin and
                  Carsten Maple and
                  Tim Watson and
                  Hasliza Sofian},
  title        = {Packet Header Intrusion Detection with Binary Logistic Regression
                  Approach in Detecting {R2L} and {U2R} Attacks},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {101--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.28},
  doi          = {10.1109/CYBERSEC.2015.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/KamarudinMWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/KoizumiS15,
  author       = {Ryohei Koizumi and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Study on Countermeasures Using Mitigation Software against Vulnerability
                  Attacks},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {28--33},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.15},
  doi          = {10.1109/CYBERSEC.2015.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/KoizumiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/Laoufi15,
  author       = {Nabil Laoufi},
  title        = {From Risk Analysis to the Expression of Security Requirements for
                  Systems Information},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {84--89},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.25},
  doi          = {10.1109/CYBERSEC.2015.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/Laoufi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/LuthfiP15,
  author       = {Ahmad Luthfi and
                  Yudi Prayudi},
  title        = {Process Model of Digital Forensics Readiness Scheme {(DFRS)} as a
                  Recommendation of Digital Evidence Preservation},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {117--122},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.31},
  doi          = {10.1109/CYBERSEC.2015.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/LuthfiP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/MantoroWAU15,
  author       = {Teddy Mantoro and
                  M. Iman Wahyudi and
                  Media A. Ayu and
                  Wendi Usino},
  title        = {Real-Time Printed Document Authentication Using Watermarked {QR} Code},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {68--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.22},
  doi          = {10.1109/CYBERSEC.2015.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/MantoroWAU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/NakagawaTS15,
  author       = {Naoto Nakagawa and
                  Yoshimi Teshigawara and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Development of a Detection and Responding System for Malware Communications
                  by Using OpenFlow and Its Evaluation},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {46--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.18},
  doi          = {10.1109/CYBERSEC.2015.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/NakagawaTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/PersadhaWY15,
  author       = {P. D. Persadha and
                  A. A. Waskita and
                  S. Yazid},
  title        = {Comparative Study of Cyber Security Policies among Malaysia, Australia,
                  Indonesia: {A} Responsibility Perspective},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {146--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.36},
  doi          = {10.1109/CYBERSEC.2015.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/PersadhaWY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/RaghavanR15,
  author       = {Sriram Raghavan and
                  S. V. Raghavan},
  title        = {Estimating Posterior Probabilities to Identify Breach Points during
                  Cyber-attacks},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {113--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.30},
  doi          = {10.1109/CYBERSEC.2015.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/RaghavanR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/SatoSHIS15,
  author       = {Makoto Sato and
                  Akihiko Sugimoto and
                  Naoki Hayashi and
                  Yoshiaki Isobe and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Proposal of a Method for Identifying the Infection Route for Targeted
                  Attacks Based on Malware Behavior in a Network},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {40--45},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.17},
  doi          = {10.1109/CYBERSEC.2015.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/SatoSHIS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/SetiawanSS15,
  author       = {Ahmad Budi Setiawan and
                  Aries Syamsudin and
                  Ashwin Sasongko Sastrosubroto},
  title        = {Implementation of Secure Smart Grid as Critical Information Infrastructure
                  in Indonesia: {A} Case Study in Smart Grid Electricity},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {34--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.16},
  doi          = {10.1109/CYBERSEC.2015.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/SetiawanSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/Styugin15,
  author       = {Mikhail Styugin},
  title        = {Analysis of Awareness Structures in Information Security Systems},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {6--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.11},
  doi          = {10.1109/CYBERSEC.2015.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/Styugin15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/TamimiNK15,
  author       = {Ali Tamimi and
                  D. Subbaram Naidu and
                  Sanaz Kavianpour},
  title        = {An Intrusion Detection System Based on {NSGA-II} Algorithm},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {58--61},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.20},
  doi          = {10.1109/CYBERSEC.2015.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/TamimiNK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/TranN15,
  author       = {Manh Cong Tran and
                  Yasuhiro Nakamura},
  title        = {An Approach to Mine Suspicious Domain Based on {HTTP} Automated Software
                  Communication Behavior},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.10},
  doi          = {10.1109/CYBERSEC.2015.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/TranN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/WahanggaraP15,
  author       = {Victor Wahanggara and
                  Yudi Prayudi},
  title        = {Malware Detection through Call System on Android Smartphone Using
                  Vector Machine Method},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {62--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.21},
  doi          = {10.1109/CYBERSEC.2015.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/WahanggaraP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/YoonPL15,
  author       = {Hyoseok Yoon and
                  Se{-}Ho Park and
                  Kyung{-}Taek Lee},
  title        = {Exploiting Ambient Light Sensor for Authentication on Wearable Devices},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {95--100},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.27},
  doi          = {10.1109/CYBERSEC.2015.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/YoonPL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cybersec/2015,
  title        = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7489990/proceeding},
  isbn         = {978-1-4673-8499-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/Geepalla14,
  author       = {Emsaieb Geepalla},
  title        = {Comparison between Alloy and Timed Automata for modelling and analysing
                  of access control specifications},
  booktitle    = {Third International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1,
                  2014},
  pages        = {16--21},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberSec.2014.6913965},
  doi          = {10.1109/CYBERSEC.2014.6913965},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/Geepalla14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/HassanEZ14,
  author       = {Zakaria Zakaria Hassan and
                  Talaat A. Elgarf and
                  Abdelhalim Zekry},
  title        = {Modifying authentication techniques in mobile communication systems},
  booktitle    = {Third International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1,
                  2014},
  pages        = {38--44},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberSec.2014.6913969},
  doi          = {10.1109/CYBERSEC.2014.6913969},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/HassanEZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/HolmM14,
  author       = {Eric Holm and
                  Geraldine Mackenzie},
  title        = {The importance of mandatory data breach notification to identity crime},
  booktitle    = {Third International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1,
                  2014},
  pages        = {6--11},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberSec.2014.6913963},
  doi          = {10.1109/CYBERSEC.2014.6913963},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/HolmM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/KaddourTNNM14,
  author       = {M. Kaddour and
                  Nourdine Ait Tmazirte and
                  Maan El Badaoui El Najjar and
                  Z. Naja and
                  Nazih Moubayed},
  title        = {Autonomous integrity monitoring for {GNSS} localization using informational
                  approach and iono-free measurements},
  booktitle    = {Third International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1,
                  2014},
  pages        = {64--69},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberSec.2014.6913973},
  doi          = {10.1109/CYBERSEC.2014.6913973},
  timestamp    = {Fri, 19 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/KaddourTNNM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/KebandeV14,
  author       = {Victor R. Kebande and
                  Hein S. Venter},
  title        = {A cognitive approach for botnet detection using Artificial Immune
                  System in the cloud},
  booktitle    = {Third International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1,
                  2014},
  pages        = {52--57},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberSec.2014.6913971},
  doi          = {10.1109/CYBERSEC.2014.6913971},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/KebandeV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/MohamedM14,
  author       = {Iman Ahmeid Mohamed and
                  Azizah Bt Abdul Manaf},
  title        = {An enhancement of traceability model based-on scenario for digital
                  forensic investigation process},
  booktitle    = {Third International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1,
                  2014},
  pages        = {12--15},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberSec.2014.6913964},
  doi          = {10.1109/CYBERSEC.2014.6913964},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/MohamedM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/MohammadAES14,
  author       = {Omer K. Jasim Mohammad and
                  Safia Abbas and
                  El{-}Sayed M. El{-}Horbaty and
                  Abdel{-}Badeeh M. Salem},
  title        = {Statistical analysis for random bits generation on quantum key distribution},
  booktitle    = {Third International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1,
                  2014},
  pages        = {45--51},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberSec.2014.6913970},
  doi          = {10.1109/CYBERSEC.2014.6913970},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/MohammadAES14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/RjaibiGRA14,
  author       = {Neila Rjaibi and
                  Nawel Gannouni and
                  Latifa Ben Arfa Rabai and
                  Anis Ben Aissa},
  title        = {Modeling the propagation of security threats: An e-learning case study},
  booktitle    = {Third International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1,
                  2014},
  pages        = {32--37},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberSec.2014.6913968},
  doi          = {10.1109/CYBERSEC.2014.6913968},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/RjaibiGRA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/Watney14,
  author       = {Murdoch Watney},
  title        = {Challenges pertaining to cyber war under international law},
  booktitle    = {Third International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1,
                  2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberSec.2014.6913962},
  doi          = {10.1109/CYBERSEC.2014.6913962},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/Watney14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/YusoffMAD14,
  author       = {Mohd Najwadi Yusoff and
                  Ramlan Mahmod and
                  Mohd Taufik Abdullah and
                  Ali Dehghantanha},
  title        = {Mobile forensic data acquisition in Firefox {OS}},
  booktitle    = {Third International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1,
                  2014},
  pages        = {27--31},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberSec.2014.6913967},
  doi          = {10.1109/CYBERSEC.2014.6913967},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/YusoffMAD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/YusoffMDA14,
  author       = {Mohd Najwadi Yusoff and
                  Ramlan Mahmod and
                  Ali Dehghantanha and
                  Mohd Taufik Abdullah},
  title        = {An approach for forensic investigation in Firefox {OS}},
  booktitle    = {Third International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1,
                  2014},
  pages        = {22--26},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberSec.2014.6913966},
  doi          = {10.1109/CYBERSEC.2014.6913966},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/YusoffMDA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/ZoukaH14,
  author       = {Heshem A. El Zouka and
                  Mustafa M. Hosni},
  title        = {On the power of quantum cryptography and computers},
  booktitle    = {Third International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1,
                  2014},
  pages        = {58--63},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberSec.2014.6913972},
  doi          = {10.1109/CYBERSEC.2014.6913972},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/ZoukaH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cybersec/2014,
  title        = {Third International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1,
                  2014},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6908325/proceeding},
  isbn         = {978-1-4799-3905-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/AL-AmroE12,
  author       = {Huyam Al{-}Amro and
                  Eyas El{-}Qawasmeh},
  title        = {Discovering security vulnerabilities and leaks in {ASP.NET} websites},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {329--333},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246175},
  doi          = {10.1109/CYBERSEC.2012.6246175},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/AL-AmroE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/AbdullahY12,
  author       = {Mohammad Faiz Liew Abdullah and
                  A. Z. Yonis},
  title        = {Performance of {LTE} Release 8 and Release 10 in wireless communications},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {236--241},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246127},
  doi          = {10.1109/CYBERSEC.2012.6246127},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/AbdullahY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/AbdulrazegNB12,
  author       = {Ala A. Abdulrazeg and
                  Norita Md Norwawi and
                  Nurlida Basir},
  title        = {Security metrics to improve misuse case model},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {94--99},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246129},
  doi          = {10.1109/CYBERSEC.2012.6246129},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/AbdulrazegNB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/AbusukhonT12,
  author       = {Ahmad Abusukhon and
                  Mohammad Talib},
  title        = {A novel network security algorithm based on private key encryption},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {33--37},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246080},
  doi          = {10.1109/CYBERSEC.2012.6246080},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/AbusukhonT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/AhmadYS12,
  author       = {Rabiah Ahmad and
                  Zahri Yunos and
                  Shahrin Sahib},
  title        = {Understanding cyber terrorism: The grounded theory method applied},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {323--328},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246081},
  doi          = {10.1109/CYBERSEC.2012.6246081},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/AhmadYS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/AlZainSP12,
  author       = {Mohammed A. Alzain and
                  Ben Soh and
                  Eric Pardede},
  title        = {A New approach using redundancy technique to improve security in cloud
                  computing},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {230--235},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246174},
  doi          = {10.1109/CYBERSEC.2012.6246174},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/AlZainSP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/AliYA12,
  author       = {Fakariah Hani Mohd Ali and
                  Rozita Yunos and
                  Mohd Azuan Mohamad Alias},
  title        = {Simple port knocking method: Against {TCP} replay attack and port
                  scanning},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {247--252},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246118},
  doi          = {10.1109/CYBERSEC.2012.6246118},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/AliYA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/AlkhalifahD12,
  author       = {Ali Alkhalifah and
                  John D'Ambra},
  title        = {The role of Identity Management Systems in enhancing protection of
                  user privacy},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {144--149},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246091},
  doi          = {10.1109/CYBERSEC.2012.6246091},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/AlkhalifahD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/AraboE12,
  author       = {Abdullahi Arabo and
                  Fadi El{-}Moussa},
  title        = {Security framework for smart devices},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {82--87},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246103},
  doi          = {10.1109/CYBERSEC.2012.6246103},
  timestamp    = {Mon, 02 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/AraboE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/AzmiZJ12,
  author       = {Ida Madieha bt. Abdul Ghani Azmi and
                  Sonny Zulhuda and
                  Sigit Puspito Wigati Jarot},
  title        = {Data breach on the critical information infrastructures: Lessons from
                  the Wikileaks},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {306--311},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246173},
  doi          = {10.1109/CYBERSEC.2012.6246173},
  timestamp    = {Fri, 15 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/AzmiZJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/AzuwaASS12,
  author       = {M. P. Azuwa and
                  Rabiah Ahmad and
                  Shahrin Sahib and
                  Solahuddin Shamsuddin},
  title        = {A propose technical security metrics model for {SCADA} systems},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {70--75},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246089},
  doi          = {10.1109/CYBERSEC.2012.6246089},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/AzuwaASS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/BindahmanZZ12,
  author       = {Salah Bindahman and
                  Nasriah Zakaria and
                  Norsaadah Zakaria},
  title        = {3D body scanning technology: Privacy and ethical issues},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {150--154},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246113},
  doi          = {10.1109/CYBERSEC.2012.6246113},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/BindahmanZZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/CanedoJCA12,
  author       = {Edna Dias Canedo and
                  Rafael Tim{\'{o}}teo de Sousa J{\'{u}}nior and
                  Rhandy Rafhael de Carvalho and
                  Robson de Oliveira Albuquerque},
  title        = {Trust model for private cloud},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {128--132},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246101},
  doi          = {10.1109/CYBERSEC.2012.6246101},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/CanedoJCA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/DaiZG12,
  author       = {Xiangkun Dai and
                  Caiyi Zhu and
                  Yucui Guo},
  title        = {{P2P} dynamic trust management system based on trust network},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {165--170},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246132},
  doi          = {10.1109/CYBERSEC.2012.6246132},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/DaiZG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/DamshenasDMS12,
  author       = {Mohsen Damshenas and
                  Ali Dehghantanha and
                  Ramlan Mahmoud and
                  Solahuddin bin Shamsuddin},
  title        = {Forensics investigation challenges in cloud computing environments},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {190--194},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246092},
  doi          = {10.1109/CYBERSEC.2012.6246092},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/DamshenasDMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/DaryabarDUSS12,
  author       = {Farid Daryabar and
                  Ali Dehghantanha and
                  Nur Izura Udzir and
                  Nor Fazlida Binti Mohd Sani and
                  Solahuddin bin Shamsuddin},
  title        = {Towards secure model for {SCADA} systems},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {60--64},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246111},
  doi          = {10.1109/CYBERSEC.2012.6246111},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/DaryabarDUSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/Dey12,
  author       = {Somdip Dey},
  title        = {{SD-EI:} {A} cryptographic technique to encrypt images},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {28--32},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246123},
  doi          = {10.1109/CYBERSEC.2012.6246123},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/Dey12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/DezfouliDMSS12,
  author       = {Farhood Norouzizadeh Dezfouli and
                  Ali Dehghantanha and
                  Ramlan Mahmoud and
                  Nor Fazlida Binti Mohd Sani and
                  Solahuddin bin Shamsuddin},
  title        = {Volatile memory acquisition using backup for forensic investigation},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {186--189},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246108},
  doi          = {10.1109/CYBERSEC.2012.6246108},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/DezfouliDMSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/DharamS12,
  author       = {Ramya Dharam and
                  Sajjan G. Shiva},
  title        = {Runtime monitors for tautology based {SQL} injection attacks},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {253--258},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246104},
  doi          = {10.1109/CYBERSEC.2012.6246104},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/DharamS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/EomKKC12,
  author       = {Jung{-}Ho Eom and
                  Nam{-}Uk Kim and
                  Sung{-}Hwan Kim and
                  Tai{-}Myoung Chung},
  title        = {Cyber military strategy for cyberspace superiority in cyber warfare},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {295--299},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246114},
  doi          = {10.1109/CYBERSEC.2012.6246114},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/EomKKC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/Evered12,
  author       = {Mark Evered},
  title        = {A transitive access control model for dynamic roles and attributes},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {117--121},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246105},
  doi          = {10.1109/CYBERSEC.2012.6246105},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/Evered12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/Holm12,
  author       = {Eric Holm},
  title        = {Identity crime: The challenges in the regulation of identity crime},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {176--179},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246078},
  doi          = {10.1109/CYBERSEC.2012.6246078},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/Holm12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/HowardK12,
  author       = {Newton Howard and
                  Sergey Kanareykin},
  title        = {Intention awareness in cyber security},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {6--11},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246079},
  doi          = {10.1109/CYBERSEC.2012.6246079},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/HowardK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/IbrahimAD12,
  author       = {Mohammed Ibrahim and
                  Mohd Taufik Abdullah and
                  Ali Dehghantanha},
  title        = {VoIP evidence model: {A} new forensic method for investigating VoIP
                  malicious attacks},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {201--206},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246116},
  doi          = {10.1109/CYBERSEC.2012.6246116},
  timestamp    = {Thu, 02 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/IbrahimAD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/IsaMMHSUD12,
  author       = {Mohd Anuar Mat Isa and
                  Jamalul{-}lail Ab Manan and
                  Ramlan Mahmod and
                  Habibah Hashim and
                  Mar Yah Said and
                  Nur Izura Udzir and
                  Ali Dehghantanha},
  title        = {Finest authorizing member of common criteria certification},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {155--160},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246109},
  doi          = {10.1109/CYBERSEC.2012.6246109},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/IsaMMHSUD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/JalilR12,
  author       = {Kamarularifin Abd. Jalil and
                  Qatrunnada Binti Abdul Rahman},
  title        = {Multiple trusted devices authentication protocol for ubiquitous computing
                  applications},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {225--229},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246093},
  doi          = {10.1109/CYBERSEC.2012.6246093},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/JalilR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/JuremiMS12,
  author       = {Julia Juremi and
                  Ramlan Mahmod and
                  Salasiah Sulaiman},
  title        = {A proposal for improving {AES} S-box with rotation and key-dependent},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {38--42},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246172},
  doi          = {10.1109/CYBERSEC.2012.6246172},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/JuremiMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/KhanNOM12,
  author       = {Sohail Khan and
                  Mohammad Nauman and
                  Abu Talib Othman and
                  Shahrulniza Musa},
  title        = {How secure is your smartphone: An analysis of smartphone security
                  mechanisms},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {76--81},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246082},
  doi          = {10.1109/CYBERSEC.2012.6246082},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/KhanNOM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/KhiabaniIM12,
  author       = {Hamed Khiabani and
                  Norbik Bashah Idris and
                  Jamalul{-}lail Ab Manan},
  title        = {Leveraging Remote Attestation to enhance the Unified Trust Model for
                  WSNs},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {139--143},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246090},
  doi          = {10.1109/CYBERSEC.2012.6246090},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/KhiabaniIM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/KhorasaniZadehIM12,
  author       = {Hadi KhorasaniZadeh and
                  Norbik Bashah Idris and
                  Jamalul{-}lail Ab Manan},
  title        = {Distributed Intrusion Detection trust management through integrity
                  and expertise evaluation},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {133--138},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246102},
  doi          = {10.1109/CYBERSEC.2012.6246102},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/KhorasaniZadehIM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/KimEC12,
  author       = {Sung{-}Hwan Kim and
                  Jung{-}Ho Eom and
                  Tai{-}Myoung Chung},
  title        = {A study on optimization of security function for reducing vulnerabilities
                  in {SCADA}},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {65--69},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246099},
  doi          = {10.1109/CYBERSEC.2012.6246099},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/KimEC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/KimJ12,
  author       = {Kee{-}Won Kim and
                  Jun{-}Cheol Jeon},
  title        = {Cellular semi-systolic Montgomery Multiplier on finite fields},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246094},
  doi          = {10.1109/CYBERSEC.2012.6246094},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/KimJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/KumarT12,
  author       = {Sumit Kumar and
                  Shashikala Tapaswi},
  title        = {A centralized detection and prevention technique against {ARP} poisoning},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {259--264},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246087},
  doi          = {10.1109/CYBERSEC.2012.6246087},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/KumarT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/MabutoV12,
  author       = {Enos K. Mabuto and
                  Hein S. Venter},
  title        = {User-generated digital forensic evidence in graphic design applications},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {195--200},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246107},
  doi          = {10.1109/CYBERSEC.2012.6246107},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/MabutoV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/MahboubianUSH12,
  author       = {Mohammad Mahboubian and
                  Nur Izura Udzir and
                  Shamala Subramaniam and
                  Nor Asilah Wati Abdul Hamid},
  title        = {An alert fusion model inspired by artificial immune system},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {317--322},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246083},
  doi          = {10.1109/CYBERSEC.2012.6246083},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/MahboubianUSH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/ManaviMUA12,
  author       = {Sina Manavi and
                  Sadra Mohammadalian and
                  Nur Izura Udzir and
                  Azizol Abdullah},
  title        = {Hierarchical secure virtualization model for cloud},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {219--224},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246117},
  doi          = {10.1109/CYBERSEC.2012.6246117},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/ManaviMUA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/MougoueiRA12,
  author       = {Davoud Mougouei and
                  Wan Nurhayati Wan Ab. Rahman and
                  Mohammad Moein Almasi},
  title        = {Evaluating fault tolerance in security requirements of web services},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {111--116},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246125},
  doi          = {10.1109/CYBERSEC.2012.6246125},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/MougoueiRA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/MurrayZF12,
  author       = {Acklyn Murray and
                  Sherali Zeadally and
                  Angelyn Flowers},
  title        = {An assessment of {U.S.} legislation on cybersecurity},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {289--294},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246106},
  doi          = {10.1109/CYBERSEC.2012.6246106},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/MurrayZF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/NasirinejadY12,
  author       = {Majid Nasirinejad and
                  Alireza Ahmadian Yazdi},
  title        = {SASy username and password management on the cloud},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {242--246},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246084},
  doi          = {10.1109/CYBERSEC.2012.6246084},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/NasirinejadY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/NirkhiDT12,
  author       = {S. M. Nirkhi and
                  Rajiv V. Dharaskar and
                  V. M. Thakre},
  title        = {Analysis of online messages for identity tracing in cybercrime investigation},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {300--305},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246131},
  doi          = {10.1109/CYBERSEC.2012.6246131},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/NirkhiDT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/NorJM12,
  author       = {Fazli Bin Mat Nor and
                  Kamarularifin Abd. Jalil and
                  Jamalul{-}lail Ab Manan},
  title        = {An enhanced remote authentication scheme to mitigate man-in-the-browser
                  attacks},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {271--276},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246086},
  doi          = {10.1109/CYBERSEC.2012.6246086},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/NorJM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/Owen12,
  author       = {Gareth Owen},
  title        = {Automated forensic extraction of encryption keys using behavioral
                  analysis},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {171--175},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246130},
  doi          = {10.1109/CYBERSEC.2012.6246130},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/Owen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/QuanZ12,
  author       = {Xiaomei Quan and
                  Hongbin Zhang},
  title        = {Copy-move forgery detection in digital images based on local dimension
                  estimation},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {180--185},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246128},
  doi          = {10.1109/CYBERSEC.2012.6246128},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/QuanZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/RabaiJNAM12,
  author       = {Latifa Ben Arfa Rabai and
                  Mouna Jouini and
                  Marwa Nafati and
                  Anis Ben Aissa and
                  Ali Mili},
  title        = {An economic model of security threats for cloud computing systems},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {100--105},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246112},
  doi          = {10.1109/CYBERSEC.2012.6246112},
  timestamp    = {Wed, 31 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/RabaiJNAM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/Rajaretnam12,
  author       = {Thilla Rajaretnam},
  title        = {The problem to consent to the collection, use, and disclosure of personal
                  information in cyberspace},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {283--288},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246124},
  doi          = {10.1109/CYBERSEC.2012.6246124},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/Rajaretnam12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/SabbaghK12,
  author       = {Bilal Al Sabbagh and
                  Stewart Kowalski},
  title        = {ST(CS)\({}^{\mbox{2}}\) - Featuring socio-technical cyber security
                  warning systems},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {312--316},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246110},
  doi          = {10.1109/CYBERSEC.2012.6246110},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/SabbaghK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/SalehianMU12,
  author       = {Solmaz Salehian and
                  Farzaneh Masoumiyan and
                  Nur Izura Udzir},
  title        = {Energy-efficient intrusion detection in Wireless Sensor Network},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {207--212},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246085},
  doi          = {10.1109/CYBERSEC.2012.6246085},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/SalehianMU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/SamaraA12,
  author       = {Ghassan Samara and
                  Wafaa A. H. Ali Alsalihy},
  title        = {A new security mechanism for vehicular communication networks},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {18--22},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246119},
  doi          = {10.1109/CYBERSEC.2012.6246119},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/SamaraA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/SavariM12,
  author       = {Maryam Savari and
                  Mohammad Montazerolzohour},
  title        = {All about encryption in smart card},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {54--59},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246122},
  doi          = {10.1109/CYBERSEC.2012.6246122},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/SavariM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/SavariMY12,
  author       = {Maryam Savari and
                  Mohammad Montazerolzohour and
                  Eng{-}Thiam Yeoh},
  title        = {Combining encryption methods in multipurpose smart card},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {43--48},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246120},
  doi          = {10.1109/CYBERSEC.2012.6246120},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/SavariMY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/SavariMY12a,
  author       = {Maryam Savari and
                  Mohammad Montazerolzohour and
                  Eng{-}Thiam Yeoh},
  title        = {Comparison of {ECC} and {RSA} algorithm in multipurpose smart card
                  application},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {49--53},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246121},
  doi          = {10.1109/CYBERSEC.2012.6246121},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/SavariMY12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/SmitSO12,
  author       = {Liam Smit and
                  Adrie Stander and
                  Jacques Ophoff},
  title        = {Investigating the accuracy of base station information for estimating
                  cellphone location},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {88--93},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246171},
  doi          = {10.1109/CYBERSEC.2012.6246171},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/SmitSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/SuganyaDeviMS12,
  author       = {K. SuganyaDevi and
                  N. Malmurugan and
                  R. Sivakumar},
  title        = {{OF-SMED:} An optimal foreground detection method in surveillance
                  system for traffic monitoring},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {12--17},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246126},
  doi          = {10.1109/CYBERSEC.2012.6246126},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/SuganyaDeviMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/SulaimanMJ12,
  author       = {Salasiah Sulaiman and
                  Zaiton Muda and
                  Julia Juremi},
  title        = {The new approach of Rijndael key schedule},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {23--27},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246100},
  doi          = {10.1109/CYBERSEC.2012.6246100},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/SulaimanMJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/Tamjidyamcholo12,
  author       = {Alireza Tamjidyamcholo},
  title        = {Information security risk reduction based on genetic algorithm},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {122--127},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246088},
  doi          = {10.1109/CYBERSEC.2012.6246088},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/Tamjidyamcholo12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/TanhaTAH12,
  author       = {Maryam Tanha and
                  Seyed Dawood Sajjadi Torshizi and
                  Mohd Taufik Abdullah and
                  Fazirulhisyam Hashim},
  title        = {An overview of attacks against digital watermarking and their respective
                  countermeasures},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {265--270},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246095},
  doi          = {10.1109/CYBERSEC.2012.6246095},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/TanhaTAH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/TehYT12,
  author       = {Pin Shen Teh and
                  Shigang Yue and
                  Andrew Beng Jin Teoh},
  title        = {Improving keystroke dynamics authentication system via multiple feature
                  fusion scheme},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {277--282},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246096},
  doi          = {10.1109/CYBERSEC.2012.6246096},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/TehYT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/YassinUMAA12,
  author       = {Warusia Yassin and
                  Nur Izura Udzir and
                  Zaiton Muda and
                  Azizol Abdullah and
                  Mohd Taufik Abdullah},
  title        = {A Cloud-based Intrusion Detection Service framework},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {213--218},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246098},
  doi          = {10.1109/CYBERSEC.2012.6246098},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/YassinUMAA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/YazidFASS12,
  author       = {S. A. I. Yazid and
                  M. A. Faizal and
                  Rabiah Ahmad and
                  S. Shahrin and
                  Solahuddin Shamsuddin},
  title        = {Enhancement of Asset value classification for Mobile devices},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {106--110},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246097},
  doi          = {10.1109/CYBERSEC.2012.6246097},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/YazidFASS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/ZhuD12,
  author       = {Caiyi Zhu and
                  Xiangkun Dai},
  title        = {Model of trust management based on finite state machine},
  booktitle    = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  pages        = {161--164},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSec.2012.6246115},
  doi          = {10.1109/CYBERSEC.2012.6246115},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/ZhuD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cybersec/2012,
  title        = {2012 International Conference on Cyber Security, Cyber Warfare and
                  Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28,
                  2012},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6238218/proceeding},
  isbn         = {978-1-4673-1425-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics