default search action
7th SIN 2014: Glasgow, Scotland, UK
- Ron Poet, Muttukrishnan Rajarajan:
Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014. ACM 2014, ISBN 978-1-4503-3033-6
Keynote Talk
- Atilla Elçi:
Isn't the Time Ripe for a Standard Ontology on Security of Information and Networks? 1
Assurance and Trust
- Brian A. Soeder, K. Suzanne Barber:
Trustworthiness of Identity Attributes. 4 - Md. Sadek Ferdous, Gethin Norman, Ron Poet:
Mathematical Modelling of Identity, Identity Management and Other Related Topics. 9 - Christoph Hochreiner, Markus Huber, Georg Merzdovnik, Edgar R. Weippl:
Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices. 17 - Sebastian Abt, Sebastian Gärtner, Harald Baier:
A Small Data Approach to Identification of Individuals on the Transport Layer using Statistical Behaviour Templates. 25 - Neila Rjaibi, Latifa Ben Arfa Rabai:
Deploying Suitable Countermeasures to Solve the Security Problems within an E-learning Environment. 33 - Amardeep Singh, Divya Bansal, Sanjeev Sofat:
An Approach of Privacy Preserving based Publishing in Twitter. 39 - Artem Garkusha, Evgeny Sergeevich Abramov, Oleg B. Makarevich:
An effectiveness of application of <<Capture The Flag>> competitions concept within higher education (Student contribution). 43 - Ahmad Kamal Ramli, Karim Djemame:
Autonomic management for convergent networks to support robustness of appliance technologies. 47 - Anatoly Malyuk, Natalia G. Miloslavskaya:
Information Security Theory Development. 52 - Mehrdad Sepehri Sharbaf:
A New Perspective to Information Security: Total Quality Information Security Management. 56 - Hervé Cholez, Christophe Feltus:
Towards an Innovative Systemic Approach of Risk Management. 61 - Chalee Vorakulpipat, Chantri Polprasert, Siwaruk Siwamogsatham:
Managing Mobile Device Security in Critical Infrastructure Sectors. 65 - Greig Paul, James Irvine:
A Protocol For Storage Limitations and Upgrades in Decentralised Networks. 69 - Yogachandran Rahulamathavan, Pramod S. Pawar, Pete Burnap, Muttukrishnan Rajarajan, Omer F. Rana, George Spanoudakis:
Analysing Security requirements in Cloud-based Service Level Agreements. 73 - Bob Duncan, Mark Whittington:
Compliance with standards, assurance and audit: does this equal security? 77 - Nicolas Mayer, Jocelyn Aubert:
Sector-Specific Tool for Information Security Risk Management in the Context of Telecommunications Regulation (Tool demo). 85 - Natalia G. Miloslavskaya, Mikhail Senatorov, Alexander I. Tolstoy, Sergey Zapechnikov:
Big Data Information Security Maintenance. 89 - Fawad Khan, Sarmad Ullah Khan, Muhammad Roman, Muhammad Usman Abbasi:
Location Identity Based Content Security Scheme for Content Centric Networking. 95 - Ivan Gudymenko:
A Privacy-Preserving E-Ticketing System for Public Transportation Supporting Fine-Granular Billing and Local Validation. 101 - Christophe Feltus, Damien Nicolas, Claude Poupart:
Towards a HL7 based Metamodeling Integration Approach for Embracing the Privacy of Healthcare Patient Records Administration. 109 - Greig Paul, James Irvine:
Privacy Implications of Wearable Health Devices. 117 - Edward Caprin, Yan Zhang:
Negotiation Based Framework for Attribute-Based Access Control Policy Evaluation. 122
Cryptographic Techniques
- Mohammad A. AlAhmad, Imad Fakhri Alshaikhli:
Design and Analysis of a New Hash Function Gear. 128 - Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis. 137 - Cihangir Tezcan, Halil Kemal Taskin, Murat Demircioglu:
Improbable Differential Attacks on Serpent using Undisturbed Bits. 145 - Sufyan Salim Mahmood AlDabbagh, Imad Fakhri Taha Al Shaikhli, Mohammad A. AlAhmad:
HISEC: A New Lightweight Block Cipher Algorithm. 151 - Alina Trepacheva, Liudmila Babenko:
Known Plaintexts Attack on Polynomial based Homomorphic Encryption. 157 - Maryam Farajzadeh-Zanjani, Seyed Masoud Alavi Abhari, Alexander G. Chefranov:
Group Key Exchange Protocol Based on Diffie-Hellman Technique in Ad-Hoc Network. 166 - Alwyn Goh, Geong Sen Poh, Voon-Yee Vee, Kok Boon Chong, Xin Zhe Khooi, Chanan Zhuo Ern Loh, Zhi Yuan Eng:
Human Visualisation of Cryptographic Code Using Progressive Multi-Scale Resolution. 170 - Sergey Agafin, Anton Krasnopevtsev:
Memory access time as entropy source for RNG. 176 - Valeriy O. Osipyan:
Mathematical model of the polyalphabetic information security system based on the normal generalized knapsack. 180 - Philipp Burtyka, Oleg B. Makarevich:
Symmetric Fully Homomorphic Encryption Using Decidable Matrix Equations. 186 - Ecem Ünal, Erkay Savas:
Bandwidth-Optimized Parallel Private Information Retrieval. 197 - Alina Trepacheva:
Cryptanalysis of Polynomial based Homomorphic Encryption. 205 - Vikas Jaiman, Gaurav Somani:
An Order Preserving Encryption Scheme for Cloud Computing. 211
Human Factors and Biometrics
- Shivam Aggarwal, Vishal Kumar, S. D. Sudarsan:
Identification and Detection of Phishing Emails Using Natural Language Processing Techniques. 217 - Abdulaziz Almehmadi, Khalil El-Khatib:
On the Possibility of Insider Threat Detection Using Physiological Signal Monitoring. 223 - Soumik Mondal, Patrick Bours:
Continuous Authentication using Fuzzy Logic. 231 - Kiran B. Raja, Ramachandra Raghavendra, Christoph Busch, Soumik Mondal:
An Empirical Study of Smartphone Based Iris Recognition in Visible Spectrum. 239 - Monika Singh, Divya Bansal, Sanjeev Sofat:
Detecting Malicious Users in Twitter using Classifiers. 247 - Muhammad Adnan, Antonio Lima, Luca Rossi, Suresh Veluru, Paul A. Longley, Mirco Musolesi, Muttukrishnan Rajarajan:
The Uncertainty of Identity Toolset: Analysing Digital Traces for User Profiling. 254 - Maria Evangelopoulou, Christopher W. Johnson:
Implementation of Safety Techniques in a Cyber Domain. 261 - Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie:
Exploring the Guessability of Image Passwords. 264 - Hani Moaiteq Aljahdali, Ron Poet:
Educated Guessing Attacks on Culturally Familiar Graphical Passwords Using Personal Information on Social Networks. 272 - Hani Moaiteq Aljahdali, Ron Poet:
Users' Perceptions of Recognition-Based Graphical Passwords: A Qualitative Study on Culturally Familiar Graphical Passwords. 279 - Parth Bhatt, Johny de Souza, Nelson Uto, Jefferson Capovilla, Jose Resende, Danilo Suiama:
Implementation Aspects of MeterGoat, a Smart Meter Security Training Platform. 284
Networks and Defence
- Ahmed Saeed, Ali Ahmadinia, Mike Just, Christophe Bobda:
An ID and Address Protection Unit for NoC based Communication Architectures. 288 - Xavier J. A. Bellekens, Christos Tachtatzis, Robert C. Atkinson, Craig Renfrew, Tony Kirkham:
GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing. 295 - Xavier J. A. Bellekens, Christos Tachtatzis, Robert C. Atkinson, Craig Renfrew, Tony Kirkham:
A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated Intrusion Detection Systems. 302 - Ecir U. Küçüksille, Mehmet Ali Yalçinkaya, Ozan Uçar:
Physical Dangers in the Cyber Security and Precautions to be Taken. 310 - Naghmeh Moradpoor Sheykhkanloo:
Employing Neural Networks for the Detection of SQL Injection Attack. 318 - Peter Pisarcík, Pavol Sokol:
Framework for distributed virtual honeynets. 324 - Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer:
HosTaGe: a Mobile Honeypot for Collaborative Defense. 330 - Mohammad Puttaroo, Peter Komisarczuk, Renato Cordeiro de Amorim:
Challenges in developing Capture-HPC exclusion lists. 334 - Ludmila K. Babenko, Oleg B. Makarevich, Dmitry Bespalov, Roman Chesnokov, Yaroslav Trubnikov:
Instrumental System for Analysis of Information Systems Using Smart Cards Protection. 339 - Tobias F. Pfeffer, Paula Herber, Jörg Schneider:
Reverse Engineering of ARM Binaries Using Formal Transformations. 345 - Rahul Kumar, Indraveni K, Aakash Kumar Goel:
Automated Session Fixation Vulnerability Detection in Web Applications using the Set-Cookie HTTP response header in cookies. 351 - Bernd Conrad, Fatemeh Shirazi:
Analyzing the Effectiveness of DoS Attacks on Tor. 355 - Hossain Shahriar, Hisham M. Haddad:
Content Provider Leakage Vulnerability Detection in Android Applications. 359 - Avani Sharma, Rajbir Kaur:
Non-cryptographic Detection Approach and Countermeasure for JFDV Attack. 367 - Jikku Kuriakose, Vinod P.:
Towards the Detection of Undetectable Metamorphic Malware. 373 - Ashok Singh Sairam, Rahul Kumar, Pratima Biswas:
Implementation of an Adaptive Traffic-aware Firewall. 385 - Ibrahim Lahmer, Ning Zhang:
MapReduce: MR Model Abstraction for Future Security Study. 392 - Hifaa Bait Baraka, Huaglory Tianfield:
Intrusion Detection System for Cloud Environment. 399 - Thu Yein Win, Huaglory Tianfield, Quentin Mair, Taimur Al Said, Omer F. Rana:
Virtual Machine Introspection. 405 - Shahid Alam, Issa Traoré, Ibrahim Sogukpinar:
Current Trends and the Future of Metamorphic Malware Detection. 411 - Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
Integrated Framework for Classification of Malwares. 417 - Komminist Weldemariam, Hossain Shahriar, Vamshee Krishna Devendran:
Dynamic Analysis of Web Objects. 423 - Ashish Saini, Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
Classification of PE Files using Static Analysis. 429 - Peter Aufner, Georg Merzdovnik, Markus Huber, Edgar R. Weippl:
Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations. 434 - Nishant Garg, Kuldeep Pareek, Manoj Singh Gaur, Vijay Laxmi, Chhagan Lal:
Analysis of Identity Forging Attack in MANETs. 441 - Niaz Morshed Chowdhury, Lewis M. Mackenzie:
Development of a Threat Model for Vehicular Ad-hoc Network based Accident Warning Systems. 447 - Giovanni Bottazzi, Gianluigi Me:
The Botnet Revenue Model. 459 - Marco Tiloca:
Efficient Protection of Response Messages in DTLS-Based Secure Multicast Communication. 466 - Shahid Alam, Ibrahim Sogukpinar, Issa Traoré, Yvonne Coady:
In-Cloud Malware Analysis and Detection: State of the Art. 473 - Tatiana V. Stepanova, Dmitry P. Zegzhda:
Applying Large-scale Adaptive Graphs to Modeling Internet of Things Security. 479
Posters
- Paraskevas Sarris, Lewis Mackenzie, Soumyadeb Chowdhury:
A Novel Authentication Scheme for Online Transactions. 483 - Ali Reza Honarvar, Ashkan Sami:
CBR Clone Based Software Flaw Detection Issues. 487 - Hui Lin, Adam J. Slagell, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster). 492 - Dusan Klinec, Vashek Matyás:
Traversing symmetric NAT with predictable port allocation. 543
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.