![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
9. ARES 2014: Fribourg, Switzerland
- Ninth International Conference on Availability, Reliability and Security, ARES 2014, Fribourg, Switzerland, September 8-12, 2014. IEEE Computer Society 2014
ARES Conference 2014 Program: Full Papers
ARES Full I: Best Paper Session
- Jun Pang, Yang Zhang:
A New Access Control Scheme for Facebook-Style Social Networks. 1-10 - Maria Zhdanova
, Jürgen Repp, Roland Rieke
, Chrystel Gaber
, Baptiste Hemery:
No Smurfs: Revealing Fraud Chains in Mobile Money Transfers. 11-20 - Mark Scanlon
, Jason Farina, M. Tahar Kechadi
:
BitTorrent Sync: Network Investigation Methodology. 21-29
ARES Full II: Mobile Security and Attack Prevention
- Dominik Christian Maier, Tilo Müller, Mykola Protsenko:
Divide-and-Conquer: Why Android Malware Cannot Be Stopped. 30-39 - Siegfried Rasthofer, Steven Arzt
, Enrico Lovat, Eric Bodden
:
DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android. 40-49 - Martin Jauernig, Matthias Neugschwandtner, Christian Platzer, Paolo Milani Comparetti:
Lobotomy: An Architecture for JIT Spraying Mitigation. 50-58
ARES Full III: Secure Protocols
- Benjamin Aziz
:
A Formal Model and Analysis of the MQ Telemetry Transport Protocol. 59-68 - Thomas Unterluggauer, Erich Wenger:
Practical Attack on Bilinear Pairings to Disclose the Secrets of Embedded Devices. 69-77 - Ricardo Neisse, Igor Nai Fovino, Gianmarco Baldini, Vera Stavroulaki
, Panagiotis Vlacheas, Raffaele Giaffreda:
A Model-Based Security Toolkit for the Internet of Things. 78-87
ARES Full IV: Trust and Availability
- Jian Fu, Qiang Yang, Raphael Poss, Chris R. Jesshope, Chunyuan Zhang:
Rethread: A Low-Cost Transient Fault Recovery Scheme for Multithreaded Processors. 88-93 - Johannes Sänger, Günther Pernul:
Visualizing Transaction Context in Trust and Reputation Systems. 94-103 - Parsa Pourali, Ferhat Khendek
, Maria Toeroe:
Enhanced Configuration Generation Approach for Highly Available COTS Based Systems. 104-113 - Jeffrey Choo Soon Fatt, Kang-Leng Chiew
, San-Nah Sze
:
Phishdentity: Leverage Website Favicon to Offset Polymorphic Phishing Website. 114-119
ARES Conference 2014 Program: Short Papers
ARES Short I: Ontologies and Integrated Devices
- Thomas Korak, Thomas Plos:
EM Leakage of RFID Devices - Comparison of Two Measurement Approaches. 120-125 - Henk Birkholz, Ingo Sieverdingbeck:
Supporting Security Automation for Multi-chassis Link Aggregation Groups via the Interconnected-Asset Ontology. 126-133 - Emad Elabd
, Mohand-Said Hacid:
Concurrent Queries in Location Based Services. 134-139
ARES Short II: Security and Privacy
- François Lesueur, Sabina Surdu, Romuald Thion, Yann Gripay, Meriam Ben-Ghorbel-Talbi:
Palpable Privacy through Declarative Information Flows Tracking for Smart Buildings. 140-145 - Rima Addas, Ning Zhang:
An Enhanced Linkable Anonymous Access Protocol of the Distributed Electronic Patient Records. 146-151 - Christian Zimmermann, Rafael Accorsi, Günter Müller:
Privacy Dashboards: Reconciling Data-Driven Business Models and Privacy. 152-157 - Karin Bernsmed, Daniela S. Cruzes, Martin Gilje Jaatun
, Børge Haugset, Erlend Andreas Gjære:
Healthcare Services in the Cloud - Obstacles to Adoption, and a Way Forward. 158-165
ARES Short III: Software Security and Authentication
- Eric Medvet
, Alberto Bartoli
, Francesca Boem
, Fabiano Tarlao:
Continuous and Non-intrusive Reauthentication of Web Sessions Based on Mouse Dynamics. 166-171 - Marta Piekarska, Bhargava Shastry, Ravishankar Borgaonkar:
What Does the Fox Say? On the Security Architecture of Firefox OS. 172-177 - Masatoshi Yoshizawa, Takanori Kobashi, Hironori Washizaki
, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka
:
Verifying Implementation of Security Design Patterns Using a Test Template. 178-183 - Sebastian Schrittwieser, Stefan Katzenbeisser, Georg Merzdovnik
, Peter Kieseberg
, Edgar R. Weippl:
AES-SEC: Improving Software Obfuscation through Hardware-Assistance. 184-191
ARES Industrial Track
- Beatriz Gallego-Nicasio Crespo, Alan Garwood:
Fighting Botnets with Cyber-Security Analytics: Dealing with Heterogeneous Cyber-Security Information in New Generation SIEMs. 192-198 - Mirko Sailio, Matti Mantere
, Sami Noponen:
Network Security Analysis Using Behavior History Graph. 199-206
The Ninth International Workshop on Frontiers in Availability, Reliability, and Security (FARES 2014)
- Stephan Neumann, Oksana Kulyk, Melanie Volkamer:
A Usable Android Application Implementing Distributed Cryptography for Election Authorities. 207-216 - Georgios Karopoulos, Alexandros Fakis, Georgios Kambourakis:
Complete SIP Message Obfuscation: PrivaSIP over Tor. 217-226 - Asma Patel, Esther Palomar:
Privacy Preservation in Location-Based Mobile Applications: Research Directions. 227-233 - Bernard Stepien, Amy P. Felty, Stan Matwin
:
Challenges of Composing XACML Policies. 234-241 - Italo Dacosta, Andreas Put, Bart De Decker:
EmailCloak: A Practical and Flexible Approach to Improve Email Privacy. 242-250 - Christian Sillaber, Ruth Breu:
Quality Matters: Systematizing Quality Deficiencies in the Documentation of Business Security Requirements. 251-258 - Bahareh Shojaie, Hannes Federrath, Iman Saberi:
Evaluating the Effectiveness of ISO 27001: 2013 Based on Annex A. 259-264 - Felipe Coral Sasso, Ricardo Alexandre Reinaldo De Moraes, Jean Everson Martina:
A Proposal for a Unified Identity Card for Use in an Academic Federation Environment. 265-272 - Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato:
Defining Malicious Behavior. 273-278
The Second International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM 2014)
- Joshua Schiffman, David Kaplan:
The SMM Rootkit Revisited: Fun with USB. 279-286 - Adrian Dabrowski
, Heidelinde Hobel, Johanna Ullrich, Katharina Krombholz, Edgar R. Weippl:
Towards a Hardware Trojan Detection Cycle. 287-294 - Martin Husák
, Jakub Cegan:
PhiGARo: Automatic Phishing Detection and Incident Response Framework. 295-302 - Kelly Hughes, Yanzhen Qu:
Performance Measures of Behavior-Based Signatures: An Anti-malware Solution for Platforms with Limited Computing Resource. 303-309 - Matti Mantere
, Sami Noponen
, Pia Olli, Jarno Salonen:
Network Security Monitoring in a Small-Scale Smart-Grid Laboratory. 310-316 - Diego Kreutz, Eduardo Feitosa, Hugo Cunha, Heiko Niedermayer, Holger Kinkelin:
Increasing the Resilience and Trustworthiness of OpenID Identity Providers for Future Networks and Services. 317-324
The Second International Workshop on Security of Mobile Applications (IWSMA 2014)
- Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
A Trust Management Based Security Mechanism against Collusion Attacks in a MANET Environment. 325-332 - Jelena Milosevic, Andreas Dittrich, Alberto Ferrante, Miroslaw Malek:
A Resource-Optimized Approach to Efficient Early Detection of Mobile Malware. 333-340 - Stefano Bistarelli
, Gianpiero Costantino, Fabio Martinelli, Francesco Santini
:
An Improved Role-Based Access to Android Applications with JCHR. 341-348 - Jakub Breier
, Adam Pomothy:
Qualified Electronic Signature via SIM Card Using JavaCard 3 Connected Edition Platform. 349-355
The Second International Workshop on Statistical Methods in Reliability Assessment of Complex Industrial Multi-state Systems (RAMSS 2014)
- Jozef Kostolny
, Miroslav Kvassay
, Elena N. Zaitseva
:
Analysis of Algorithms for Computation of Direct Partial Logic Derivatives in Multiple-Valued Decision Diagrams. 356-361 - Zeev Barzily, Mingyue Ding, Zeev Volkovich
:
Stochastic Model for Medical Image Segmentation. 362-369 - Maïder Estecahandy, Stéphane Collas, Laurent Bordes, Christian Paroissin
:
Fast Monte Carlo Simulation Methods Adapted to Simple Petri Net Models. 370-379 - Pavel Praks
, Vytis Kopustinskas:
Monte-Carlo Based Reliability Modelling of a Gas Network Using Graph Theory Approach. 380-386 - Ilia Frenkel, Svetlana Daichman, Lev Khvatskin, Neta Avraham, Oshrit Zihry, Anatoly Lisnianski:
Performance Determination for MSS Manufacturing System by Lz-Transform and Stochastic Processes Approach. 387-392 - Lev Khvatskin, Ilia Frenkel:
On Availability Comparison of Reservation Modes for Multi-state Air Conditioning Systems Using Markov Approach. 393-396 - Vlad Stefan Barbu
, Alex Karagrigoriou
, Andreas Makrides:
Semi-Markov Modelling for Multi-state Systems. 397-402 - Sonia Malefaki
, Vasilis P. Koutras, Agapios N. Platis:
Optimizing the Availability and the Operational Cost of a Periodically Inspected Multi-state Deteriorating System with Condition Based Maintenance Policies. 403-411 - Alex Karagrigoriou
, Ilia Vonta
:
Statistical Inference for Heavy-Tailed Distributions in Technical Systems. 412-419 - Athanasios C. Rakitzis
, Petros E. Maravelakis
, Philippe Castagliola:
A Comparative Study of Control Charts for Zero-Inflated Binomial Processes. 420-425 - Vasiliy V. Krivtsov
, Olexandr Yevkin:
Practical Applications of Advanced Statistical Models in Reliability Data Analysis. 426-429 - Vladimir Rykov
, Dmitry Efrosinin
, Vladimir M. Vishnevskiy
:
On Sensitivity of Reliability Models to the Shape of Life and Repair Time Distributions. 430-437
The Fourth International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2014)
RISI I: Information and Participation for Response and Recovery
- Stefan Sackmann, Marlen Hofmann, Hans Betke:
Organizing On-Site Volunteers: An App-Based Approach. 438-439 - Yu Ichifuji, Noboru Sonehara:
Visualization of Recovery Situation in Disaster Area by Using Web Reservation Data. 440-446
RISI II: k-Anonymization for Information Sharing
- Hidenobu Oguri, Noboru Sonehara:
A k-anonymity method based on search engine query statistics for disaster impact statements. 447-454 - Hoang-Quoc Nguyen-Son, Minh-Triet Tran
, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure. 455-460 - Haruno Kataoka, Yohei Ogawa, Isao Echizen, Tetsuji Kuboyama
, Hiroshi Yoshiura:
Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisation. 461-467
RISI III : Resilient Networks
- Piotr Cholda
:
Risk-Aware Design and Management of Resilient Networks. 468-475
The First International Software Assurance Workshop (SAW 2014)
SAW I: Secure Software Architectures
- Priya Anand, Jungwoo Ryoo, Rick Kazman:
Vulnerability-Based Security Pattern Categorization in Search of Missing Patterns. 476-483 - Dae-Kyoo Kim, Jungwoo Ryoo, Suntae Kim:
Building Sustainable Software by Preemptive Architectural Design Using Tactic-Equipped Patterns. 484-489 - Lotfi Ben Othmane, Pelin Angin
, Bharat K. Bhargava:
Using Assurance Cases to Develop Iteratively Security Features Using Scrum. 490-497
SAW II: Software Security Analysis
- Sanjay Rawat, Laurent Mounier, Marie-Laure Potet:
LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow Analysis. 498-505 - Igor V. Kotenko
, Evgenia Novikova
:
Visualization of Security Metrics for Cyber Situation Awareness. 506-513
International Workshop on Security in ATM and Other Critical Infrastructures (SecATM 2014)
- Woohyun Shim, Fabio Massacci
, Alessandra Tedeschi, Alessandro Pollini
:
A Relative Cost-Benefit Approach for Evaluating Alternative Airport Security Policies. 514-522 - Denis Kolev, Evgeniy Morozov:
Mathematical Modelling in Air Traffic Management Security. 523-529 - Ana P. G. Martins
:
The Social Acceptance of the Passivation of Misused Aircraft. 530-536 - Fabio Massacci
, Federica Paci
, Bjørnar Solhaug, Alessandra Tedeschi:
EMFASE - An Empirical Framework for Security Design and Economic Trade-off. 537-543 - Rainer Koelle
:
Security Situation Management: Towards Developing a Time-Critical Decision Making Capability for SESAR. 544-551 - Martin Hawley, Karol Gotz, John Hird, Chris Machin:
Design-In Security for Air Traffic Control. 552-555 - Matias Krempel, Martin Gilje Jaatun
:
Learn to SWIM. 556-560
The Seventh International Workshop on Digital Forensics (WSDF 2014)
- Maciej Piec, Andreas Rauber:
Real-Time Screen Watermarking Using Overlaying Layer. 561-570 - Oren Halvani, Martin Steinebach:
An Efficient Intrinsic Authorship Verification Scheme Based on Ensemble Learning. 571-578 - Martin Steinebach, Huajian Liu, York Yannikos
:
Efficient Cropping-Resistant Robust Image Hashing. 579-585
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.