default search action
ICSSA 2017: Altoona, PA, USA
- International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017. IEEE 2017, ISBN 978-1-5386-4808-7
- Sebastian Eresheim, Robert Luh, Sebastian Schrittwieser:
On the Impact of Kernel Code Vulnerabilities in IoT Devices. 1-5 - Joel Margolis, Tae Tom Oh, Suyash Jadhav, Young Ho Kim, Jeong Neyo Kim:
An In-Depth Analysis of the Mirai Botnet. 6-12 - Jungwoo Ryoo, Soyoung Kim, Junsung Cho, Hyoungshick Kim, Simon Tjoa, Christopher Derobertis:
IoE Security Threats and You. 13-19 - Kenneth LaCroix, Yin L. Loo, Young B. Choi:
Cookies and Sessions: A Study of What They Are, How They Work and How They Can Be Stolen. 20-24 - Priya Anand, Jungwoo Ryoo:
Security Patterns As Architectural Solution - Mitigating Cross-Site Scripting Attacks in Web Applications. 25-31 - Sangjun Ko, Jusop Choi, Hyoungshick Kim:
COAT: Code Obfuscation Tool to Evaluate the Performance of Code Plagiarism Detection Tools. 32-37 - Aleem Khalid Alvi, Mohammad Zulkernine:
Security Pattern Detection Using Ordered Matrix Matching. 38-43 - Maryam Davari, Mohammad Zulkernine, Fehmi Jaafar:
An Automatic Software Vulnerability Classification Framework. 44-49 - Martin Valicek, Gregor Schramm, Martin Pirker, Sebastian Schrittwieser:
Creation and Integration of Remote High Interaction Honeypots. 50-55 - Stefan Marschalek, Robert Luh, Sebastian Schrittwieser:
Endpoint Data Classification Using Markov Chains. 56-59 - Meenu Ganesh, Priyanka Pednekar, Pooja Prabhuswamy, Divyashri Sreedharan Nair, Younghee Park, Hyeran Jeon:
CNN-Based Android Malware Detection. 60-65 - Hyung-Jong Kim, Soyeon Park:
Secure Password Translation for Document Protection of SOHO Companies. 66-68 - Evan Michael English, Daniel Paul Stacey, Syed Rizvi, Donte Perino:
Cloud Reliability and Independence Standard: A Three Tiered System for Optimal Cloud Storage. 69-74 - Joseph Gualdoni, Andrew Kurtz, Ilva Myzyri, Megan Wheeler, Syed Rizvi:
Multi-Layer Defense Model for Securing Online Financial Transactions. 75-79 - Damjan Buhov, Patrick Kochberger, Richard Thron, Sebastian Schrittwieser:
Discovering Cryptographic Algorithms in Binary Code Through Loop Enumeration. 80-86 - Wendy Ayala, Walter Fuertes, Fernando Galarraga, Hernán Aules, Theofilos Toulkeridis:
Software Application to Evaluate the Complexity Theory of the RSA and Elliptic Curves Asymmetric Algorithms. 87-93 - Walter Fuertes, Anabel Tunala, Ronnie Moncayo, Fausto Meneses, Theofilos Toulkeridis:
Software-Based Platform for Education and Training of DDoS Attacks Using Virtual Networks. 94-99 - Min Jin Kwon, Gowoon Kwak, Siyoung Jun, Hyung-Jong Kim, Hae Young Lee:
Enriching Security Education Hands-on Labs with Practical Exercises. 100-103 - Xiao Liu, Brett Holden, Dinghao Wu:
Automated Synthesis of Access Control Lists. 104-109 - Hyung-Jong Kim, Hae Young Lee:
A Quantification of Effectiveness of Simulation Models by Managing Cost of Development. 110 - Hae Young Lee, Young Sun Park:
Common Requirements for Web Application Vulnerability Scanners for the Internet of Things. 111 - Priya Murugesan, Swanima Chinnappa, Alaa S. Alaerjan, Dae-Kyoo Kim:
Adopting Attribute-Based Access Control to Data Distribution Service. 112-115 - Weike Wang, Muyang Liu, Pei Du, Zongmin Zhao, Yuntong Tian, Qiang Hao, Xiang Wang:
An Architectural-Enhanced Secure Embedded System with a Novel Hybrid Search Scheme. 116-120 - Youngjoon Ki, Ji Won Yoon:
An Efficient Method for Securely Storing and Handling of Genomic Data. 121-125
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.