


default search action
5th NSS 2011: Milan, Italy
- Pierangela Samarati, Sara Foresti, Jiankun Hu, Giovanni Livraga:

5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011. IEEE 2011, ISBN 978-1-4577-0458-1 - Sabrina De Capitani di Vimercati

, Pierangela Samarati
, Sara Foresti
, Jiankun Hu
:
Foreword from the Conference Chairs.
Intrusion Detection
- Abdulbasit Ahmed

, Alexei Lisitsa, Clare Dixon
:
A misuse-based network Intrusion Detection System using Temporal Logic and stream processing. 1-8 - Khalid Nasr, Anas Abou El Kalam

, Christian Fraboul:
A holistic methodology for evaluating wireless Intrusion Detection Systems. 9-16 - Yang Zhong, Hirofumi Yamaki, Hiroki Takakura:

A grid-based clustering for low-overhead anomaly intrusion detection. 17-24 - Jiang Ming, Haibin Zhang, Debin Gao

:
Towards ground truthing observations in gray-box anomaly detection. 25-32
Client-side Vulnerabilities
- Sophie Gastellier-Prevost, Maryline Laurent

:
Defeating pharming attacks at the client-side. 33-40 - Serge Chaumette, Olivier Ly, Renaud Tabary:

Automated extraction of polymorphic virus signatures using abstract interpretation. 41-48 - Yini Wang, Sheng Wen

, Yang Xiang
:
Modeling worms propagation on probability. 49-56 - Kui Xu, Danfeng Yao

, Qiang Ma, Alexander Crowell:
Detecting infection onset with behavior-based policies. 57-64
Authentication and Watermarking Systems
- Marco Botta, Davide Cavagnino, Victor Pomponiu:

KL-F: Karhunen-Loève based fragile watermarking. 65-72 - Panagiotis Rizomiliotis, Evangelos Rekleitis

, Stefanos Gritzalis
:
Designing secure RFID authentication protocols is (still) a non-trivial task. 73-80 - Ravi Jhawar, Philip Inglesant, Nicolas T. Courtois, Martina Angela Sasse:

Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication. 81-88
Web Security
- Renato Accornero, Daniele Rispoli, Francesco Bergadano

:
Privacy-enhanced identity via browser extensions and linking services. 89-96 - Nataliia Bielova

, Dominique Devriese
, Fabio Massacci
, Frank Piessens:
Reactive non-interference for a browser model. 97-104 - Boris Rozenberg, Yaron Gonen, Ehud Gudes, Nurit Gal-Oz

, Erez Shmueli:
Tracking end-users in web databases. 105-112
Security in Cloud and Peer to Peer Systems
- Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy

, Mohamed Almorsy:
CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model. 113-120 - Amir Averbuch, Michael Kiperberg, Nezer Zaidenberg:

An efficient VM-based software protection. 121-128 - David Zage, Charles Killian, Cristina Nita-Rotaru:

Removing the blinders: Using information to mitigate adversaries in adaptive overlays. 129-136 - Alessio Bonti

, Ming Li, Wen Shi:
Improving P2P IPTV random peers search through user similarity. 137-144
Network Security
- Mazdak Alimadadi, Mehran S. Fallah:

A distributed client-puzzle mechanism to mitigate bandwidth attacks. 145-152 - Nizar Ben Neji

, Adel Bouhoula
:
Towards safe and optimal filtering rule reordering for complex packet filters. 153-160 - Cynthia Wagner, Jérôme François

, Radu State, Thomas Engel:
DANAK: Finding the odd! 161-168 - Yu Wang

, Yang Xiang
, Jun Zhang
, Shun-Zheng Yu:
A novel semi-supervised approach for network traffic clustering. 169-175
Hardware-based Security
- Sheng Wei, Miodrag Potkonjak:

Scalable consistency-based hardware trojan detection and diagnosis. 176-183 - Roberto Gallo

, Henrique Kawakami, Ricardo Dahab
:
FORTUNA - A probabilistic framework for early design stages of hardware-based secure systems. 184-191 - Mirko Montanari, Roy H. Campbell:

Attack-resilient compliance monitoring for large distributed infrastructure systems. 192-199
Access Control
- Nathalie Baracaldo

, Amirreza Masoumzadeh, James Joshi:
A secure, constraint-aware role-based access control interoperation framework. 200-207 - Peter Amthor, Winfried E. Kühnhauser, Anja Pölck:

Model-based safety analysis of SELinux security policies. 208-215 - Steffen Bartsch:

Exploring twisted paths: Analyzing authorization processes in organizations. 216-223
Authentication
- Hataichanok Saevanee, Nathan L. Clarke

, Steven Furnell
:
SMS linguistic profiling authentication on mobile device. 224-228 - Eesa A. Alsolami, Colin Boyd, Andrew J. Clark, Irfan Ahmed

:
User-representative feature selection for keystroke dynamics. 229-233 - V. Koulolias, A. Kountzeris, Herbert Leitold, Bernd Zwattendorfer, A. Crespo, M. Stern:

STORK e-privacy and security. 234-238 - Rosanne English

, Ron Poet:
Towards a metric for recognition-based graphical password security. 239-243 - Samia A. Ali, Refaat M. Mohamed, Mahmoud H. Fahim:

RCHB: Light-weight, provably-secure variants of the HB protocol using rotation and complementation. 244-248
Key Managements
- Tony Cheneau, Andrei Vlad Sambra, Maryline Laurent

:
A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks. 249-253 - Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake:

Automatic security verification for 3-party authentication and key exchange protocols. 254-258 - Maurizio Adriano Strangio:

On the security of the ECKE-1N and EECKE-1N elliptic-curve key agreement protocols. 259-263 - Huiyun Li, Qi Zhang, Hai Yuan:

Channel state information based key generation vs. side-channel analysis key information leakage. 264-268 - Christoph Böhm, Maximilian Hofer, Wolfgang Pribyl:

A microcontroller SRAM-PUF. 269-273
Emerging Scenarios and e-Services
- Robert Koch, Dominik Holzapfel, Gabi Dreo Rodosek:

Data control in social networks. 274-279 - Sami Alsouri, Stefan Katzenbeisser, Sebastian Biedermann:

Trustable outsourcing of business processes to cloud computing environments. 280-284 - Florian Kerschbaum:

Secure conjunctive keyword searches for unstructured text. 285-289 - Valentim Oliveira, Tito Silva:

The power of credit card numbers and long CVVs. 290-294 - Bernd Zwattendorfer, Arne Tauber, Thomas Zefferer:

A privacy-preserving eID based Single Sign-On solution. 295-299
Wi-Fi and Network Security
- Bassem Bakhache, Joseph M. Ghazal, Safwan El Assad:

Enhancement of ZigBee and Wi-Fi security by a robust and fast chaotic algorithm. 300-304 - Yuanyuan Zhang, Wassim Znaidi, Cédric Lauradoux, Marine Minier:

Flooding attacks against network coding and countermeasures. 305-309 - Martine Bellaïche, Jean-Charles Grégoire:

Avoiding DDoS with active management of backlog queues. 310-315 - Nathan S. Evans, Christian Grothoff:

R5N: Randomized recursive routing for restricted-route networks. 316-321 - Bofeng Zhang, Yuan Li, Yujing Liu, Jinshu Su

:
Analysis of prefix hijacking based on AS hierarchical model. 322-326
Risk Assessment and Usability
- Marta Fernández-Diego

, Julián Marcelo-Cocho:
Modelling self-protected networks and dynamic systems. 327-331 - Martin Mihajlov

, Saso Josimovski, Borka Jerman-Blazic:
A conceptual framework for evaluating usable security in authentication mechanisms - usability perspectives. 332-336 - Patryk Szewczyk

:
Usability of Internet Security Software: Have they got it right? 337-341
Malicious Code and Security Analysis
- Xabier Ugarte-Pedrero, Igor Santos

, Pablo García Bringas
, Mikel Gastesi, José Miguel Esparza:
Semi-supervised learning for packed executable detection. 342-346 - Ziyad S. Al-Salloum, Stephen D. Wolthusen:

A propagation model of a vulnerability mitigation computer worm - seawave. 347-352 - Ayda Saïdane, Nicolas Guelfi:

Towards improving security testability of AADL architecture models. 353-357 - Arash Afshar, Mehran S. Fallah:

Reconstructing security types for automated policy enforcement in FABLE. 358-363 - Rosanne English

, Ron Poet:
Measuring the revised guessability of graphical passwords. 364-368

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














