


default search action
8th SIN 2015: Sochi, Russia
- Oleg B. Makarevich, Ron Poet, Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, Ludmila K. Babenko, Md. Sadek Ferdous, Anthony T. S. Ho, Vijay Laxmi, Josef Pieprzyk:

Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015. ACM 2015, ISBN 978-1-4503-3453-2 - Ron Poet:

The use of mobile devices in authentication. 5 - Ramakrishna Thurimella, Rinku Dewri, William Mitchell:

Record linkage applications in health services research: opportunities and challenges. 6 - Alexey Zhukov:

Lightweight cryptography: modern development paradigms. 7
Security in information systems
- Igor Anikin

, Lilia Yu. Emaletdinova:
Information security risk management in computer networks based on fuzzy logic and cost/benefit ratio estimation. 8-11 - André Rifaut, Christophe Feltus

, Slim Turki
, Djamel Khadraoui:
Analysis of the impact of ethical issues on the management of the access rights. 12-19 - Anil Saini, Manoj Singh Gaur, Vijay Laxmi

, Priyadarsi Nanda:
sandFOX: secure sandboxed and isolated environment for firefox browser. 20-27 - Alexander Tarasov:

Modern techniques of function-level fault tolerance in MFM-systems. 28-29 - Alexander Barabanov

, Alexey Markov
:
Modern trends in the regulatory framework of the information security compliance assessment in Russia based on common criteria. 30-33 - Vladimir V. Glukhov

, Igor V. Ilin, A. B. Anisiforov:
Problems of data protection in industrial corporations enterprise architecture. 34-37 - Natalia G. Miloslavskaya

, Alexander I. Tolstoy
, Vladislav Petrov:
Secure e-Learning portal for teaching business continuity and information security management. 38-41 - Sergey Lapin:

Access control model D-TBAC subject to the requirements to tasks' performing. 42-45 - Francesco Buccafurri, Lidia Fotia

, Angelo Furfaro
, Alfredo Garro
, Matteo Giacalone, Andrea Tundis
:
An analytical processing approach to supporting cyber security compliance assessment. 46-53 - Artem Garkusha:

Building data in motion DLP system from scratch using opensource software and confirming its effectiveness within "capture the flag" competitions. 54-57
Cryptographic techniques and key management
- Subhasish Banerjee

, Manash Pratim Dutta
, Chandan Tilak Bhunia:
A perfect dynamic-id and biometric based remote user authentication scheme under multi-server environments using smart cards. 58-64 - Rajat Subhra Goswami, Subhasish Banerjee

, Manash Pratim Dutta
, Chandan Tilak Bhunia:
Absolute key variation technique of automatic variable key in cryptography. 65-67 - Naila Mukhtar, Muhammad Shamim Baig, L. A. Khan:

Improved trust based key management for end-to-end secure communication in cellular networks. 68-75 - A. Yu. Boruchinkin:

Secure voice communication system with hardware encryption of data on hands-free headset. 76-79 - Ludmila K. Babenko

, Alina Trepacheva:
Cryptanalysis of factoring-based fully homomorphic encryption. 80-83 - Philipp Burtyka, Oleg B. Makarevich

:
Execution of data-dependent programs over encrypted data. 84-89 - Maxim Anikeev

:
Improvement of treeless signature schemes implementation by random oracle buffering. 90-92
Security-aware software engineering
- Alexander Barabanov

, Alexey Markov
, Andrey Fadin, Valentin Tsirlov, Igor Shakhalov:
Synthesis of secure software development controls. 93-97
Detecting and preventing fraud with data analytics
- Evstifeeva Natalia Alexandrovna, Evstifeeva Olga Urievna:

Approbation of the methodology for web monitoring of terrorism- and extremism-related content. 100-102 - S. S. Alkhasov, Alexander N. Tselykh, Alexey A. Tselykh:

Application of cluster analysis for the assessment of the share of fraud victims among bank card holders. 103-106 - Daria Chukova, Alexey Pakhomov:

Profile-based students assignment to core financial intelligence unit departments. 107-108 - Margarita Knyazeva, Alexander N. Tselykh, Alexey A. Tselykh, Elena Popkova:

A graph-based data mining approach to preventing financial fraud: a case study. 109-113 - Alexey A. Tselykh, Dmitry Petukhov:

Web service for detecting credit card fraud in near real-time. 114-117 - Nezar Nassr, Eric Steegmans:

Mitigating conflicts of interest by authorization policies. 118-126
Cybersecurity of large-scale and distributed systems
- Alexander Minin, Maxim O. Kalinin

:
Information security in computer networks with dynamic topology. 127-130 - Artem S. Konoplev, Alexey G. Busygin:

Steganographic methods of communications in distributed computing networks. 131-134 - Tatiana V. Stepanova, Dmitry P. Zegzhda:

Large-scale systems security evolution: control theory approach. 135-141 - Tatiana V. Stepanova, Alexander I. Pechenkin, Daria S. Lavrova:

Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems. 142-149 - Dmitry V. Moskvin, Denis Ivanov:

Cybersecurity of ad-hoc distributed systems. 150-153 - Zainab Saud, M. Hasan Islam:

Towards proactive detection of advanced persistent threat (APT) attacks using honeypots. 154-157 - Emmanouil Vasilomanolakis

, Shankar Karuppayah
, Panayotis Kikiras, Max Mühlhäuser:
A honeypot-driven cyber incident monitor: lessons learned and steps ahead. 158-164 - Malik S. K. Awan, Mohammed A. AlGhamdi

, Sultan H. Almotiri, Pete Burnap
, Omer F. Rana
:
A classification framework for distinct cyber-attacks based on occurrence patterns. 165-168 - Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi:

DDoS/EDoS attack in cloud: affecting everyone out there! 169-176 - Ludmila K. Babenko

, Philipp Burtyka, Oleg B. Makarevich
, Alina Trepacheva:
The general model of secure computation system. 177-184 - Evgeny Shcherba

:
Two formal problems of network security and a theory of boolean-valued flow networks. 185-188
Network security and protocols
- Ecir Ugur Küçüksille

, Mehmet Ali Yalçinkaya, Samet Ganal:
Developing a penetration test methodology in ensuring router security and testing it in a virtual laboratory. 189-195 - Anna Epishkina

, Konstantin Kogos
:
Protection from binary and multi-symbol packet length covert channels. 196-202 - Evgeny Sergeevich Abramov, Elena Basan

, Oleg B. Makarevich
:
Trust management system for mobile cluster-based wireless sensor network. 203-209 - Hamid Hanifi, Leemon C. Baird III, Ramakrishna Thurimella:

A new algorithm for unkeyed jam resistance. 210-216 - Aragats Amirkhanyan, Andrey Sapegin

, Marian Gawron, Feng Cheng, Christoph Meinel:
Simulation user behavior on a security testbed using user behavior states graph. 217-223 - Alexander Shukhman, Petr Polezhaev, Yuri Ushakov

, Leonid Legashev
, Veniamin N. Tarasov
, Nadezhda F. Bakhareva
:
Development of network security tools for enterprise software-defined networks. 224-228 - Marian Gawron, Aragats Amirkhanyan, Feng Cheng, Christoph Meinel:

Automatic vulnerability detection for weakness visualization and advisory creation. 229-236 - Nilesh Chakraborty, Samrat Mondal

:
Few notes towards making honeyword system more secure and usable. 237-245
Computational intelligence techniques in security
- Vladimir Eliseev

, Yury Shabalin:
Dynamic response recognition by neural network to detect network host anomaly activity. 246-249 - Sergey Zapechnikov

, Natalia G. Miloslavskaya
, Alexander I. Tolstoy
:
Modeling of next-generation firewalls as queueing services. 250-257 - Naghmeh Moradpoor Sheykhkanloo

:
SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques. 258-266 - Andrei Petrovski

, Prapa Rattadilok, Sergey Petrovski
:
Designing a context-aware cyber physical system for detecting security threats in motor vehicles. 267-270 - Princy George, P. Vinod:

Machine learning approach for filtering spam emails. 271-274
Malware analysis
- Xuefei Wang, Hengtai Ma, Lisha Jing:

A dynamic marking method for implicit information flow in dynamic taint analysis. 275-282 - Shweta Bhandari

, Rishabh Gupta, Vijay Laxmi
, Manoj Singh Gaur, Akka Zemmari
, Maxim Anikeev
:
DRACO: DRoid analyst combo an android malware analysis framework. 283-289 - Jyoti Gajrani

, Jitendra Sarswat, Meenakshi Tripathi
, Vijay Laxmi
, Manoj Singh Gaur, Mauro Conti
:
A robust dynamic analysis system preventing SandBox detection by Android malware. 290-295 - Jithu Raphel, P. Vinod:

Information theoretic method for classification of packed and encoded files. 296-303 - Meenu Mary John, P. Vinod, K. A. Dhanya

:
Hartley's test ranked opcodes for Android malware analysis. 304-311
Security algorithms and analysis
- Andrey Shalyapin, Vadim Zhukov:

Case based analysis in information security incidents management system. 312-317 - Elvia León, Brayan S. Reyes Daza, Octavio J. Salcedo Parra:

Comparison between safety and efficient security of the ARP protocol. 318-321 - Bharat Buddhdev, Rati Bhan, Manoj Singh Gaur, Vijay Laxmi

:
DynaDroid: dynamic binary instrumentation based app behavior monitoring framework. 322-325 - Dmitry Mikhaylov

, Andrey Starikovskiy
, Grigoriy Lebedev, Dmitry Rubin, Alexey Egorov, Eugeniy Uleykin, Alexander Boruchinkin, Anastasia M. Tolstaya:
Developing a system for text-messages protection. 326-329 - N. V. Narendra Kumar, R. K. Shyamasundar:

Labelled mobile ambients model for information flow security in distributed systems. 330-337 - Valeriy O. Osipyan:

Mathematical modelling of cryptosystems based on Diophantine problem with gamma superposition method. 338-341

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














