Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/sin/sin2014.bht:"
@inproceedings{DBLP:conf/sin/AbtGB14, author = {Sebastian Abt and Sebastian G{\"{a}}rtner and Harald Baier}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {A Small Data Approach to Identification of Individuals on the Transport Layer using Statistical Behaviour Templates}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {25}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659681}, doi = {10.1145/2659651.2659681}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AbtGB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AdnanLRVLMR14, author = {Muhammad Adnan and Antonio Lima and Luca Rossi and Suresh Veluru and Paul A. Longley and Mirco Musolesi and Muttukrishnan Rajarajan}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {The Uncertainty of Identity Toolset: Analysing Digital Traces for User Profiling}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {254}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659741}, doi = {10.1145/2659651.2659741}, timestamp = {Wed, 26 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/AdnanLRVLMR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AgafinK14, author = {Sergey Agafin and Anton Krasnopevtsev}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Memory access time as entropy source for {RNG}}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {176}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659695}, doi = {10.1145/2659651.2659695}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AgafinK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AggarwalKS14, author = {Shivam Aggarwal and Vishal Kumar and S. D. Sudarsan}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Identification and Detection of Phishing Emails Using Natural Language Processing Techniques}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {217}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659691}, doi = {10.1145/2659651.2659691}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/AggarwalKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AgostaBPS14, author = {Giovanni Agosta and Alessandro Barenghi and Gerardo Pelosi and Michele Scandale}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {137}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659709}, doi = {10.1145/2659651.2659709}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/AgostaBPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AlAhmadA14, author = {Mohammad A. AlAhmad and Imad Fakhri Alshaikhli}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Design and Analysis of a New Hash Function Gear}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {128}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659652}, doi = {10.1145/2659651.2659652}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AlAhmadA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AlDabbaghSA14, author = {Sufyan Salim Mahmood AlDabbagh and Imad Fakhri Taha Al Shaikhli and Mohammad A. AlAhmad}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {{HISEC:} {A} New Lightweight Block Cipher Algorithm}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {151}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659662}, doi = {10.1145/2659651.2659662}, timestamp = {Fri, 09 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AlDabbaghSA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AlamSTC14, author = {Shahid Alam and Ibrahim Sogukpinar and Issa Traor{\'{e}} and Yvonne Coady}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {In-Cloud Malware Analysis and Detection: State of the Art}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {473}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659730}, doi = {10.1145/2659651.2659730}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/AlamSTC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AlamTS14, author = {Shahid Alam and Issa Traor{\'{e}} and Ibrahim Sogukpinar}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Current Trends and the Future of Metamorphic Malware Detection}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {411}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659670}, doi = {10.1145/2659651.2659670}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/AlamTS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AljahdaliP14, author = {Hani Moaiteq Aljahdali and Ron Poet}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Educated Guessing Attacks on Culturally Familiar Graphical Passwords Using Personal Information on Social Networks}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {272}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659727}, doi = {10.1145/2659651.2659727}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AljahdaliP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AljahdaliP14a, author = {Hani Moaiteq Aljahdali and Ron Poet}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Users' Perceptions of Recognition-Based Graphical Passwords: {A} Qualitative Study on Culturally Familiar Graphical Passwords}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {279}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659728}, doi = {10.1145/2659651.2659728}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AljahdaliP14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AlmehmadiE14, author = {Abdulaziz Almehmadi and Khalil El{-}Khatib}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {On the Possibility of Insider Threat Detection Using Physiological Signal Monitoring}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {223}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659654}, doi = {10.1145/2659651.2659654}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AlmehmadiE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AufnerMHW14, author = {Peter Aufner and Georg Merzdovnik and Markus Huber and Edgar R. Weippl}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {434}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659689}, doi = {10.1145/2659651.2659689}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AufnerMHW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BabenkoMBCT14, author = {Ludmila K. Babenko and Oleg B. Makarevich and Dmitry Bespalov and Roman Chesnokov and Yaroslav Trubnikov}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Instrumental System for Analysis of Information Systems Using Smart Cards Protection}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {339}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659714}, doi = {10.1145/2659651.2659714}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/BabenkoMBCT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BarakaT14, author = {Hifaa Bait Baraka and Huaglory Tianfield}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Intrusion Detection System for Cloud Environment}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {399}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659682}, doi = {10.1145/2659651.2659682}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/BarakaT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BellekensTARK14, author = {Xavier J. A. Bellekens and Christos Tachtatzis and Robert C. Atkinson and Craig Renfrew and Tony Kirkham}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {GLoP: Enabling Massively Parallel Incident Response Through {GPU} Log Processing}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {295}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659700}, doi = {10.1145/2659651.2659700}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/BellekensTARK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BellekensTARK14a, author = {Xavier J. A. Bellekens and Christos Tachtatzis and Robert C. Atkinson and Craig Renfrew and Tony Kirkham}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated Intrusion Detection Systems}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {302}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659723}, doi = {10.1145/2659651.2659723}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/BellekensTARK14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BhattSUCRS14, author = {Parth Bhatt and Johny de Souza and Nelson Uto and Jefferson Capovilla and Jose Resende and Danilo Suiama}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Implementation Aspects of MeterGoat, a Smart Meter Security Training Platform}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {284}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659744}, doi = {10.1145/2659651.2659744}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/BhattSUCRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BottazziM14, author = {Giovanni Bottazzi and Gianluigi Me}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {The Botnet Revenue Model}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {459}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659673}, doi = {10.1145/2659651.2659673}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/BottazziM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BurtykaM14, author = {Philipp Burtyka and Oleg B. Makarevich}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Symmetric Fully Homomorphic Encryption Using Decidable Matrix Equations}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {186}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659693}, doi = {10.1145/2659651.2659693}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/BurtykaM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/CaprinZ14, author = {Edward Caprin and Yan Zhang}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Negotiation Based Framework for Attribute-Based Access Control Policy Evaluation}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {122}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659667}, doi = {10.1145/2659651.2659667}, timestamp = {Mon, 15 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/CaprinZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/CholezF14, author = {Herv{\'{e}} Cholez and Christophe Feltus}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Towards an Innovative Systemic Approach of Risk Management}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {61}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659734}, doi = {10.1145/2659651.2659734}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/CholezF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ChowdhuryM14, author = {Niaz Morshed Chowdhury and Lewis M. Mackenzie}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Development of a Threat Model for Vehicular Ad-hoc Network based Accident Warning Systems}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {447}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659684}, doi = {10.1145/2659651.2659684}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/ChowdhuryM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ChowdhuryPM14, author = {Soumyadeb Chowdhury and Ron Poet and Lewis Mackenzie}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Exploring the Guessability of Image Passwords}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {264}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659699}, doi = {10.1145/2659651.2659699}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/ChowdhuryPM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ConradS14, author = {Bernd Conrad and Fatemeh Shirazi}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Analyzing the Effectiveness of DoS Attacks on Tor}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {355}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659707}, doi = {10.1145/2659651.2659707}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/ConradS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/DuncanW14, author = {Bob Duncan and Mark Whittington}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Compliance with standards, assurance and audit: does this equal security?}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {77}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659711}, doi = {10.1145/2659651.2659711}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/DuncanW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Elci14, author = {Atilla El{\c{c}}i}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Isn't the Time Ripe for a Standard Ontology on Security of Information and Networks?}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2664291}, doi = {10.1145/2659651.2664291}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/Elci14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/EvangelopoulouJ14, author = {Maria Evangelopoulou and Christopher W. Johnson}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Implementation of Safety Techniques in a Cyber Domain}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {261}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659740}, doi = {10.1145/2659651.2659740}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/EvangelopoulouJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/FeltusNP14, author = {Christophe Feltus and Damien Nicolas and Claude Poupart}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Towards a {HL7} based Metamodeling Integration Approach for Embracing the Privacy of Healthcare Patient Records Administration}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {109}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659674}, doi = {10.1145/2659651.2659674}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/FeltusNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/FerdousNP14, author = {Md. Sadek Ferdous and Gethin Norman and Ron Poet}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Mathematical Modelling of Identity, Identity Management and Other Related Topics}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {9}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659729}, doi = {10.1145/2659651.2659729}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/FerdousNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/GandotraBS14, author = {Ekta Gandotra and Divya Bansal and Sanjeev Sofat}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Integrated Framework for Classification of Malwares}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {417}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659738}, doi = {10.1145/2659651.2659738}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/GandotraBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/GargPGLL14, author = {Nishant Garg and Kuldeep Pareek and Manoj Singh Gaur and Vijay Laxmi and Chhagan Lal}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Analysis of Identity Forging Attack in MANETs}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {441}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659694}, doi = {10.1145/2659651.2659694}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/GargPGLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/GarkushaAM14, author = {Artem Garkusha and Evgeny Sergeevich Abramov and Oleg B. Makarevich}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {An effectiveness of application of {\textless}{\textless}Capture The Flag{\textgreater}{\textgreater} competitions concept within higher education (Student contribution)}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {43}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659732}, doi = {10.1145/2659651.2659732}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/GarkushaAM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/GohPVCKLE14, author = {Alwyn Goh and Geong Sen Poh and Voon{-}Yee Vee and Kok Boon Chong and Xin Zhe Khooi and Chanan Zhuo Ern Loh and Zhi Yuan Eng}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Human Visualisation of Cryptographic Code Using Progressive Multi-Scale Resolution}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {170}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659677}, doi = {10.1145/2659651.2659677}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/GohPVCKLE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Gudymenko14, author = {Ivan Gudymenko}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {A Privacy-Preserving E-Ticketing System for Public Transportation Supporting Fine-Granular Billing and Local Validation}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {101}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659706}, doi = {10.1145/2659651.2659706}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/Gudymenko14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/HochreinerHMW14, author = {Christoph Hochreiner and Markus Huber and Georg Merzdovnik and Edgar R. Weippl}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {17}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659680}, doi = {10.1145/2659651.2659680}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/HochreinerHMW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/HonarvarS14, author = {Ali Reza Honarvar and Ashkan Sami}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {{CBR} Clone Based Software Flaw Detection Issues}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {487}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659745}, doi = {10.1145/2659651.2659745}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/HonarvarS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/JaimanS14, author = {Vikas Jaiman and Gaurav Somani}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {An Order Preserving Encryption Scheme for Cloud Computing}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {211}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659678}, doi = {10.1145/2659651.2659678}, timestamp = {Thu, 14 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/JaimanS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KhanKRA14, author = {Fawad Khan and Sarmad Ullah Khan and Muhammad Roman and Muhammad Usman Abbasi}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Location Identity Based Content Security Scheme for Content Centric Networking}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {95}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659713}, doi = {10.1145/2659651.2659713}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/KhanKRA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KlinecM14, author = {Dusan Klinec and Vashek Maty{\'{a}}s}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Traversing symmetric {NAT} with predictable port allocation}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {543}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659698}, doi = {10.1145/2659651.2659698}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/KlinecM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KucuksilleYU14, author = {Ecir U. K{\"{u}}{\c{c}}{\"{u}}ksille and Mehmet Ali Yal{\c{c}}inkaya and Ozan U{\c{c}}ar}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Physical Dangers in the Cyber Security and Precautions to be Taken}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {310}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659731}, doi = {10.1145/2659651.2659731}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/KucuksilleYU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KumarKG14, author = {Rahul Kumar and Indraveni K and Aakash Kumar Goel}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Automated Session Fixation Vulnerability Detection in Web Applications using the Set-Cookie {HTTP} response header in cookies}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {351}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659718}, doi = {10.1145/2659651.2659718}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/KumarKG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KuriakoseP14, author = {Jikku Kuriakose and Vinod P.}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Towards the Detection of Undetectable Metamorphic Malware}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {373}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659715}, doi = {10.1145/2659651.2659715}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/KuriakoseP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/LahmerZ14, author = {Ibrahim Lahmer and Ning Zhang}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {MapReduce: {MR} Model Abstraction for Future Security Study}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {392}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659722}, doi = {10.1145/2659651.2659722}, timestamp = {Mon, 06 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/LahmerZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/LinSKI14, author = {Hui Lin and Adam J. Slagell and Zbigniew T. Kalbarczyk and Ravishankar K. Iyer}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Semantic Security Analysis of {SCADA} Networks to Detect Malicious Control Commands in Power Grids (Poster)}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {492}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659746}, doi = {10.1145/2659651.2659746}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/LinSKI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/MalyukM14, author = {Anatoly Malyuk and Natalia G. Miloslavskaya}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Information Security Theory Development}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {52}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659659}, doi = {10.1145/2659651.2659659}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/MalyukM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/MayerA14, author = {Nicolas Mayer and Jocelyn Aubert}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Sector-Specific Tool for Information Security Risk Management in the Context of Telecommunications Regulation (Tool demo)}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {85}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659665}, doi = {10.1145/2659651.2659665}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/MayerA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/MiloslavskayaSTZ14, author = {Natalia G. Miloslavskaya and Mikhail Senatorov and Alexander I. Tolstoy and Sergey Zapechnikov}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Big Data Information Security Maintenance}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {89}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659655}, doi = {10.1145/2659651.2659655}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/MiloslavskayaSTZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/MondalB14, author = {Soumik Mondal and Patrick Bours}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Continuous Authentication using Fuzzy Logic}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {231}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659720}, doi = {10.1145/2659651.2659720}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/MondalB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/NavalLGGR14, author = {Smita Naval and Vijay Laxmi and Neha Gupta and Manoj Singh Gaur and Muttukrishnan Rajarajan}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Exploring Worm Behaviors using {DTW}}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {379}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659737}, doi = {10.1145/2659651.2659737}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/NavalLGGR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/O14, author = {Valeriy O. Osipyan}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Mathematical model of the polyalphabetic information security system based on the normal generalized knapsack}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {180}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659658}, doi = {10.1145/2659651.2659658}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/O14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/PaulI14, author = {Greig Paul and James Irvine}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {A Protocol For Storage Limitations and Upgrades in Decentralised Networks}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {69}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659724}, doi = {10.1145/2659651.2659724}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/PaulI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/PaulI14a, author = {Greig Paul and James Irvine}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Privacy Implications of Wearable Health Devices}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {117}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659683}, doi = {10.1145/2659651.2659683}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/PaulI14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/PfefferHS14, author = {Tobias F. Pfeffer and Paula Herber and J{\"{o}}rg Schneider}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Reverse Engineering of {ARM} Binaries Using Formal Transformations}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {345}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659697}, doi = {10.1145/2659651.2659697}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/PfefferHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/PisarcikS14, author = {Peter Pisarc{\'{\i}}k and Pavol Sokol}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Framework for distributed virtual honeynets}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {324}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659685}, doi = {10.1145/2659651.2659685}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/PisarcikS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/PuttarooKA14, author = {Mohammad Puttaroo and Peter Komisarczuk and Renato Cordeiro de Amorim}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Challenges in developing Capture-HPC exclusion lists}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {334}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659717}, doi = {10.1145/2659651.2659717}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/PuttarooKA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/RahulamathavanPBRRS14, author = {Yogachandran Rahulamathavan and Pramod S. Pawar and Pete Burnap and Muttukrishnan Rajarajan and Omer F. Rana and George Spanoudakis}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Analysing Security requirements in Cloud-based Service Level Agreements}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {73}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659735}, doi = {10.1145/2659651.2659735}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/RahulamathavanPBRRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/RajaRBM14, author = {Kiran B. Raja and Ramachandra Raghavendra and Christoph Busch and Soumik Mondal}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {An Empirical Study of Smartphone Based Iris Recognition in Visible Spectrum}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {239}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659704}, doi = {10.1145/2659651.2659704}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/RajaRBM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/RamliD14, author = {Ahmad Kamal Ramli and Karim Djemame}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Autonomic management for convergent networks to support robustness of appliance technologies}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {47}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2660516}, doi = {10.1145/2659651.2660516}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/RamliD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/RjaibiR14, author = {Neila Rjaibi and Latifa Ben Arfa Rabai}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Deploying Suitable Countermeasures to Solve the Security Problems within an E-learning Environment}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {33}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659721}, doi = {10.1145/2659651.2659721}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/RjaibiR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/SaeedAJB14, author = {Ahmed Saeed and Ali Ahmadinia and Mike Just and Christophe Bobda}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {An {ID} and Address Protection Unit for NoC based Communication Architectures}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {288}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659719}, doi = {10.1145/2659651.2659719}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/SaeedAJB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/SainiGBS14, author = {Ashish Saini and Ekta Gandotra and Divya Bansal and Sanjeev Sofat}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Classification of {PE} Files using Static Analysis}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {429}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659679}, doi = {10.1145/2659651.2659679}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/SainiGBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/SairamKB14, author = {Ashok Singh Sairam and Rahul Kumar and Pratima Biswas}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Implementation of an Adaptive Traffic-aware Firewall}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {385}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659739}, doi = {10.1145/2659651.2659739}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/SairamKB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/SarrisMC14, author = {Paraskevas Sarris and Lewis Mackenzie and Soumyadeb Chowdhury}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {A Novel Authentication Scheme for Online Transactions}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {483}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659743}, doi = {10.1145/2659651.2659743}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/SarrisMC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ShahriarH14, author = {Hossain Shahriar and Hisham M. Haddad}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Content Provider Leakage Vulnerability Detection in Android Applications}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {359}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659716}, doi = {10.1145/2659651.2659716}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/ShahriarH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Sharbaf14, author = {Mehrdad Sepehri Sharbaf}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {A New Perspective to Information Security: Total Quality Information Security Management}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {56}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659666}, doi = {10.1145/2659651.2659666}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/Sharbaf14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/SharmaK14, author = {Avani Sharma and Rajbir Kaur}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Non-cryptographic Detection Approach and Countermeasure for {JFDV} Attack}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {367}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659657}, doi = {10.1145/2659651.2659657}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/SharmaK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Sheykhkanloo14, author = {Naghmeh Moradpoor Sheykhkanloo}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Employing Neural Networks for the Detection of {SQL} Injection Attack}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {318}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659675}, doi = {10.1145/2659651.2659675}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/Sheykhkanloo14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/SinghBS14, author = {Amardeep Singh and Divya Bansal and Sanjeev Sofat}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {An Approach of Privacy Preserving based Publishing in Twitter}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {39}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659733}, doi = {10.1145/2659651.2659733}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/SinghBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/SinghBS14a, author = {Monika Singh and Divya Bansal and Sanjeev Sofat}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Detecting Malicious Users in Twitter using Classifiers}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {247}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659736}, doi = {10.1145/2659651.2659736}, timestamp = {Mon, 28 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/SinghBS14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/SoederB14, author = {Brian A. Soeder and K. Suzanne Barber}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Trustworthiness of Identity Attributes}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {4}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659708}, doi = {10.1145/2659651.2659708}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/SoederB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/StepanovaZ14, author = {Tatiana V. Stepanova and Dmitry P. Zegzhda}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Applying Large-scale Adaptive Graphs to Modeling Internet of Things Security}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {479}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659696}, doi = {10.1145/2659651.2659696}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/StepanovaZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/TezcanTD14, author = {Cihangir Tezcan and Halil Kemal Taskin and Murat Demircioglu}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Improbable Differential Attacks on Serpent using Undisturbed Bits}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {145}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659660}, doi = {10.1145/2659651.2659660}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/TezcanTD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Tiloca14, author = {Marco Tiloca}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Efficient Protection of Response Messages in DTLS-Based Secure Multicast Communication}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {466}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659668}, doi = {10.1145/2659651.2659668}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/Tiloca14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Trepacheva14, author = {Alina Trepacheva}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Cryptanalysis of Polynomial based Homomorphic Encryption}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {205}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659712}, doi = {10.1145/2659651.2659712}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/Trepacheva14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/TrepachevaB14, author = {Alina Trepacheva and Liudmila Babenko}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Known Plaintexts Attack on Polynomial based Homomorphic Encryption}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {157}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659692}, doi = {10.1145/2659651.2659692}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/TrepachevaB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/UnalS14, author = {Ecem {\"{U}}nal and Erkay Savas}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Bandwidth-Optimized Parallel Private Information Retrieval}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {197}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659702}, doi = {10.1145/2659651.2659702}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/UnalS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/VasilomanolakisKMF14, author = {Emmanouil Vasilomanolakis and Shankar Karuppayah and Max M{\"{u}}hlh{\"{a}}user and Mathias Fischer}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {HosTaGe: a Mobile Honeypot for Collaborative Defense}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {330}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659663}, doi = {10.1145/2659651.2659663}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/VasilomanolakisKMF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/VorakulpipatPS14, author = {Chalee Vorakulpipat and Chantri Polprasert and Siwaruk Siwamogsatham}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Managing Mobile Device Security in Critical Infrastructure Sectors}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {65}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659742}, doi = {10.1145/2659651.2659742}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/VorakulpipatPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/WeldemariamSD14, author = {Komminist Weldemariam and Hossain Shahriar and Vamshee Krishna Devendran}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Dynamic Analysis of Web Objects}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {423}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659671}, doi = {10.1145/2659651.2659671}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/WeldemariamSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/WinTMSR14, author = {Thu Yein Win and Huaglory Tianfield and Quentin Mair and Taimur Al Said and Omer F. Rana}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Virtual Machine Introspection}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {405}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659710}, doi = {10.1145/2659651.2659710}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/WinTMSR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ZanjaniAC14, author = {Maryam Farajzadeh{-}Zanjani and Seyed Masoud Alavi Abhari and Alexander G. Chefranov}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Group Key Exchange Protocol Based on Diffie-Hellman Technique in Ad-Hoc Network}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {166}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659725}, doi = {10.1145/2659651.2659725}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/ZanjaniAC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sin/2014, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2659651}, isbn = {978-1-4503-3033-6}, timestamp = {Fri, 12 Dec 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.