default search action
70th Birthday: Sushil Jajodia , 2018
- Pierangela Samarati, Indrajit Ray, Indrakshi Ray:
From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday. Lecture Notes in Computer Science 11170, Springer 2018, ISBN 978-3-030-04833-4 - Massimiliano Albanese:
From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field. 1-23 - Saptarshi Das, Barsha Mitra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Policy Engineering in RBAC and ABAC. 24-54 - Ramaswamy Chandramouli:
Comprehensive Security Assurance Measures for Virtualized Server Environments. 55-77 - Frédéric Cuppens, Nora Cuppens-Boulahia:
Stratification Based Model for Security Policy with Exceptions and Contraries to Duty. 78-103 - George Cybenko, Gabriel Fortunato Stocco:
Asymptotic Behavior of Attack Graph Games. 104-112 - Stelvio Cimato, Ernesto Damiani:
Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything. 113-124 - Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati:
Protecting Resources and Regulating Access in Cloud-Based Object Storage. 125-142 - Yvo Desmedt, Arash Shaghaghi:
Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations. 143-165 - Roberto Di Pietro, Flavio Lombardi:
Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives. 166-185 - Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Access Privacy in the Cloud. 186-205 - Rajesh Ganesan, Ankit Shah:
A Strategy for Effective Alert Analysis at a Cyber Security Operations Center. 206-226 - Tao Lin, Chen Zhong, John Yen, Peng Liu:
Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers. 227-243 - Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Vincenzo Piuri, Pierangela Samarati:
Supporting Users in Cloud Plan Selection. 244-260 - Mauro Conti, Edlira Dushku, Luigi V. Mancini:
Distributed Services Attestation in IoT. 261-273 - Sharad Mehrotra, Kerim Yasin Oktay, Shantanu Sharma:
Exploiting Data Sensitivity on Partitioned Data. 274-299 - Steven Noel:
A Review of Graph Approaches to Network Security Analytics. 300-323 - Angelo Genovese, Enrique Muñoz Ballester, Vincenzo Piuri, Fabio Scotti:
Advanced Biometric Technologies: Emerging Scenarios and Research Trends. 324-352 - Bruhadeshwar Bezawada, Indrakshi Ray:
Attribute-Based Encryption: Applications and Future Directions. 353-374 - Sankardas Roy, Dewan Chaulagain, Shiva Bhusal:
Static Analysis for Security Vetting of Android Apps. 375-404 - Shang Li, Srijan Kumar, Tudor Dumitras, V. S. Subrahmanian:
Breaking Bad: Forecasting Adversarial Android Bad Behavior. 405-431 - Zi Chu, Steven Gianvecchio, Haining Wang:
Bot or Human? A Behavior-Based Online Bot Detection System. 432-449 - Lingyu Wang, Mengyuan Zhang, Anoop Singhal:
Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks. 450-469 - Karim Eldefrawy, Rafail Ostrovsky, Moti Yung:
Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation. 470-486
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.