default search action
7th CRiSIS 2012: Cork, Ireland
- Fabio Martinelli, Jean-Louis Lanet, William M. Fitzgerald, Simon N. Foley:
7th International Conference on Risks and Security of Internet and Systems, CRiSIS 2012, Cork, Ireland, October 10-12, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-3087-9 - Ryma Abassi, Sihem Guemara El Fatmi:
Trust-based delegation for Ad Hoc QoS enhancing. 1-7 - Khalifa Toumi, César Andrés, Ana R. Cavalli, Mazen El Maarabani:
A vector based model approach for defining trust in Multi-Organization Environments. 1-8 - Estanislao Mercadal, Guillermo Navarro-Arribas, Simon N. Foley, Joan Borrell:
Towards efficient access control in a mobile agent based wireless sensor network. 1-4 - Jesus Luna Garcia, Neeraj Suri, Ioannis Krontiris:
Privacy-by-design based on quantitative threat modeling. 1-8 - Siwar Kriaa, Marc Bouissou, Ludovic Piètre-Cambacédès:
Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments. 1-8 - Romaric Ludinard, Eric Totel, Frederic Tronel, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy:
Detecting attacks against data in web applications. 1-8 - Matthias Wachs, Christian Grothoff, Ramakrishna Thurimella:
Partitioning the Internet. 1-8 - Yousra Chabchoub, Christine Fricker, Philippe Robert:
Improving the detection of on-line vertical port scan in IP traffic. 1-6 - R. Joshua Tobin, David Malone:
Hash pile ups: Using collisions to identify unknown hash functions. 1-6 - Claude Fachkha, Elias Bou-Harb, Amine Boukhtouta, Son Dinh, Farkhund Iqbal, Mourad Debbabi:
Investigating the dark cyberspace: Profiling, threat-based analysis and correlation. 1-8 - Sebastian Poeplau, Jan Gassen:
A honeypot for arbitrary malware on USB storage devices. 1-8 - Ahmed F. Shosha, Chen-Ching Liu, Pavel Gladyshev, Marcus Matten:
Evasion-resistant malware signature based on profiling kernel data structure objects. 1-8 - Manuel García-Cervigón, Manel Medina Llinàs:
Browser function calls modeling for banking malware detection. 1-7 - Kat Krol, Matthew Moroz, Martina Angela Sasse:
Don't work. Can't work? Why it's time to rethink security warnings. 1-8 - Lazaros Kyrillidis, Sheila Cobourne, Keith Mayes, Song Dong, Konstantinos Markantonakis:
Distributed e-voting using the Smart Card Web Server. 1-8 - William M. Fitzgerald, Fatih Turkmen, Simon N. Foley, Barry O'Sullivan:
Anomaly analysis for Physical Access Control security configuration. 1-8 - Géraldine Vache Marconato, Vincent Nicomette, Mohamed Kaâniche:
Security-related vulnerability life cycle analysis. 1-8 - Monia Ben Brahim, Tarak Chaari, Maher Ben Jemaa, Mohamed Jmaiel:
Semantic matching of web services security policies. 1-8 - Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati:
Managing and accessing data in the cloud: Privacy risks and approaches. 1-9 - Stephen Farrell:
CRiSIS 2012 security standards tutorial. 1-4 - Stefano Bistarelli, Francesco Santini:
Semiring-based constraint models and frameworks for security-related scenarios. 1-4 - Jean-Louis Lanet:
Attacks against smart cards: Hands on session. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.