default search action
9th CRiSIS 2014: Trento, Italy
- Javier López, Indrajit Ray, Bruno Crispo:
Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8924, Springer 2015, ISBN 978-3-319-17126-5 - Matti Mantere, Mirko Sailio, Sami Noponen:
Detecting Anomalies in Printed Intelligence Factory Network. 1-16 - Cristina Alcaraz, Lorena Cazorla, Gerardo Fernandez:
Context-Awareness Using Anomaly-Based Detectors for Smart Grid Domains. 17-34 - George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis:
Automated Detection of Logical Errors in Programs. 35-51 - Ana Nieto:
Evaluation of Dynamic Instantiation in CPRM-Based Systems. 52-66 - Zakaria Sahnoune, Cheu Yien Yep, Esma Aïmeur:
Privacy Issues in Geosocial Networks. 67-82 - Andrea Burattin, Giuseppe Cascavilla, Mauro Conti:
SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks. 83-99 - Mouna Selmi, Hicham Hage, Esma Aïmeur:
Latent Semantic Analysis for Privacy Preserving Peer Feedback. 100-115 - Alexander Schaub, Emmanuel Schneider, Alexandros Hollender, Vinicius Calasans, Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guilley, Olivier Rioul:
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms. 116-130 - Philipp Marcus, Lorenz Schauer, Claudia Linnhoff-Popien:
Location-Aware RBAC Based on Spatial Feature Models and Realistic Positioning. 131-147 - Cataldo Basile, Daniele Canavese, Antonio Lioy, Fulvio Valenza:
Inter-technology Conflict Analysis for Communication Protection Policies. 148-163 - Ratinder Kaur, Maninder Singh:
Two-Level Automated Approach for Defending Against Obfuscated Zero-Day Attacks. 164-179 - Graham Hili, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis:
Practical Attacks on Virtual Worlds. 180-195 - Hana Fahim-Hashemi, Mohammad Zulkernine, Komminist Weldemariam:
TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks. 196-212 - Donia El Kateb, Yehia ElRakaiby, Tejeddine Mouelhi, Iram Rubab, Yves Le Traon:
Towards a Full Support of Obligations in XACML. 213-221 - Samira Haguouche, Zahi Jarir:
Managing Heterogeneous Access Control Models Cross-Organization. 222-229 - Khalifa Toumi, Fabien Autrel, Ana R. Cavalli, Sammy Haddad:
ISER: A Platform for Security Interoperability of Multi-source Systems. 230-238 - Yuto Nakano, Anirban Basu, Shinsaku Kiyomoto, Yutaka Miyake:
Key Extraction Attack Using Statistical Analysis of Memory Dump Data. 239-246 - Annika Baumann, Benjamin Fabian:
How Robust is the Internet? - Insights from Graph Analysis. 247-254 - Zhe Wang, Naftaly H. Minsky:
Regularity Based Decentralized Social Networks. 255-262 - Esma Aïmeur:
Online Privacy: Risks, Challenges, and New Trends. 263-266 - Josep Domingo-Ferrer, Jordi Soria-Comas:
Data Anonymization. 267-271 - Yury Zhauniarovich:
Security of the Android Operating System. 272-274
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.