default search action
4th CyberSec 2015: Jakarta, Indonesia
- Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-8499-5
Cyber Security
- Manh Cong Tran, Yasuhiro Nakamura:
An Approach to Mine Suspicious Domain Based on HTTP Automated Software Communication Behavior. 1-5 - Mikhail Styugin:
Analysis of Awareness Structures in Information Security Systems. 6-10 - Dwiki Jatikusumo, Hanny Hikmayanti H., Feriadi, Wendi Usino:
Securing Official Account Twitter Using Social Media Management System: Accuracy of the Data and Information Publish with Twitter. 11-15 - Kazuki Hashimoto, Hiroyuki Hiruma, Takashi Matsumoto, Kosetus Kayama, Yoshio Kaikizaki, Hiroshi Yamaki, Tetsutaro Uehara, Ryôichi Sasaki:
Development of Intellectual Network Forensic System LIFT against Targeted Attacks. 16-21 - Chyquitha Danuputri, Teddy Mantoro, Mardi Hardjianto:
Data Security Using LSB Steganography and Vigenere Chiper in an Android Environment. 22-27 - Ryohei Koizumi, Ryôichi Sasaki:
Study on Countermeasures Using Mitigation Software against Vulnerability Attacks. 28-33 - Ahmad Budi Setiawan, Aries Syamsudin, Ashwin Sasongko Sastrosubroto:
Implementation of Secure Smart Grid as Critical Information Infrastructure in Indonesia: A Case Study in Smart Grid Electricity. 34-39 - Makoto Sato, Akihiko Sugimoto, Naoki Hayashi, Yoshiaki Isobe, Ryôichi Sasaki:
Proposal of a Method for Identifying the Infection Route for Targeted Attacks Based on Malware Behavior in a Network. 40-45 - Naoto Nakagawa, Yoshimi Teshigawara, Ryôichi Sasaki:
Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation. 46-51 - Takumi Akiyama, Kazuya Otani, Yoshio Kakizaki, Ryôichi Sasaki:
Evaluation of a Risk-Based Management Method for Online Accounts. 52-57 - Ali Tamimi, D. Subbaram Naidu, Sanaz Kavianpour:
An Intrusion Detection System Based on NSGA-II Algorithm. 58-61
Cyber Crimes
- Victor Wahanggara, Yudi Prayudi:
Malware Detection through Call System on Android Smartphone Using Vector Machine Method. 62-67 - Teddy Mantoro, M. Iman Wahyudi, Media A. Ayu, Wendi Usino:
Real-Time Printed Document Authentication Using Watermarked QR Code. 68-72 - Delwar Alam, Md. Alamgir Kabir, Touhid Bhuiyan, Tanjila Farah:
A Case Study of SQL Injection Vulnerabilities Assessment of .bd Domain Web Applications. 73-77
Information Assurance and Security Management
- Abdullah Said Alkalbani, Teddy Mantoro, Sardjoeni Moedjiono, Media A. Ayu:
Hybrid Solution for Secured and Energy Aware Routing Path in Wireless Sensor Networks. 78-83 - Nabil Laoufi:
From Risk Analysis to the Expression of Security Requirements for Systems Information. 84-89 - Herny Ramadhani Mohd Husny Hamid, Megat Ahmad Izzat bin Megat Ahmad Kamil, Norhaiza Ya Abdullah:
Portable Toolkit for Penetration Testing and Firewall Configuration. 90-94 - Hyoseok Yoon, Se-Ho Park, Kyung-Taek Lee:
Exploiting Ambient Light Sensor for Authentication on Wearable Devices. 95-100
Digital Forensics
- Muhammad Hilmi Kamarudin, Carsten Maple, Tim Watson, Hasliza Sofian:
Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R Attacks. 101-106 - Mohammad Ahmad Abu Allawi, Ali Hadi, Arafat Awajan:
MLDED: Multi-layer Data Exfiltration Detection System. 107-112 - Sriram Raghavan, S. V. Raghavan:
Estimating Posterior Probabilities to Identify Breach Points during Cyber-attacks. 113-116 - Ahmad Luthfi, Yudi Prayudi:
Process Model of Digital Forensics Readiness Scheme (DFRS) as a Recommendation of Digital Evidence Preservation. 117-122 - Normaziah Abdul Aziz, Fakhrulrazi Mokhti, M. Nadhar M. Nozri:
Mobile Device Forensics: Extracting and Analysing Data from an Android-Based Smartphone. 123-128
Security Protocols
- Mohammad Imran, Muhammad Tanvir Afzal, Muhammad Abdul Qadir:
Similarity-Based Malware Classification Using Hidden Markov Model. 129-134
Cyber Peace-Fare and Physical Security
- Herny Ramadhani Mohd Husny Hamid, Norhaiza Ya Abdullah:
Physical Authentication Using Random Number Generated (RNG) Keypad Based on One Time Pad (OTP) Concept. 135-139
Biometrics Applications
- Norhaiza Ya Abdullah, Herny Ramadhani Mohd Husny Hamid:
Folder Lock by Using Multimodal Biometric: Fingerprint and Signature Authentication. 140-145
Laws and Regulations
- P. D. Persadha, A. A. Waskita, S. Yazid:
Comparative Study of Cyber Security Policies among Malaysia, Australia, Indonesia: A Responsibility Perspective. 146-150
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.