default search action
MMM-ACNS 2012: St. Petersburg, Russia
- Igor V. Kotenko, Victor A. Skormin:
Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings. Lecture Notes in Computer Science 7531, Springer 2012, ISBN 978-3-642-33703-1
Invited Papers
- Benjamin Livshits:
Finding Malware on a Web Scale. 1-2 - Zhaohui Wang, Ryan Johnson, Rahul Murmuria, Angelos Stavrou:
Exposing Security Risks for Commercial Mobile Devices. 3-21 - Fabio Martinelli, Ilaria Matteucci, Charles Morisset:
From Qualitative to Quantitative Enforcement of Security Policy. 22-35 - Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar, Bhavani Thuraisingham:
Design and Implementation of a Cloud-Based Assured Information Sharing System. 36-50
Applied Cryptography and Security Protocols
- Viktor Yakovlev, Valery I. Korzhik, Mihail Bakaev, Guillermo Morales-Luna:
Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries. 51-64 - Joe-Kai Tsay, Stig Fr. Mjølsnes:
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols. 65-76 - Alexander A. Moldovyan, Nikolay A. Moldovyan, Evgenia Novikova:
Blind 384-bit Digital Signature Scheme. 77-83
Access Control and Information Protection
- Xin Jin, Ravi S. Sandhu, Ram Krishnan:
RABAC: Role-Centric Attribute-Based Access Control. 84-96 - Vladimir A. Oleshchuk:
Trust-Aware RBAC. 97-107 - Alexander A. Grusho, Nikolai A. Grusho, Elena E. Timonina:
Alternative Mechanisms for Information Security. 108-113
Security Policies
- Josée Desharnais, Erwanne P. Kanyabwero, Nadia Tawbi:
Enforcing Information Flow Policies by a Three-Valued Analysis. 114-129 - Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Towards the Orchestration of Secured Services under Non-disclosure Policies. 130-145 - Andrey Chechulin, Igor V. Kotenko, Vasily Desnitsky:
An Approach for Network Information Flow Analysis for Systems of Embedded Components. 146-155
Security Event and Information Management
- Gustavo Gonzalez Granadillo, Hervé Debar, Grégoire Jacob, Chrystel Gaber, Mohammed Achemlal:
Individual Countermeasure Selection Based on the Return On Response Investment Index. 156-170 - Roland Rieke, Luigi Coppolino, Andrew Hutchison, Elsa Prieto, Chrystel Gaber:
Security and Reliability Requirements for Advanced Security Event Management. 171-180 - Julian Schütte, Roland Rieke, Timo Winkelvos:
Model-Based Security Event Management. 181-190
Intrusion Prevention, Detection, and Response
- Andrey M. Dolgikh, Tomas Nykodym, Victor A. Skormin, Zachary Birnbaum:
Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks. 191-202 - Yosra Ben Mustapha, Hervé Debar, Grégoire Jacob:
Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation. 203-217 - Dmitry P. Zegzhda, Tatiana V. Stepanova:
Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems. 218-225
Anti-malware Techniques
- Chaitanya Yavvari, Arnur G. Tokhtabayev, Huzefa Rangwala, Angelos Stavrou:
Malware Characterization Using Behavioral Components. 226-239 - Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra:
MADAM: A Multi-level Anomaly Detector for Android Malware. 240-253 - Dmitriy Komashinskiy, Igor V. Kotenko:
Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods. 254-269
Security Modeling and Cloud Security
- Vasily Desnitsky, Igor V. Kotenko, Andrey Chechulin:
Configuration-Based Approach to Embedded Device Security. 270-285 - Brendan Kerrigan, Yu Chen:
A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts. 286-298 - Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin, Artem S. Konoplev:
Security Modeling of Grid Systems Using Petri Nets. 299-308 - Peter D. Zegzhda, Dmitry P. Zegzhda, Alexey V. Nikolskiy:
Using Graph Theory for Cloud System Security Modeling. 309-318
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.