


default search action
4th NSS 2010: Melbourne, Australia
- Yang Xiang, Pierangela Samarati, Jiankun Hu, Wanlei Zhou, Ahmad-Reza Sadeghi:
Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-8484-3
NSS 2010 Regular Papers
- Mohamed Nassar
, Radu State, Olivier Festor
:
A Framework for Monitoring SIP Enterprise Networks. 1-8 - Ion Alberdi, Vincent Nicomette, Philippe Owezarski:
Luth: Composing and Parallelizing Midpoint Inspection Devices. 9-16 - Kun Peng, Feng Bao:
Efficient Proof of Validity of Votes in Homomorphic E-Voting. 17-23 - Sebastian Roschke, Feng Cheng, Christoph Meinel:
A Flexible and Efficient Alert Correlation Platform for Distributed IDS. 24-31 - McKay D. Williams, Sheldon A. Munns, Michael A. Temple, Michael J. Mendenhall:
RF-DNA Fingerprinting for Airport WiMax Communications Security. 32-39 - Thomas H. Clausen
, Ulrich Herberg:
Router and Link Admittance Control in the Optimized Link State Routing Protocol Version 2 (OLSRv2). 40-46 - Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel, Alexandre Dulaunoy:
Breaking Tor Anonymity with Game Theory and Data Mining. 47-54 - Hao Gao, Jun Yan
, Yi Mu:
Dynamic Trust Model for Federated Identity Management. 55-61 - Peter Danner, Daniel M. Hein, Stefan Kraxberger:
Securing Emergency Response Operations Using Distributed Trust Decisions. 62-69 - Qiang Liu, Jianping Yin, Zhiping Cai, Ming Zhu:
A Novel Threat Assessment Method for DDoS Early Warning Using Network Vulnerability Analysis. 70-74 - Mohammed Al Zomai, Audun Jøsang
:
The Mobile Phone as a Multi OTP Device Using Trusted Computing. 75-82 - Jinchao Xu, Guosun Zeng:
A Software Watermarking Algorithm Based on Stack-State Transition Graph. 83-88 - Mansoor Alicherry, Angelos D. Keromytis:
DIPLOMA: Distributed Policy Enforcement Architecture for MANETs. 89-98 - Xiaoxun Sun, Hua Wang
:
Towards Identify Anonymization in Large Survey Rating Data. 99-104 - Alban Gabillon, Léo Letouzey:
A View Based Access Control Model for SPARQL. 105-112 - Li Lin, Christopher Leckie
, Chenfeng Vincent Zhou:
Comparative Analysis of HTTP Anomaly Detection Algorithms: DFA vs N-Grams. 113-119 - Andrew White, Alan Tickle, Andrew J. Clark:
Overcoming Reputation and Proof-of-Work Systems in Botnets. 120-127 - Yinghua Guo, Matthew Simon:
Network Forensics in MANET: Traffic Analysis of Source Spoofed DoS Attacks. 128-135 - Chunli Lv, Xiaoqi Jia, Lijun Tian, Jiwu Jing, Mingli Sun:
Efficient Ideal Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR Operations. 136-143 - Aashish Sharma, Zbigniew Kalbarczyk, Ravishankar K. Iyer, James Barlow:
Analysis of Credential Stealing Attacks in an Open Networked Environment. 144-151 - Richard O. Sinnott
, Sardar Hussain:
Security-Oriented Workflows for the Social Sciences. 152-159 - Fengyu Wang, Bin Gong, Shanqing Guo, Xiaofeng Wang:
Monitoring Heavy-Hitter Flows in High-Speed Network Concurrently. 160-166 - Chaabane Abdelberi, Pere Manils, Mohamed Ali Kâafar
:
Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network. 167-174 - Suriadi Suriadi, Andrew J. Clark, Desmond Allan Schmidt:
Validating Denial of Service Vulnerabilities in Web Services. 175-182 - Juan E. Tapiador
, John A. Clark:
Information-Theoretic Detection of Masquerade Mimicry Attacks. 183-190 - Reginald Lal, Andrew Chiou:
Computational Intelligence Utilisation in Simulation of Congestion Control in TCP/IP Edge Network. 191-198 - Kobra Khanmohammadi, Siv Hilde Houmb:
Business Process-Based Information Security Risk Assessment. 199-206 - Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus:
Risk-Aware Framework for Activating and Deactivating Policy-Based Response. 207-215 - Shan Juan Xie, Sook Yoon, Hui Gong, Jin Wook Shin, Dong Sun Park:
Fingerprint Reference Point Determination Based on Orientation Features. 216-222 - Anya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Claire Goursaud, Cédric Lauradoux, Marine Minier:
Energy Friendly Integrity for Network Coding in Wireless Sensor Networks. 223-230 - Alessandro Artale, Bruno Crispo, Fausto Giunchiglia, Fatih Turkmen
, Rui Zhang:
Reasoning about Relation Based Access Control. 231-238 - Hua Wang
, Lili Sun:
Trust-Involved Access Control in Collaborative Open Social Networks. 239-246 - Sheng Wen
, Weijia Jia
, Wei Zhou, Wanlei Zhou
, Chuan Xu:
CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd. 247-254
NSS 2010 Short Papers
- Islam Tharwat Abdel-Halim
, Hossam M. A. Fahmy, Ayman M. Bahaa El-Din
, Mohamed H. El-Shafey:
Agent-Based Trusted On-Demand Routing Protocol for Mobile Ad Hoc Networks. 255-262 - Sheila Becker, Humberto J. Abdelnur, Jorge Lucángeli Obes, Radu State, Olivier Festor:
Improving Fuzz Testing Using Game Theory. 263-268 - Adonis P. H. Fung, K. W. Cheung:
HTTPSLock: Enforcing HTTPS in Unmodified Browsers with Cached Javascript. 269-274 - Raihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar
:
A Node-based Trust Management Scheme for Mobile Ad-Hoc Networks. 275-280 - Lifang Zi, John Yearwood, Xinwen Wu
:
Adaptive Clustering with Feature Ranking for DDoS Attacks Detection. 281-286 - Ahmad Jabas, Wael Abdulal, Ramachandram Sirandas
:
An Efficient and High Scalable Key Distribution Scheme for Mobile Ad Hoc Network through Mining Traffic Meta-data Patterns. 287-292 - Yinghua Guo, Ivan Lee
:
Forensic Analysis of DoS Attack Traffic in MANET. 293-298 - Robert Koch, Gabi Dreo Rodosek:
Command Evaluation in Encrypted Remote Sessions. 299-305 - Rong-Jian Chen, Yu-Cheng Peng, Jun-Jian Lin, Jui-Lin Lai, Shi-Jinn Horng:
Novel Multi-bit Bitwise Adaptive Embedding Algorithms with Minimum Error for Data Hiding. 306-311 - Qussai Yaseen
, Brajendra Panda:
Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders' Knowledgebase. 312-317 - Liang Fu Lu, Mao Lin Huang
, Mehmet A. Orgun
, Jiawan Zhang:
An Improved Wavelet Analysis Method for Detecting DDoS Attacks. 318-322 - Patryk Szewczyk
, Craig Valli
:
Ignorant Experts: Computer and Network Security Support from Internet Service Providers. 323-327 - Ray Hunt, Jill Slay
:
The Design of Real-Time Adaptive Forensically Sound Secure Critical Infrastructure. 328-333 - Eun-Jun Yoon, Kee-Young Yoo:
A Three-Factor Authenticated Key Agreement Scheme for SIP on Elliptic Curves. 334-339 - Oscar Moreno, Andrew Z. Tirkel
, Ron G. van Schyndel, Parampalli Udaya
:
New Families of 2D & 3D Arrays for Sub-image Watermarking. 340-344 - M. Manzur Murshed
, Tishna Sabrina, Anindya Iqbal, Kh Mahmudul Alam:
A Novel Anonymization Technique to Trade Off Location Privacy and Data Integrity in Participatory Sensing Systems. 345-350 - Shamsul Kamal Ahmad Khalid
, Jacob Zimmermann, Diane Corney, Colin J. Fidge
:
Automatic Generation of Assertions to Detect Potential Security Vulnerabilities in C Programs That Use Union and Pointer Types. 351-356 - Thaneswaran Velauthapillai, Aaron Harwood
, Shanika Karunasekera
:
Global Detection of Flooding-Based DDoS Attacks Using a Cooperative Overlay Network. 357-364 - Steven Simpson
, Adam T. Lindsay, David Hutchison
:
Identifying Legitimate Clients under Distributed Denial-of-Service Attacks. 365-370 - Matthieu-P. Schapranow
, Alexander Zeier, Hasso Plattner:
A Dynamic Mutual RFID Authentication Model Preventing Unauthorized Third Party Access. 371-376 - Ping Li, Wanlei Zhou
, Yini Wang:
Getting the Real-Time Precise Round-Trip Time for Stepping Stone Detection. 377-382
First International Conference on Data and Knowledge Engineering (ICDKE 2010)
Modeling
- Md. Shamsul Huda, John Yearwood, Ron Borland:
Cluster Based Rule Discovery Model for Enhancement of Government's Tobacco Control Strategy. 383-390 - Min Li, Hua Wang
:
Specifying Usage Control Model with Object Constraint Language. 391-397 - António Rosado, João M. P. Cardoso
:
A Query Processing Strategy for Conceptual Queries Based on Object-Role Modeling. 398-403 - Heng-Sheng Tsai, Raj Gururajan:
The Enablers and Implementation Model for Mobile KMS in Australian Healthcare. 404-411
Algorithms
- Yuping Wang, Lei Fan:
A Smoothing Evolutionary Algorithm with Circle Search for Global Optimization. 412-418 - Yi Zhuang:
The PU-Tree: A Partition-Based Uncertain High-Dimensional Indexing Algorithm. 419-424 - Bing-Yuan Pu, Ting-Zhu Huang
, Chun Wen:
An Improved PageRank Algorithm: Immune to Spam. 425-429 - Chuan-Long Wang, Yan-Ping Wang:
The Convergences of Multisplitting Parallel Methods for Non-Hermitian Positive Definite Systems. 430-434
System Approach
- Md. Enamul Kabir, Hua Wang
:
Systematic Clustering-Based Microaggregation for Statistical Disclosure Control. 435-441 - Md. Shamsul Huda, John Yearwood, Andrew Stranieri
:
Hybrid Wrapper-Filter Approaches for Input Feature Selection Using Maximum Relevance and Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA). 442-449 - Ping Li, Guangdong Huang:
Credit Spread Option Pricing by Dynamic Copulas. 450-455 - Eder Mateus Nunes Gonçalves
:
An Approach to Specify Knowledge in Multi-agent Systems Using Petri Nets. 456-461 - Abdul Hafeez-Baig
, Raj Gururajan, Heng-Sheng Tsai, Prema Sankaran
:
Exploratory Study to Explore the Role of ICT in the Process of Knowledge Management in an Indian Business Environment. 462-469
Knowledge Discovery
- Ahmad Ali Iqbal, Maximilian Ott
, Aruna Seneviratne
:
Resource Selection from Distributed Semantic Web Stores. 470-476 - D. Marks, Elias Ioup, John Sample, Mahdi Abdelguerfi, Fady Qaddoura:
Spatio-temporal Knowledge Discovery in Very Large METOC Data Sets. 477-480 - Yonglong Luo, Lei Shi, Caiyun Zhang, Ji Zhang:
Privacy-Preserving Protocols for String Matching. 481-485
Database and Applications
- Lili Sun, Hua Wang
, Raj Jururajin, Sri Sriprakash:
A Purpose Based Access Control in XML Databases System. 486-493 - Ji Zhang:
An Efficient and Effective Duplication Detection Method in Large Database Applications. 494-501 - Chih-Lun Chou, Gwo-Jiun Horng, Sheng-Tzong Cheng:
Fast IPTV Channel Switching Using Hot-View and Personalized Channel Preload over IEEE 802.16e. 502-507 - Yi Zhuang:
A Pivot-Based Distributed Pseudo Facial Image Retrieval in Manifold Spaces: An Efficiency Study. 508-514
System Architecture and Framework
- Fabrício da Costa Dias, Ryan Ribeiro de Azevedo, Cleyton Mário de Oliveira Rodrigues, Eric Rommel Dantas Galvão, Guilherme Ataíde Dias
, Roberto Souto Maior de Barros:
OntoPsic: Leveraging the Knowledge in the Treatment and Diagnosis of Telepsychiatry. 515-520 - Ronald G. Addie
, Alan W. Colman
:
Five Criteria for Web-Services Security Architecture. 521-526 - Kaleb Lee:
A Two-Step Mutual Authentication Protocol Based on Randomized Hash-Lock for Small RFID Networks. 527-533 - Pål Halvorsen, Dag Johansen, Bjørn Olstad, Tomas Kupka, Sverre Tennøe:
vESP: A Video-Enabled Enterprise Search Platform. 534-541
First Asia-Pacific Workshop on Cyber Security (APWCS 2010)
- Raylin Tso
, Xun Yi
:
Certificateless Proxy Signature and Its Extension to Blind Signature. 542-547 - Min-Hua Shao, Ying-Chih Chin:
A Novel Approach to Dynamic ID-Based Remote User Authentication Scheme for Multi-server Environment. 548-553 - S. Sharmila Deva Selvi, S. Sree Vivek, Chandrasekaran Pandu Rangan, S. Priti:
On the Security of Identity Based Threshold Unsigncryption Schemes. 554-559 - Farzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini:
A Rights Management Approach to Securing Data Distribution in Coalitions. 560-567 - S. Sharmila Deva Selvi, S. Sree Vivek, S. Gopi Nath, C. Pandu Rangan:
Identity Based Self Delegated Signature - Self Proxy Signatures. 568-573 - Xun Yi
:
Security Analysis of Yang et al.'s Practical Password-Based Two-Server Authentication and Key Exchange System. 574-578
First Workshop on Bio-inspired and Fusion Systems for Cyber Security (BFSCS 2010)
- Len Bui, Dat Tran
, Xu Huang, Girija Chetty
:
Face Gender Recognition Based on 2D Principal Component Analysis and Support Vector Machine. 579-582 - Wanli Ma
, John Campbell
, Dat Tran
, Dale Kleeman:
Password Entropy and Password Quality. 583-587 - Xu Huang, Pritam Gajkumar Shah
, Dharmendra Sharma
:
Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange. 588-593 - Xu Huang, Shirantha Wijesekera, Dharmendra Sharma
:
Secure Communication in 802.11 Networks with a Novel Protocol Using Quantum Cryptography. 594-599 - Xu Huang, John Campbell
, Frank Gao:
Scalar Multiplication of a Dynamic Window with Fuzzy Controller for Elliptic Curve Cryptography. 600-605 - Girija Chetty, Monica Biswas, Rashmi Singh:
Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features. 606-613

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.