default search action
5th NSS 2011: Milan, Italy
- Pierangela Samarati, Sara Foresti, Jiankun Hu, Giovanni Livraga:
5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011. IEEE 2011, ISBN 978-1-4577-0458-1 - Sabrina De Capitani di Vimercati, Pierangela Samarati, Sara Foresti, Jiankun Hu:
Foreword from the Conference Chairs.
Intrusion Detection
- Abdulbasit Ahmed, Alexei Lisitsa, Clare Dixon:
A misuse-based network Intrusion Detection System using Temporal Logic and stream processing. 1-8 - Khalid Nasr, Anas Abou El Kalam, Christian Fraboul:
A holistic methodology for evaluating wireless Intrusion Detection Systems. 9-16 - Yang Zhong, Hirofumi Yamaki, Hiroki Takakura:
A grid-based clustering for low-overhead anomaly intrusion detection. 17-24 - Jiang Ming, Haibin Zhang, Debin Gao:
Towards ground truthing observations in gray-box anomaly detection. 25-32
Client-side Vulnerabilities
- Sophie Gastellier-Prevost, Maryline Laurent:
Defeating pharming attacks at the client-side. 33-40 - Serge Chaumette, Olivier Ly, Renaud Tabary:
Automated extraction of polymorphic virus signatures using abstract interpretation. 41-48 - Yini Wang, Sheng Wen, Yang Xiang:
Modeling worms propagation on probability. 49-56 - Kui Xu, Danfeng Yao, Qiang Ma, Alexander Crowell:
Detecting infection onset with behavior-based policies. 57-64
Authentication and Watermarking Systems
- Marco Botta, Davide Cavagnino, Victor Pomponiu:
KL-F: Karhunen-Loève based fragile watermarking. 65-72 - Panagiotis Rizomiliotis, Evangelos Rekleitis, Stefanos Gritzalis:
Designing secure RFID authentication protocols is (still) a non-trivial task. 73-80 - Ravi Jhawar, Philip Inglesant, Nicolas T. Courtois, Martina Angela Sasse:
Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication. 81-88
Web Security
- Renato Accornero, Daniele Rispoli, Francesco Bergadano:
Privacy-enhanced identity via browser extensions and linking services. 89-96 - Nataliia Bielova, Dominique Devriese, Fabio Massacci, Frank Piessens:
Reactive non-interference for a browser model. 97-104 - Boris Rozenberg, Yaron Gonen, Ehud Gudes, Nurit Gal-Oz, Erez Shmueli:
Tracking end-users in web databases. 105-112
Security in Cloud and Peer to Peer Systems
- Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy, Mohamed Almorsy:
CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model. 113-120 - Amir Averbuch, Michael Kiperberg, Nezer Zaidenberg:
An efficient VM-based software protection. 121-128 - David Zage, Charles Edwin Killian, Cristina Nita-Rotaru:
Removing the blinders: Using information to mitigate adversaries in adaptive overlays. 129-136 - Alessio Bonti, Ming Li, Wen Shi:
Improving P2P IPTV random peers search through user similarity. 137-144
Network Security
- Mazdak Alimadadi, Mehran S. Fallah:
A distributed client-puzzle mechanism to mitigate bandwidth attacks. 145-152 - Nizar Ben Neji, Adel Bouhoula:
Towards safe and optimal filtering rule reordering for complex packet filters. 153-160 - Cynthia Wagner, Jérôme François, Radu State, Thomas Engel:
DANAK: Finding the odd! 161-168 - Yu Wang, Yang Xiang, Jun Zhang, Shun-Zheng Yu:
A novel semi-supervised approach for network traffic clustering. 169-175
Hardware-based Security
- Sheng Wei, Miodrag Potkonjak:
Scalable consistency-based hardware trojan detection and diagnosis. 176-183 - Roberto Gallo, Henrique Kawakami, Ricardo Dahab:
FORTUNA - A probabilistic framework for early design stages of hardware-based secure systems. 184-191 - Mirko Montanari, Roy H. Campbell:
Attack-resilient compliance monitoring for large distributed infrastructure systems. 192-199
Access Control
- Nathalie Baracaldo, Amirreza Masoumzadeh, James Joshi:
A secure, constraint-aware role-based access control interoperation framework. 200-207 - Peter Amthor, Winfried E. Kühnhauser, Anja Pölck:
Model-based safety analysis of SELinux security policies. 208-215 - Steffen Bartsch:
Exploring twisted paths: Analyzing authorization processes in organizations. 216-223
Authentication
- Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell:
SMS linguistic profiling authentication on mobile device. 224-228 - Eesa A. Alsolami, Colin Boyd, Andrew J. Clark, Irfan Ahmed:
User-representative feature selection for keystroke dynamics. 229-233 - V. Koulolias, A. Kountzeris, Herbert Leitold, Bernd Zwattendorfer, A. Crespo, M. Stern:
STORK e-privacy and security. 234-238 - Rosanne English, Ron Poet:
Towards a metric for recognition-based graphical password security. 239-243 - Samia A. Ali, Refaat M. Mohamed, Mahmoud H. Fahim:
RCHB: Light-weight, provably-secure variants of the HB protocol using rotation and complementation. 244-248
Key Managements
- Tony Cheneau, Andrei Vlad Sambra, Maryline Laurent:
A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks. 249-253 - Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake:
Automatic security verification for 3-party authentication and key exchange protocols. 254-258 - Maurizio Adriano Strangio:
On the security of the ECKE-1N and EECKE-1N elliptic-curve key agreement protocols. 259-263 - Huiyun Li, Qi Zhang, Hai Yuan:
Channel state information based key generation vs. side-channel analysis key information leakage. 264-268 - Christoph Böhm, Maximilian Hofer, Wolfgang Pribyl:
A microcontroller SRAM-PUF. 269-273
Emerging Scenarios and e-Services
- Robert Koch, Dominik Holzapfel, Gabi Dreo Rodosek:
Data control in social networks. 274-279 - Sami Alsouri, Stefan Katzenbeisser, Sebastian Biedermann:
Trustable outsourcing of business processes to cloud computing environments. 280-284 - Florian Kerschbaum:
Secure conjunctive keyword searches for unstructured text. 285-289 - Valentim Oliveira, Tito Silva:
The power of credit card numbers and long CVVs. 290-294 - Bernd Zwattendorfer, Arne Tauber, Thomas Zefferer:
A privacy-preserving eID based Single Sign-On solution. 295-299
Wi-Fi and Network Security
- Bassem Bakhache, Joseph M. Ghazal, Safwan El Assad:
Enhancement of ZigBee and Wi-Fi security by a robust and fast chaotic algorithm. 300-304 - Yuanyuan Zhang, Wassim Znaidi, Cédric Lauradoux, Marine Minier:
Flooding attacks against network coding and countermeasures. 305-309 - Martine Bellaïche, Jean-Charles Grégoire:
Avoiding DDoS with active management of backlog queues. 310-315 - Nathan S. Evans, Christian Grothoff:
R5N: Randomized recursive routing for restricted-route networks. 316-321 - Bofeng Zhang, Yuan Li, Yujing Liu, Jinshu Su:
Analysis of prefix hijacking based on AS hierarchical model. 322-326
Risk Assessment and Usability
- Marta Fernández-Diego, Julián Marcelo-Cocho:
Modelling self-protected networks and dynamic systems. 327-331 - Martin Mihajlov, Saso Josimovski, Borka Jerman-Blazic:
A conceptual framework for evaluating usable security in authentication mechanisms - usability perspectives. 332-336 - Patryk Szewczyk:
Usability of Internet Security Software: Have they got it right? 337-341
Malicious Code and Security Analysis
- Xabier Ugarte-Pedrero, Igor Santos, Pablo García Bringas, Mikel Gastesi, José Miguel Esparza:
Semi-supervised learning for packed executable detection. 342-346 - Ziyad S. Al-Salloum, Stephen D. Wolthusen:
A propagation model of a vulnerability mitigation computer worm - seawave. 347-352 - Ayda Saïdane, Nicolas Guelfi:
Towards improving security testability of AADL architecture models. 353-357 - Arash Afshar, Mehran S. Fallah:
Reconstructing security types for automated policy enforcement in FABLE. 358-363 - Rosanne English, Ron Poet:
Measuring the revised guessability of graphical passwords. 364-368
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.