default search action
WorldCIS 2013: London, United Kingdom
- 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013. IEEE 2013, ISBN 978-1-908320-22-3
Keynote Speakers
- Jeffrey J. Wiley:
WorldCIS-2013: Keynote speaker 1. 7 - David Stupples:
WorldCIS-2013: Keynote speaker 2. 8 - Tyson T. Brooks:
WorldCIS-2013: Keynote speaker 3. 9 - Charles A. Shoniregun:
WorldCIS-2013: Keynote speaker 4. 10
Session 1: Network Security
- Yanzhen Qu, Kelly Hughes:
Detecting metamorphic malware by using behavior-based aggregated signature. 13-18 - Mohammed A. Alhomidi, Martin J. Reed:
Risk assessment and analysis through population-based attack graph modelling. 19-24 - Ting Zhang, Dale Lindskog:
Full function Firewalls on MANETs: A routing storage and query mechanism for ROFL. 25-29 - Azin Moradmand Badie, Dale Lindskog, Ron Ruhl:
Responding to intrusions in mobile ad hoc networks. 30-34
Session 2: Internet Applications and Technology
- Jiang Wang, Leif Arne Rønningen:
Collaboration oriented 3D video encoding approach for the distributed multimedia plays. 36-40 - Taha Lebbadi, Jackson Adams:
Integrating information technology (IT) to enhance compliance of safety management system in Syrian shipping companies. 41-55 - Mohammed Ismael Ahmed, Mohamed Aborizka:
Remote Internet voting: Security and performance issues. 56-64 - Sajjad Ahmed Ghauri, H. Humayun Shah, Hira Sajjad:
Comparison of different population strategies for multiuser detection using Genetic Algorithm. 65-68
Session 3: Information Security
- Alexander Zhirov, Olga Zhirova, Sergey Krendelev:
Practical fully homomorphic encryption over polynomial quotient rings. 70-75 - Naif Alajlan, Md. Saiful Islam, Nassim Ammour:
Fusion of fingerprint and heartbeat biometrics using fuzzy adaptive genetic algorithm. 76-81 - Nawfal F. Fadhel, Richard M. Crowder, Gary B. Wills:
Approaches to maintaining provenance throughout the additive manufacturing process. 82-87 - Pasquale Stirparo, Igor Nai Fovino, Marco Taddeo, Ioannis Kounelis:
In-memory credentials robbery on android phones. 88-93
Session 4: Network Security
- Divyajyoti Das, Somesh Nanda:
Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares. 95-98 - Heba Kamal Aslan, Mohamed Rasslan:
A new multicast authentication protocol using erasure code functions and signcryption techniques. 99-105 - SeongHan Shin, Kazukuni Kobara:
RSA-based Password-Authenticated Key Retrieval using multiple servers. 106-111 - Christopher Hudel, Mohamed Shehab:
Optimizing search for malware by hashing smaller amounts of data. 112-117
Session 5: Access Control and Cloud Security
- Takeshi Matsuda:
Feature extraction of web application attacks based on zeta distributions. 119-122 - Juraj Masar, Jirí Bartos, Cyril Klimes:
Deployment of mandatory access control policies of operating system under uncertainty. 123-127 - William A. R. De Souza, Allan Tomlinson:
Understanding threats in a cloud infrastructure with no hypervisor. 128-133 - Hamed Momeni, Massoud Masoumi, Ali Dehghan:
A practical fault induction attack against an FPGA implementation of AES cryptosystem. 134-138 - Hanim Eken:
Security threats and solutions in cloud computing. 139-143
Session 6: Digital Forensics
- Mohammed Alenezi, Martin J. Reed:
Denial of service detection through TCP congestion window analysis. 145-150 - Azzat Al-Sadi, Manaf Bin-Yahya, Ahmad Almulhem:
Identification of image fragments for file carving. 151-155 - Irvin Homem, Spyridon Dosis, Oliver Popov:
LEIA: The Live Evidence Information Aggregator: Towards efficient cyber-law enforcement. 156-161 - Antonia Rana, Andrea Ciardulli:
Identity verification through face recognition, Android smartphones and NFC. 162-163
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.