default search action
WorldCIS 2014: London, United Kingdom
- 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014. IEEE 2014, ISBN 978-1-908320-42-1
Session 1: Information Security
- Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera:
Fortifying TripAdvisor against reputation-system attacks. 20-21 - Bhawani Shanker Bhati, Pallapa Venkataram:
Data privacy preserving scheme in MANETs. 22-23 - Tamir Tsegaye, Stephen Flowerday:
Controls for protecting critical information infrastructure from cyberattacks. 24-29 - Hiroyuki Yoshimura:
Fingerprint templates generated by the fractional fourier, cosine and sine transforms and their generation conditions. 30-34
Session 2: Information Security
- Liezel Cilliers, Stephen Flowerday:
Information security in a public safety, participatory crowdsourcing smart city project. 36-41 - Natasa Suteva, Aleksandra Mileva, Mario Loleski:
Computer forensic analisys of some web attacks. 42-47 - Dalal Al-Azizy, David E. Millard, Nigel Shadbolt, Kieron O'Hara:
Deanonymisation in Linked Data: A research roadmap. 48-52 - Zeyad S. Aaber, Richard M. Crowder, Nawfal F. Fadhel, Gary B. Wills:
Preventing document leakage through active document. 53-58
Session 3: Internet Applications and Cyber Security
- Nihar Vuppalapati, Joon S. Park:
Online Behavioral Advertising (OBA) with privacy protection. 60-65 - Akinola Ajijola, Pavol Zavarsky, Ron Ruhl:
A review and comparative evaluation of forensics guidelines of NIST SP 800-101 Rev.1: 2014 and ISO/IEC 27037: 2012. 66-73 - Samuel Laurén, Petteri Mäki, Sampsa Rauti, Shohreh Hosseinzadeh, Sami Hyrynsalmi, Ville Leppänen:
Symbol diversification of linux binaries. 74-79 - Roxanne Piderit, Stephen Flowerday:
The risk relationship between trust and information sharing in automotive supply chains. 80-85
Session 4: Information and Network Security
- Pryde N. Sema, Pavol Zavarsky, Ron Ruhl:
A critical review of attack scenarios on the IAEA Technical Guidance NSS 17 Computer Security at Nuclear Facilities. 87-90 - Nawfal F. Fadhel, Richard M. Crowder, Fatimah Y. Akeel, Gary B. Wills:
Component for 3D printing provenance framework: Security properties components for provenance framework. 91-96 - Omer Ozulku, Nawfal F. Fadhel, David Argles, Gary B. Wills:
Anomaly detection system: Towards a framework for enterprise log management of security services. 97-102
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.