


default search action
WorldCIS 2015: Dublin, Ireland
- 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015. IEEE 2015, ISBN 978-1-908320-50-6
Keynote Speakers
- Liqun Chen:
Keynote speaker 1: Global harmonization of cryptographic standards. 11 - Aspen Olmsted:
Keynote speaker 2: Secure software engineering in the cloud. 12 - Charles A. Shoniregun:
Keynote speaker 3: Can the Cloud be secured...? 13
Panel Discussion
- Galyna A. Akmayeva, George Ghinea
:
Panel discussion: Secured environment for end-users and contents. 14
PhD / Doctorate Consortium
- Charles A. Shoniregun:
PhD and doctorate consortium. 15
Session 1: Access Control and e-Society
- Karen Renaud
, Melanie Volkamer:
Exploring mental models underlying PIN management strategies. 18-23 - Michael Milliken, Yaxin Bi, Leo Galway, Glenn I. Hawe:
Ensemble learning utilising feature pairings for intrusion detection. 24-31 - Samuel Moses, Dale C. Rowe:
The SNAP principle for mitigating privileged account breaches: How secondary non-admin privileged accounts can reduce breach impact. 32-38 - Rodrigo Borges Nogueira, Ricardo Staciarini Puttini:
Reasoning on personal identifiers: A guideline for design and maintenance. 39-42
Session 2: Cloud Security and e-Society
- Fara Yahya
, Robert John Walters, Gary B. Wills:
Analysing threats in cloud storage. 44-48 - Aspen Olmsted
:
Ecurrency threat modeling and hardening. 49-54 - Khalil A. Abuosba:
Multiagent trust management of Web services: The "Asynchronous Computing Environment Profile Unification Methodology" (ACEPUM). 55-59
Session 3: Information Security
- Andrews Greig, Karen Renaud
, Stephen Flowerday:
An ethnographic study to assess the enactment of information security culture in a retail store. 61-66 - Christina-Angeliki Toli, Bart Preneel
:
Provoking security: Spoofing attacks against crypto-biometric systems. 67-72 - Ayahiko Niimi:
Deep learning for credit card data analysis. 73-77 - Sara Jeza Alotaibi
:
Attendance system based on the Internet of Things for supporting blended learning. 78
Session 4: Information Security and Biometrics
- Sebastian Kurowski, Richard Litwing, Gero Lückemeyer:
A view on ISO/IEC 27001 compliant identity lifecycles for IT service providers. 85-90 - Suleyman Kondakci
:
Human-related IT security: A reliability model for network and computer maintenance. 91-96 - Neyire Deniz Sarier
:
Security analysis of revocable and bipartite biotokens. 97-103
Session 5: Network Security
- T. Divya Sai Keerthi
, Pallapa Venkataram:
AODV route maintenance using HoneyPots in MANETs. 105-112 - Sven Schindler, Bettina Schnor, Thomas Scheffler:
Taming the Ipv6 address space with hyhoneydv6. 113-118 - Yong Sun, Feng Liu:
A cascaded feature selection approach in network intrusion detection. 119-124 - Kholoud Althobaiti, Sara Jeza Alotaibi
, Hend Alqahtani:
Random walk with jumps: A new query search method based on analysing Gnutella protocol. 125-130
Session 6: Digital Forensics and Cyber Security
- Taniza Binti Tajuddin, Azizah Abd Manaf:
Forensic investigation and analysis on digital evidence discovery through physical acquisition on smartphone. 132-138 - Matt Piazza, Aspen Olmsted
:
Founding a cybersecurity club in a higher education environment: A case study. 139-143 - Gyu-Sang Cho:
Development of an anti-forensic tool for hiding message in a directory index of NTFS. 144-145 - Tanjila Farah, Delwar Alam, Md. Alamgir Kabir
, Touhid Bhuiyan
:
SQLi penetration testing of financial Web applications: Investigation of Bangladesh region. 146-151
Session 7: Network Security and e-Society
- Shane Miller, Kevin Curran
, Tom Lunney:
Securing the internet through the detection of anonymous proxy usage. 153-158 - Minho Han, Ikkyun Kim:
Anomaly detection method using network pattern analysis of process. 159-163 - Yangseo Choi, Jooyoung Lee, Sunoh Choi, Jong-Hyun Kim, Ikkyun Kim:
Transmitted file extraction and reconstruction from network packets. 164-165 - Abdurrahman Pektas, Tankut Acarman, Yliès Falcone, Jean-Claude Fernandez:
Runtime-behavior based malware classification using online machine learning. 166-171

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.