default search action
CyberSecurity 2012: Alexandria, VA, USA
- 2012 ASE International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012. IEEE Computer Society 2012, ISBN 978-1-4799-0219-4
- Chung-Wei Lin, Alberto L. Sangiovanni-Vincentelli:
Cyber-Security for the Controller Area Network (CAN) Communication Protocol. 1-7 - Todd Baumeister, Yingfei Dong, Zhenhai Duan, Guanyu Tian:
A Routing Table Insertion (RTI) Attack on Freenet. 8-15 - Hanchen Song, Chris Muelder, Kwan-Liu Ma:
Crucial Nodes Centric Visual Monitoring and Analysis of Computer Networks. 16-23 - Satyajeet Nimgaonkar, Srujan Kotikela, Mahadevan Gomathisankaran:
CTrust: A Framework for Secure and Trustworthy Application Execution in Cloud Computing. 24-31 - Fernando Sanchez, Zhenhai Duan:
A Sender-Centric Approach to Detecting Phishing Emails. 32-39 - Ahmed Aleroud, George Karabatis:
A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks. 40-45 - Nazari Skrupsky, Maliheh Monshizadeh, Prithvi Bisht, Timothy L. Hinrichs, V. N. Venkatakrishnan, Lenore D. Zuck:
WAVES: Automatic Synthesis of Client-Side Validation Code for Web Applications. 46-53 - Johannes de Vries, Hans Hoogstraaten, Jan van den Berg, Semir Daskapan:
Systems for Detecting Advanced Persistent Threats: A Development Roadmap Using Intelligent Data Analysis. 54-61 - Woohyun Shim, Luca Allodi, Fabio Massacci:
Crime Pays If You Are Just an Average Hacker. 62-68 - Paul Giura, Wei Wang:
A Context-Based Detection Framework for Advanced Persistent Threats. 69-74 - Shams Zawoad, Ragib Hasan:
I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics. 75-82 - Jun Dai, Xiaoyan Sun, Peng Liu, Nicklaus A. Giacobe:
Gaining Big Picture Awareness through an Interconnected Cross-Layer Situation Knowledge Reference Model. 83-92 - Denise Ferebee, Dipankar Dasgupta, Qishi Wu:
A Cyber-Security Storm MAP. 93-102 - Olga Kulikova, Ronald Heil, Jan van den Berg, Wolter Pieters:
Cyber Crisis Management: A Decision-Support Framework for Disclosing Security Incident Information. 103-112 - Pallavi Patil, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
Fault Tree Analysis of Accidental Insider Security Events. 113-118 - Simon Reay Atkinson, David Walker, Kevin Beaulne, Liaquat Hossain:
Cyber - Transparencies, Assurance and Deterrence. 119-126 - Sharif Hassan, Ratan Guha:
Security and Integrity Analysis Using Indicators. 127-135 - Andre Abadie, Duminda Wijesekera:
Leveraging an Inventory of the Cognitive Radio Attack Surface. 136-143 - Marlies Rybnicek, Rainer Poisel, Manfred Ruzicka, Simon Tjoa:
A Generic Approach to Critical Infrastructure Modeling and Simulation. 144-151 - Anass Bayaga, Stephen Flowerday:
Principal Causes of Information Communication Technology (ICT) Risk Failure in an SME. 152-156 - Tanja Zseby:
Is IPv6 Ready for the Smart Grid? 157-164 - Kazuya Kishimoto, Kenji Ohira, Yukiko Yamaguchi, Hirofumi Yamaki, Hiroki Takakura:
An Adaptive Honeypot System to Capture IPv6 Address Scans. 165-172 - Wade Gasior, Li Yang:
Exploring Covert Channel in Android Platform. 173-177 - Munene W. Kanampiu, Justin Zhan:
A Dynamic Covert Passive Actors Detection Scheme for a Healthy Networked Community. 178-186 - Robert F. Erbacher, Steve E. Hutchinson:
Extending Case-Based Reasoning to Network Alert Reporting. 187-194 - Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim, Madjid Merabti, David J. Lamb:
A Compose Language-Based Framework for Secure Service Composition. 195-202 - Shlomi Dolev, Niv Gilboa, Marina Kopeetsky:
Permanent Revocation in Attribute Based Broadcast Encryption. 203-208 - Alex Doyal, Justin Zhan, Huiming Anna Yu:
Towards Defeating DDoS Attacks. 209-212
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.