


default search action
10th CRiSIS 2015: Mytilene, Lesbos Island, Greece
- Costas Lambrinoudakis, Alban Gabillon:

Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9572, Springer 2016, ISBN 978-3-319-31810-3
Trust and Privacy Issues
- Michalis Pavlidis

, Haralambos Mouratidis, Cesar Gonzalez-Perez
, Christos Kalloniatis:
Addressing Privacy and Trust Issues in Cultural Heritage Modelling. 3-16 - Maherzia Belaazi, Hanene Boussi Rahmouni

, Adel Bouhoula
:
An Ontology Regulating Privacy Oriented Access Controls. 17-35 - Dalal Al-Azizy, David E. Millard, Iraklis Symeonidis

, Kieron O'Hara, Nigel Shadbolt:
A Literature Survey and Classifications on Data Deanonymisation. 36-51
Privacy Policies and Policy Based Protocols
- Oluwa Lawani, Esma Aïmeur, Kimiz Dalkir:

Improving Users' Trust Through Friendly Privacy Policies: An Empirical Study. 55-70 - Abdulrahman Al-Mutairi, Stephen D. Wolthusen:

MPLS Policy Target Recognition Network. 71-87
Risk Management
- Tarek Bouyahia, Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens:

Context Aware Intrusion Response Based on Argumentation Logic. 91-106 - Elena Doynikova

, Igor V. Kotenko
:
Countermeasure Selection Based on the Attack and Service Dependency Graphs for Security Incident Management. 107-124
Risk Analysis and Vulnerability Assessment
- Gaute Wangen, Andrii Shalaginov:

Quantitative Risk, Statistical Methods and the Four Quadrants for Information Security. 127-143 - Oliver J. Farnan, Jason R. C. Nurse:

Exploring a Controls-Based Assessment of Infrastructure Vulnerability. 144-159 - Salma Dammak, Faiza Ghozzi Jedidi

, Faïez Gargouri
:
Quantifying Security in Web ETL Processes. 160-173
Cloud Systems and Cryptography
- Stavros Simou, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis

:
A Meta-model for Assisting a Cloud Forensics Process. 177-187 - Kazumasa Omote, Tran Phuong Thao:

POR-2P: Network Coding-Based POR for Data Provision-Payment System. 188-206 - Jiageng Chen

, Rashed Mazumder, Atsuko Miyaji
:
A Single Key Scheduling Based Compression Function. 207-222
Attacks and Security Measures
- Lyes Bayou, David Espes

, Nora Cuppens-Boulahia, Frédéric Cuppens:
Security Issue of WirelessHART Based SCADA Systems. 225-241 - Gustavo Gonzalez Granadillo, Grégoire Jacob, Hervé Debar

:
Attack Volume Model: Geometrical Approach and Application. 242-257 - Nikolaos Tsalis, Alexios Mylonas

, Dimitris Gritzalis:
An Intensive Analysis of Security and Privacy Browser Add-Ons. 258-273 - Xin Meng, George Spanoudakis:

MBotCS: A Mobile Botnet Detection System Based on Machine Learning. 274-291 - Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:

Toward Securing MANET Against the Energy Depletion Attack. 292-306

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














