


default search action
CyberSec 2012: Kuala Lumpur, Malaysia
- 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012. IEEE 2012, ISBN 978-1-4673-1425-1

- Kee-Won Kim

, Jun-Cheol Jeon:
Cellular semi-systolic Montgomery Multiplier on finite fields. 1-5 - Newton Howard

, Sergey Kanareykin:
Intention awareness in cyber security. 6-11 - K. SuganyaDevi

, N. Malmurugan, R. Sivakumar:
OF-SMED: An optimal foreground detection method in surveillance system for traffic monitoring. 12-17 - Ghassan Samara

, Wafaa A. H. Ali Alsalihy:
A new security mechanism for vehicular communication networks. 18-22 - Salasiah Sulaiman, Zaiton Muda, Julia Juremi:

The new approach of Rijndael key schedule. 23-27 - Somdip Dey

:
SD-EI: A cryptographic technique to encrypt images. 28-32 - Ahmad Abusukhon

, Mohammad Talib:
A novel network security algorithm based on private key encryption. 33-37 - Julia Juremi, Ramlan Mahmod, Salasiah Sulaiman:

A proposal for improving AES S-box with rotation and key-dependent. 38-42 - Maryam Savari

, Mohammad Montazerolzohour, Eng-Thiam Yeoh:
Combining encryption methods in multipurpose smart card. 43-48 - Maryam Savari

, Mohammad Montazerolzohour, Eng-Thiam Yeoh:
Comparison of ECC and RSA algorithm in multipurpose smart card application. 49-53 - Maryam Savari

, Mohammad Montazerolzohour:
All about encryption in smart card. 54-59 - Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir

, Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin:
Towards secure model for SCADA systems. 60-64 - Sung-Hwan Kim, Jung-Ho Eom, Tai-Myoung Chung:

A study on optimization of security function for reducing vulnerabilities in SCADA. 65-69 - M. P. Azuwa, Rabiah Ahmad, Shahrin Sahib, Solahuddin Shamsuddin:

A propose technical security metrics model for SCADA systems. 70-75 - Sohail Khan

, Mohammad Nauman
, Abu Talib Othman, Shahrulniza Musa
:
How secure is your smartphone: An analysis of smartphone security mechanisms. 76-81 - Abdullahi Arabo, Fadi El-Moussa:

Security framework for smart devices. 82-87 - Liam Smit, Adrie Stander

, Jacques Ophoff
:
Investigating the accuracy of base station information for estimating cellphone location. 88-93 - Ala A. Abdulrazeg, Norita Md Norwawi, Nurlida Basir:

Security metrics to improve misuse case model. 94-99 - Latifa Ben Arfa Rabai

, Mouna Jouini, Marwa Nafati, Anis Ben Aissa
, Ali Mili:
An economic model of security threats for cloud computing systems. 100-105 - S. A. I. Yazid, Mohd Faizal Abdollah

, Rabiah Ahmad, S. Shahrin, Solahuddin Shamsuddin:
Enhancement of Asset value classification for Mobile devices. 106-110 - Davoud Mougouei

, Wan Nurhayati Wan Ab. Rahman
, Mohammad Moein Almasi:
Evaluating fault tolerance in security requirements of web services. 111-116 - Mark Evered:

A transitive access control model for dynamic roles and attributes. 117-121 - Alireza Tamjidyamcholo:

Information security risk reduction based on genetic algorithm. 122-127 - Edna Dias Canedo

, Rafael Timóteo de Sousa Júnior
, Rhandy Rafhael de Carvalho, Robson de Oliveira Albuquerque
:
Trust model for private cloud. 128-132 - Hadi KhorasaniZadeh, Norbik Bashah Idris

, Jamalul-lail Ab Manan
:
Distributed Intrusion Detection trust management through integrity and expertise evaluation. 133-138 - Hamed Khiabani, Norbik Bashah Idris

, Jamalul-lail Ab Manan
:
Leveraging Remote Attestation to enhance the Unified Trust Model for WSNs. 139-143 - Ali Alkhalifah

, John D'Ambra
:
The role of Identity Management Systems in enhancing protection of user privacy. 144-149 - Salah Bindahman, Nasriah Zakaria, Norsaadah Zakaria:

3D body scanning technology: Privacy and ethical issues. 150-154 - Mohd Anuar Mat Isa

, Jamalul-lail Ab Manan
, Ramlan Mahmod, Habibah Hashim, Mar Yah Said, Nur Izura Udzir, Ali Dehghantanha:
Finest authorizing member of common criteria certification. 155-160 - Caiyi Zhu, Xiangkun Dai:

Model of trust management based on finite state machine. 161-164 - Xiangkun Dai, Caiyi Zhu, Yucui Guo:

P2P dynamic trust management system based on trust network. 165-170 - Gareth Owen:

Automated forensic extraction of encryption keys using behavioral analysis. 171-175 - Eric Holm

:
Identity crime: The challenges in the regulation of identity crime. 176-179 - Xiaomei Quan, Hongbin Zhang:

Copy-move forgery detection in digital images based on local dimension estimation. 180-185 - Farhood Norouzizadeh Dezfouli, Ali Dehghantanha, Ramlan Mahmoud, Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin:

Volatile memory acquisition using backup for forensic investigation. 186-189 - Mohsen Damshenas, Ali Dehghantanha, Ramlan Mahmoud, Solahuddin bin Shamsuddin:

Forensics investigation challenges in cloud computing environments. 190-194 - Enos K. Mabuto, Hein S. Venter

:
User-generated digital forensic evidence in graphic design applications. 195-200 - Mohammed Ibrahim

, Mohd Taufik Abdullah, Ali Dehghantanha:
VoIP evidence model: A new forensic method for investigating VoIP malicious attacks. 201-206 - Solmaz Salehian, Farzaneh Masoumiyan, Nur Izura Udzir

:
Energy-efficient intrusion detection in Wireless Sensor Network. 207-212 - Warusia Yassin

, Nur Izura Udzir, Zaiton Muda, Azizol Abdullah
, Mohd Taufik Abdullah:
A Cloud-based Intrusion Detection Service framework. 213-218 - Kamarularifin Abd. Jalil

, Qatrunnada Binti Abdul Rahman:
Multiple trusted devices authentication protocol for ubiquitous computing applications. 225-229 - Mohammed A. Alzain

, Ben Soh, Eric Pardede
:
A New approach using redundancy technique to improve security in cloud computing. 230-235 - Mohammad Faiz Liew Abdullah

, A. Z. Yonis:
Performance of LTE Release 8 and Release 10 in wireless communications. 236-241 - Majid Nasirinejad, Alireza Ahmadian Yazdi:

SASy username and password management on the cloud. 242-246 - Fakariah Hani Mohd Ali

, Rozita Yunos, Mohd Azuan Mohamad Alias:
Simple port knocking method: Against TCP replay attack and port scanning. 247-252 - Ramya Dharam, Sajjan G. Shiva:

Runtime monitors for tautology based SQL injection attacks. 253-258 - Sumit Kumar

, Shashikala Tapaswi:
A centralized detection and prevention technique against ARP poisoning. 259-264 - Maryam Tanha, Seyed Dawood Sajjadi Torshizi, Mohd Taufik Abdullah, Fazirulhisyam Hashim:

An overview of attacks against digital watermarking and their respective countermeasures. 265-270 - Fazli Bin Mat Nor, Kamarularifin Abd. Jalil

, Jamalul-lail Ab Manan
:
An enhanced remote authentication scheme to mitigate man-in-the-browser attacks. 271-276 - Pin Shen Teh

, Shigang Yue
, Andrew Beng Jin Teoh
:
Improving keystroke dynamics authentication system via multiple feature fusion scheme. 277-282 - Thilla Rajaretnam:

The problem to consent to the collection, use, and disclosure of personal information in cyberspace. 283-288 - Acklyn Murray, Sherali Zeadally, Angelyn Flowers:

An assessment of U.S. legislation on cybersecurity. 289-294 - Jung-Ho Eom, Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung:

Cyber military strategy for cyberspace superiority in cyber warfare. 295-299 - S. M. Nirkhi, Rajiv V. Dharaskar

, V. M. Thakre:
Analysis of online messages for identity tracing in cybercrime investigation. 300-305 - Ida Madieha bt. Abdul Ghani Azmi

, Sonny Zulhuda
, Sigit Puspito Wigati Jarot:
Data breach on the critical information infrastructures: Lessons from the Wikileaks. 306-311 - Bilal Al Sabbagh, Stewart Kowalski:

ST(CS)2 - Featuring socio-technical cyber security warning systems. 312-316 - Mohammad Mahboubian, Nur Izura Udzir

, Shamala Subramaniam, Nor Asilah Wati Abdul Hamid
:
An alert fusion model inspired by artificial immune system. 317-322 - Rabiah Ahmad, Zahri Yunos, Shahrin Sahib:

Understanding cyber terrorism: The grounded theory method applied. 323-328 - Huyam Al-Amro, Eyas El-Qawasmeh:

Discovering security vulnerabilities and leaks in ASP.NET websites. 329-333

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














