


default search action
4th CyberSec 2015: Jakarta, Indonesia
- Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-8499-5

Cyber Security
- Manh Cong Tran, Yasuhiro Nakamura:

An Approach to Mine Suspicious Domain Based on HTTP Automated Software Communication Behavior. 1-5 - Mikhail Styugin:

Analysis of Awareness Structures in Information Security Systems. 6-10 - Dwiki Jatikusumo

, Hanny Hikmayanti H.
, Feriadi
, Wendi Usino:
Securing Official Account Twitter Using Social Media Management System: Accuracy of the Data and Information Publish with Twitter. 11-15 - Kazuki Hashimoto, Hiroyuki Hiruma, Takashi Matsumoto, Kosetus Kayama, Yoshio Kaikizaki, Hiroshi Yamaki, Tetsutaro Uehara

, Ryôichi Sasaki:
Development of Intellectual Network Forensic System LIFT against Targeted Attacks. 16-21 - Chyquitha Danuputri

, Teddy Mantoro, Mardi Hardjianto:
Data Security Using LSB Steganography and Vigenere Chiper in an Android Environment. 22-27 - Ryohei Koizumi, Ryôichi Sasaki:

Study on Countermeasures Using Mitigation Software against Vulnerability Attacks. 28-33 - Ahmad Budi Setiawan, Aries Syamsudin, Ashwin Sasongko Sastrosubroto:

Implementation of Secure Smart Grid as Critical Information Infrastructure in Indonesia: A Case Study in Smart Grid Electricity. 34-39 - Makoto Sato, Akihiko Sugimoto, Naoki Hayashi, Yoshiaki Isobe, Ryôichi Sasaki:

Proposal of a Method for Identifying the Infection Route for Targeted Attacks Based on Malware Behavior in a Network. 40-45 - Naoto Nakagawa, Yoshimi Teshigawara, Ryôichi Sasaki:

Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation. 46-51 - Takumi Akiyama, Kazuya Otani, Yoshio Kakizaki

, Ryôichi Sasaki:
Evaluation of a Risk-Based Management Method for Online Accounts. 52-57 - Ali Tamimi, D. Subbaram Naidu, Sanaz Kavianpour

:
An Intrusion Detection System Based on NSGA-II Algorithm. 58-61
Cyber Crimes
- Victor Wahanggara, Yudi Prayudi

:
Malware Detection through Call System on Android Smartphone Using Vector Machine Method. 62-67 - Teddy Mantoro, M. Iman Wahyudi

, Media A. Ayu
, Wendi Usino:
Real-Time Printed Document Authentication Using Watermarked QR Code. 68-72 - Delwar Alam, Md. Alamgir Kabir

, Touhid Bhuiyan
, Tanjila Farah
:
A Case Study of SQL Injection Vulnerabilities Assessment of .bd Domain Web Applications. 73-77
Information Assurance and Security Management
- Abdullah Said Alkalbani, Teddy Mantoro, Sardjoeni Moedjiono, Media A. Ayu

:
Hybrid Solution for Secured and Energy Aware Routing Path in Wireless Sensor Networks. 78-83 - Nabil Laoufi:

From Risk Analysis to the Expression of Security Requirements for Systems Information. 84-89 - Herny Ramadhani Mohd Husny Hamid, Megat Ahmad Izzat bin Megat Ahmad Kamil, Norhaiza Ya Abdullah:

Portable Toolkit for Penetration Testing and Firewall Configuration. 90-94 - Hyoseok Yoon

, Se-Ho Park, Kyung-Taek Lee:
Exploiting Ambient Light Sensor for Authentication on Wearable Devices. 95-100
Digital Forensics
- Muhammad Hilmi Kamarudin, Carsten Maple, Tim Watson, Hasliza Sofian:

Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R Attacks. 101-106 - Mohammad Ahmad Abu Allawi, Ali Hadi, Arafat Awajan

:
MLDED: Multi-layer Data Exfiltration Detection System. 107-112 - Sriram Raghavan, S. V. Raghavan:

Estimating Posterior Probabilities to Identify Breach Points during Cyber-attacks. 113-116 - Ahmad Luthfi

, Yudi Prayudi
:
Process Model of Digital Forensics Readiness Scheme (DFRS) as a Recommendation of Digital Evidence Preservation. 117-122 - Normaziah Abdul Aziz

, Fakhrulrazi Mokhti, M. Nadhar M. Nozri:
Mobile Device Forensics: Extracting and Analysing Data from an Android-Based Smartphone. 123-128
Security Protocols
- Mohammad Imran

, Muhammad Tanvir Afzal
, Muhammad Abdul Qadir
:
Similarity-Based Malware Classification Using Hidden Markov Model. 129-134
Cyber Peace-Fare and Physical Security
- Herny Ramadhani Mohd Husny Hamid, Norhaiza Ya Abdullah:

Physical Authentication Using Random Number Generated (RNG) Keypad Based on One Time Pad (OTP) Concept. 135-139
Biometrics Applications
- Norhaiza Ya Abdullah, Herny Ramadhani Mohd Husny Hamid:

Folder Lock by Using Multimodal Biometric: Fingerprint and Signature Authentication. 140-145
Laws and Regulations
- P. D. Persadha

, A. A. Waskita
, S. Yazid:
Comparative Study of Cyber Security Policies among Malaysia, Australia, Indonesia: A Responsibility Perspective. 146-150

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














