


default search action
SysSec@DIMVA 2011: Amsterdam, The Netherlands
- First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands, July 6, 2011. IEEE 2011, ISBN 978-1-4577-1528-0

- Wei Ming Khoo, Pietro Lio'

:
Unity in Diversity: Phylogenetic-inspired Techniques for Reverse Engineering and Detection of Malware Families. 3-10 - George Noseevich, Andrew Petukhov:

Detecting Insufficient Access Control in Web Applications. 11-18 - Fernand Lone Sang, Vincent Nicomette, Yves Deswarte

:
I/O Attacks in Intel PC-based Architectures and Countermeasures. 19-26 - Iasonas Polakis, Georgios Kontaxis, Sotiris Ioannidis:

CAPTCHuring Automated (Smart) Phone Attacks. 27-34 - Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis:

Outsourcing Malicious Infrastructure to the Cloud. 35-42 - Naveed Ahmed, Christian Damsgaard Jensen

:
Demarcation of Security in Authentication Protocols. 43-50 - Angelos D. Keromytis, Salvatore J. Stolfo, Junfeng Yang, Angelos Stavrou

, Anup K. Ghosh, Dawson R. Engler, Marc Dacier
, Matthew C. Elder, Darrell M. Kienzle:
The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security. 53-56 - Christian Grothoff:

The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and Beyond. 57-58 - Spyros K. Kollias, Vasileios Vlachos

, Alexandros Papanikolaou
, Vassilis Assimakopoulos:
Adapting Econometric Models, Technical Analysis and Correlation Data to Computer Security Data. 59-62 - Markus Wehner, Sven Zeisberg, Alexis Olivereau, Nouha Oualha, Laura Gheorghe, Emil Slusanschi

, Basil Hess, Felix von Reischach, Mike Ludwig, David Bateman:
A Trustworthy Architecture for Wireless Industrial Sensor Networks: Research Roadmap of EU TWISNet Trust and Security Project. 63-66 - Magnus Almgren

, Zhang Fu, Erland Jonsson, Pierre Kleberger
, Andreas Larsson, Farnaz Moradi, Tomas Olovsson, Marina Papatriantafilou
, L. Pirzadeh, Philippas Tsigas
:
Mapping Systems Security Research at Chalmers. 67-70 - Zinaida Benenson, Andreas Dewald, Hans-Georg Eßer, Felix C. Freiling, Tilo Müller, Christian Moch, Stefan Vömel, Sebastian Schinzel, Michael Spreitzenbarth, Ben Stock, Johannes Stüttgen:

Exploring the Landscape of Cybercrime. 71-74 - Levente Buttyán, Márk Félegyházi, Boldizsár Bencsáth:

CLEARER: CrySyS Laboratory Security and Privacy Research Roadmap. 75-78 - Dennis Gamayunov

:
Towards Malware-Resistant Networking Environment. 79-82 - Xenofontas A. Dimitropoulos:

Research Roadmap on Security Measurements. 83-85 - Emmanuelle Anceaume, Christophe Bidan, Sébastien Gambs, Guillaume Hiet, Michel Hurfin, Ludovic Mé, Guillaume Piolle, Nicolas Prigent, Eric Totel, Frederic Tronel, Valérie Viet Triem Tong:

From SSIR to CIDre: A New Security Research Group in Rennes, France. 86-89 - James Clarke, Neeraj Suri

, Michel Riguidel, Aljosa Pasic
:
Building a Long Term Strategy for International Collaboration in Trustworthy ICT: Security, Privacy and Trust in Global Networks and Services. 90-93 - Jeff Yan:

System Security Research at Newcastle. 94-95 - Piotr Kijewski, Adam Kozakiewicz:

Security Research at NASK: Supporting the Operational Needs of a CERT Team and More. 96-99 - Kiril Boyanov:

The Security Aspects of the Research Activities in IICT-BAS. 100-102 - Adam Lackorzynski, Alexander Warg:

Less is More - A Secure Microkernel-Based Operating System. 103-106 - Konrad Rieck:

Computer Security and Machine Learning: Worst Enemies or Best Friends? 107-110 - Herbert Bos

, Lorenzo Cavallaro
, Andrew S. Tanenbaum:
Systems Security at VU University Amsterdam. 111-114 - Marco Cova:

System Security Research at Birmingham: Current Status and Some Future Work. 115-118 - Simha Sethumadhavan, Salvatore J. Stolfo, Angelos D. Keromytis, Junfeng Yang, David I. August:

The SPARCHS Project: Hardware Support for Software Security. 119-122 - Birhanu Eshete

, Adolfo Villafiorita
, Komminist Weldemariam:
Malicious Website Detection: Effectiveness and Efficiency Issues. 123-126 - Federico Maggi

, Stefano Zanero
:
Systems Security Research at Politecnico di Milano. 127-130 - Thorsten Holz

:
Systems Security Research at Ruhr-University Bochum. 131-134

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














