


default search action
MMM-ACNS 2012: St. Petersburg, Russia
- Igor V. Kotenko, Victor A. Skormin:

Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings. Lecture Notes in Computer Science 7531, Springer 2012, ISBN 978-3-642-33703-1
Invited Papers
- Benjamin Livshits:

Finding Malware on a Web Scale. 1-2 - Zhaohui Wang, Ryan Johnson, Rahul Murmuria, Angelos Stavrou

:
Exposing Security Risks for Commercial Mobile Devices. 3-21 - Fabio Martinelli, Ilaria Matteucci

, Charles Morisset:
From Qualitative to Quantitative Enforcement of Security Policy. 22-35 - Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar, Bhavani Thuraisingham:

Design and Implementation of a Cloud-Based Assured Information Sharing System. 36-50
Applied Cryptography and Security Protocols
- Viktor Yakovlev

, Valery I. Korzhik, Mihail Bakaev, Guillermo Morales-Luna:
Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries. 51-64 - Joe-Kai Tsay, Stig Fr. Mjølsnes

:
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols. 65-76 - Alexander A. Moldovyan, Nikolay A. Moldovyan, Evgenia Novikova

:
Blind 384-bit Digital Signature Scheme. 77-83
Access Control and Information Protection
- Xin Jin, Ravi S. Sandhu, Ram Krishnan:

RABAC: Role-Centric Attribute-Based Access Control. 84-96 - Vladimir A. Oleshchuk:

Trust-Aware RBAC. 97-107 - Alexander A. Grusho, Nikolai A. Grusho

, Elena E. Timonina:
Alternative Mechanisms for Information Security. 108-113
Security Policies
- Josée Desharnais

, Erwanne P. Kanyabwero, Nadia Tawbi
:
Enforcing Information Flow Policies by a Three-Valued Analysis. 114-129 - Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:

Towards the Orchestration of Secured Services under Non-disclosure Policies. 130-145 - Andrey Chechulin, Igor V. Kotenko, Vasily Desnitsky:

An Approach for Network Information Flow Analysis for Systems of Embedded Components. 146-155
Security Event and Information Management
- Gustavo Gonzalez Granadillo, Hervé Debar, Grégoire Jacob, Chrystel Gaber, Mohammed Achemlal:

Individual Countermeasure Selection Based on the Return On Response Investment Index. 156-170 - Roland Rieke, Luigi Coppolino

, Andrew Hutchison, Elsa Prieto, Chrystel Gaber:
Security and Reliability Requirements for Advanced Security Event Management. 171-180 - Julian Schütte, Roland Rieke, Timo Winkelvos:

Model-Based Security Event Management. 181-190
Intrusion Prevention, Detection, and Response
- Andrey M. Dolgikh, Tomas Nykodym, Victor A. Skormin, Zachary Birnbaum:

Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks. 191-202 - Yosra Ben Mustapha, Hervé Debar, Grégoire Jacob:

Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation. 203-217 - Dmitry P. Zegzhda, Tatiana V. Stepanova:

Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems. 218-225
Anti-malware Techniques
- Chaitanya Yavvari, Arnur G. Tokhtabayev, Huzefa Rangwala, Angelos Stavrou

:
Malware Characterization Using Behavioral Components. 226-239 - Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra:

MADAM: A Multi-level Anomaly Detector for Android Malware. 240-253 - Dmitriy Komashinskiy, Igor V. Kotenko:

Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods. 254-269
Security Modeling and Cloud Security
- Vasily Desnitsky, Igor V. Kotenko, Andrey Chechulin:

Configuration-Based Approach to Embedded Device Security. 270-285 - Brendan Kerrigan, Yu Chen:

A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts. 286-298 - Peter D. Zegzhda

, Dmitry P. Zegzhda, Maxim O. Kalinin, Artem S. Konoplev:
Security Modeling of Grid Systems Using Petri Nets. 299-308 - Peter D. Zegzhda

, Dmitry P. Zegzhda, Alexey V. Nikolskiy:
Using Graph Theory for Cloud System Security Modeling. 309-318

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














