


default search action
4th NSS 2010: Melbourne, Australia
- Yang Xiang, Pierangela Samarati, Jiankun Hu, Wanlei Zhou, Ahmad-Reza Sadeghi:

Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-8484-3
NSS 2010 Regular Papers
- Mohamed Nassar

, Radu State, Olivier Festor
:
A Framework for Monitoring SIP Enterprise Networks. 1-8 - Ion Alberdi, Vincent Nicomette, Philippe Owezarski:

Luth: Composing and Parallelizing Midpoint Inspection Devices. 9-16 - Kun Peng, Feng Bao:

Efficient Proof of Validity of Votes in Homomorphic E-Voting. 17-23 - Sebastian Roschke, Feng Cheng, Christoph Meinel:

A Flexible and Efficient Alert Correlation Platform for Distributed IDS. 24-31 - McKay D. Williams, Sheldon A. Munns, Michael A. Temple, Michael J. Mendenhall:

RF-DNA Fingerprinting for Airport WiMax Communications Security. 32-39 - Thomas H. Clausen

, Ulrich Herberg:
Router and Link Admittance Control in the Optimized Link State Routing Protocol Version 2 (OLSRv2). 40-46 - Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel, Alexandre Dulaunoy:

Breaking Tor Anonymity with Game Theory and Data Mining. 47-54 - Hao Gao, Jun Yan

, Yi Mu:
Dynamic Trust Model for Federated Identity Management. 55-61 - Peter Danner, Daniel M. Hein, Stefan Kraxberger:

Securing Emergency Response Operations Using Distributed Trust Decisions. 62-69 - Qiang Liu, Jianping Yin, Zhiping Cai, Ming Zhu:

A Novel Threat Assessment Method for DDoS Early Warning Using Network Vulnerability Analysis. 70-74 - Mohammed Al Zomai, Audun Jøsang

:
The Mobile Phone as a Multi OTP Device Using Trusted Computing. 75-82 - Jinchao Xu, Guosun Zeng:

A Software Watermarking Algorithm Based on Stack-State Transition Graph. 83-88 - Mansoor Alicherry, Angelos D. Keromytis:

DIPLOMA: Distributed Policy Enforcement Architecture for MANETs. 89-98 - Xiaoxun Sun, Hua Wang

:
Towards Identify Anonymization in Large Survey Rating Data. 99-104 - Alban Gabillon, Léo Letouzey:

A View Based Access Control Model for SPARQL. 105-112 - Li Lin, Christopher Leckie

, Chenfeng Vincent Zhou:
Comparative Analysis of HTTP Anomaly Detection Algorithms: DFA vs N-Grams. 113-119 - Andrew White, Alan Tickle, Andrew J. Clark:

Overcoming Reputation and Proof-of-Work Systems in Botnets. 120-127 - Yinghua Guo, Matthew Simon:

Network Forensics in MANET: Traffic Analysis of Source Spoofed DoS Attacks. 128-135 - Chunli Lv, Xiaoqi Jia, Lijun Tian, Jiwu Jing, Mingli Sun:

Efficient Ideal Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR Operations. 136-143 - Aashish Sharma, Zbigniew Kalbarczyk, Ravishankar K. Iyer, James Barlow:

Analysis of Credential Stealing Attacks in an Open Networked Environment. 144-151 - Richard O. Sinnott

, Sardar Hussain:
Security-Oriented Workflows for the Social Sciences. 152-159 - Fengyu Wang, Bin Gong, Shanqing Guo, Xiaofeng Wang:

Monitoring Heavy-Hitter Flows in High-Speed Network Concurrently. 160-166 - Chaabane Abdelberi, Pere Manils, Mohamed Ali Kâafar

:
Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network. 167-174 - Suriadi Suriadi, Andrew J. Clark, Desmond Allan Schmidt:

Validating Denial of Service Vulnerabilities in Web Services. 175-182 - Juan E. Tapiador

, John A. Clark:
Information-Theoretic Detection of Masquerade Mimicry Attacks. 183-190 - Reginald Lal, Andrew Chiou:

Computational Intelligence Utilisation in Simulation of Congestion Control in TCP/IP Edge Network. 191-198 - Kobra Khanmohammadi, Siv Hilde Houmb:

Business Process-Based Information Security Risk Assessment. 199-206 - Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus:

Risk-Aware Framework for Activating and Deactivating Policy-Based Response. 207-215 - Shan Juan Xie, Sook Yoon, Hui Gong, Jin Wook Shin, Dong Sun Park:

Fingerprint Reference Point Determination Based on Orientation Features. 216-222 - Anya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Claire Goursaud, Cédric Lauradoux, Marine Minier:

Energy Friendly Integrity for Network Coding in Wireless Sensor Networks. 223-230 - Alessandro Artale, Bruno Crispo, Fausto Giunchiglia

, Fatih Turkmen
, Rui Zhang:
Reasoning about Relation Based Access Control. 231-238 - Hua Wang

, Lili Sun:
Trust-Involved Access Control in Collaborative Open Social Networks. 239-246 - Sheng Wen

, Weijia Jia
, Wei Zhou, Wanlei Zhou
, Chuan Xu:
CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd. 247-254
NSS 2010 Short Papers
- Islam Tharwat Abdel-Halim

, Hossam M. A. Fahmy, Ayman M. Bahaa El-Din
, Mohamed H. El-Shafey
:
Agent-Based Trusted On-Demand Routing Protocol for Mobile Ad Hoc Networks. 255-262 - Sheila Becker, Humberto J. Abdelnur, Jorge Lucángeli Obes, Radu State, Olivier Festor:

Improving Fuzz Testing Using Game Theory. 263-268 - Adonis P. H. Fung, K. W. Cheung:

HTTPSLock: Enforcing HTTPS in Unmodified Browsers with Cached Javascript. 269-274 - Raihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar

:
A Node-based Trust Management Scheme for Mobile Ad-Hoc Networks. 275-280 - Lifang Zi, John Yearwood, Xinwen Wu

:
Adaptive Clustering with Feature Ranking for DDoS Attacks Detection. 281-286 - Ahmad Jabas, Wael Abdulal, Ramachandram Sirandas

:
An Efficient and High Scalable Key Distribution Scheme for Mobile Ad Hoc Network through Mining Traffic Meta-data Patterns. 287-292 - Yinghua Guo, Ivan Lee

:
Forensic Analysis of DoS Attack Traffic in MANET. 293-298 - Robert Koch, Gabi Dreo Rodosek:

Command Evaluation in Encrypted Remote Sessions. 299-305 - Rong-Jian Chen, Yu-Cheng Peng, Jun-Jian Lin, Jui-Lin Lai, Shi-Jinn Horng:

Novel Multi-bit Bitwise Adaptive Embedding Algorithms with Minimum Error for Data Hiding. 306-311 - Qussai Yaseen

, Brajendra Panda:
Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders' Knowledgebase. 312-317 - Liang Fu Lu, Mao Lin Huang

, Mehmet A. Orgun
, Jiawan Zhang:
An Improved Wavelet Analysis Method for Detecting DDoS Attacks. 318-322 - Patryk Szewczyk

, Craig Valli
:
Ignorant Experts: Computer and Network Security Support from Internet Service Providers. 323-327 - Ray Hunt, Jill Slay

:
The Design of Real-Time Adaptive Forensically Sound Secure Critical Infrastructure. 328-333 - Eun-Jun Yoon, Kee-Young Yoo:

A Three-Factor Authenticated Key Agreement Scheme for SIP on Elliptic Curves. 334-339 - Oscar Moreno, Andrew Z. Tirkel

, Ron G. van Schyndel, Parampalli Udaya
:
New Families of 2D & 3D Arrays for Sub-image Watermarking. 340-344 - M. Manzur Murshed

, Tishna Sabrina, Anindya Iqbal, Kh Mahmudul Alam:
A Novel Anonymization Technique to Trade Off Location Privacy and Data Integrity in Participatory Sensing Systems. 345-350 - Shamsul Kamal Ahmad Khalid

, Jacob Zimmermann, Diane Corney, Colin J. Fidge
:
Automatic Generation of Assertions to Detect Potential Security Vulnerabilities in C Programs That Use Union and Pointer Types. 351-356 - Thaneswaran Velauthapillai, Aaron Harwood

, Shanika Karunasekera
:
Global Detection of Flooding-Based DDoS Attacks Using a Cooperative Overlay Network. 357-364 - Steven Simpson

, Adam T. Lindsay, David Hutchison
:
Identifying Legitimate Clients under Distributed Denial-of-Service Attacks. 365-370 - Matthieu-P. Schapranow

, Alexander Zeier, Hasso Plattner:
A Dynamic Mutual RFID Authentication Model Preventing Unauthorized Third Party Access. 371-376 - Ping Li, Wanlei Zhou

, Yini Wang:
Getting the Real-Time Precise Round-Trip Time for Stepping Stone Detection. 377-382
First International Conference on Data and Knowledge Engineering (ICDKE 2010)
Modeling
- Md. Shamsul Huda, John Yearwood, Ron Borland:

Cluster Based Rule Discovery Model for Enhancement of Government's Tobacco Control Strategy. 383-390 - Min Li, Hua Wang

:
Specifying Usage Control Model with Object Constraint Language. 391-397 - António Rosado, João M. P. Cardoso

:
A Query Processing Strategy for Conceptual Queries Based on Object-Role Modeling. 398-403 - Heng-Sheng Tsai, Raj Gururajan:

The Enablers and Implementation Model for Mobile KMS in Australian Healthcare. 404-411
Algorithms
- Yuping Wang, Lei Fan:

A Smoothing Evolutionary Algorithm with Circle Search for Global Optimization. 412-418 - Yi Zhuang:

The PU-Tree: A Partition-Based Uncertain High-Dimensional Indexing Algorithm. 419-424 - Bing-Yuan Pu, Ting-Zhu Huang

, Chun Wen:
An Improved PageRank Algorithm: Immune to Spam. 425-429 - Chuan-Long Wang, Yan-Ping Wang:

The Convergences of Multisplitting Parallel Methods for Non-Hermitian Positive Definite Systems. 430-434
System Approach
- Md. Enamul Kabir, Hua Wang

:
Systematic Clustering-Based Microaggregation for Statistical Disclosure Control. 435-441 - Md. Shamsul Huda, John Yearwood, Andrew Stranieri

:
Hybrid Wrapper-Filter Approaches for Input Feature Selection Using Maximum Relevance and Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA). 442-449 - Ping Li, Guangdong Huang:

Credit Spread Option Pricing by Dynamic Copulas. 450-455 - Eder Mateus Nunes Gonçalves

:
An Approach to Specify Knowledge in Multi-agent Systems Using Petri Nets. 456-461 - Abdul Hafeez-Baig

, Raj Gururajan, Heng-Sheng Tsai, Prema Sankaran
:
Exploratory Study to Explore the Role of ICT in the Process of Knowledge Management in an Indian Business Environment. 462-469
Knowledge Discovery
- Ahmad Ali Iqbal, Maximilian Ott

, Aruna Seneviratne
:
Resource Selection from Distributed Semantic Web Stores. 470-476 - D. Marks, Elias Ioup, John Sample, Mahdi Abdelguerfi, Fady Qaddoura:

Spatio-temporal Knowledge Discovery in Very Large METOC Data Sets. 477-480 - Yonglong Luo, Lei Shi, Caiyun Zhang, Ji Zhang:

Privacy-Preserving Protocols for String Matching. 481-485
Database and Applications
- Lili Sun, Hua Wang

, Raj Jururajin, Sri Sriprakash:
A Purpose Based Access Control in XML Databases System. 486-493 - Ji Zhang:

An Efficient and Effective Duplication Detection Method in Large Database Applications. 494-501 - Chih-Lun Chou, Gwo-Jiun Horng, Sheng-Tzong Cheng:

Fast IPTV Channel Switching Using Hot-View and Personalized Channel Preload over IEEE 802.16e. 502-507 - Yi Zhuang:

A Pivot-Based Distributed Pseudo Facial Image Retrieval in Manifold Spaces: An Efficiency Study. 508-514
System Architecture and Framework
- Fabrício da Costa Dias, Ryan Ribeiro de Azevedo

, Cleyton Mário de Oliveira Rodrigues
, Eric Rommel Dantas Galvão, Guilherme Ataíde Dias
, Roberto Souto Maior de Barros:
OntoPsic: Leveraging the Knowledge in the Treatment and Diagnosis of Telepsychiatry. 515-520 - Ronald G. Addie

, Alan W. Colman
:
Five Criteria for Web-Services Security Architecture. 521-526 - Kaleb Lee:

A Two-Step Mutual Authentication Protocol Based on Randomized Hash-Lock for Small RFID Networks. 527-533 - Pål Halvorsen, Dag Johansen, Bjørn Olstad, Tomas Kupka, Sverre Tennøe:

vESP: A Video-Enabled Enterprise Search Platform. 534-541
First Asia-Pacific Workshop on Cyber Security (APWCS 2010)
- Raylin Tso

, Xun Yi
:
Certificateless Proxy Signature and Its Extension to Blind Signature. 542-547 - Min-Hua Shao, Ying-Chih Chin:

A Novel Approach to Dynamic ID-Based Remote User Authentication Scheme for Multi-server Environment. 548-553 - S. Sharmila Deva Selvi, S. Sree Vivek, Chandrasekaran Pandu Rangan, S. Priti:

On the Security of Identity Based Threshold Unsigncryption Schemes. 554-559 - Farzad Salim, Nicholas Paul Sheppard

, Reihaneh Safavi-Naini:
A Rights Management Approach to Securing Data Distribution in Coalitions. 560-567 - S. Sharmila Deva Selvi, S. Sree Vivek, S. Gopi Nath, C. Pandu Rangan:

Identity Based Self Delegated Signature - Self Proxy Signatures. 568-573 - Xun Yi

:
Security Analysis of Yang et al.'s Practical Password-Based Two-Server Authentication and Key Exchange System. 574-578
First Workshop on Bio-inspired and Fusion Systems for Cyber Security (BFSCS 2010)
- Len Bui, Dat Tran

, Xu Huang, Girija Chetty
:
Face Gender Recognition Based on 2D Principal Component Analysis and Support Vector Machine. 579-582 - Wanli Ma

, John Campbell
, Dat Tran
, Dale Kleeman:
Password Entropy and Password Quality. 583-587 - Xu Huang, Pritam Gajkumar Shah

, Dharmendra Sharma
:
Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange. 588-593 - Xu Huang, Shirantha Wijesekera, Dharmendra Sharma

:
Secure Communication in 802.11 Networks with a Novel Protocol Using Quantum Cryptography. 594-599 - Xu Huang, John Campbell

, Frank Gao:
Scalar Multiplication of a Dynamic Window with Fuzzy Controller for Elliptic Curve Cryptography. 600-605 - Girija Chetty

, Monica Biswas, Rashmi Singh:
Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features. 606-613

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














