


default search action
WorldCIS 2012: Guelph, ON, Canada
- 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012. IEEE 2012, ISBN 978-1-4673-1108-3

Session 1: Information Security
- Petre Anghelescu:

Encryption of multimedia medical content using programmable cellular automata. 11-16 - Sara Jeza Alotaibi, Mike Wald:

IAMS framework: A new framework for acceptable user experiences for integrating physical and virtual identity access management systems. 17-22 - Mohammed M. Alani:

Neuro-cryptanalysis of DES. 23-27 - Oludele Ogundele, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:

The implementation of a full EMV smartcard for a point-of-sale transaction. 28-35
Session 2: Network Security
- Dimitry Drinfeld, Natalija Vlajic:

Smart crawlers for flash-crowd DDoS: The attacker's perspective. 37-44 - Thomas Scheffler, Sven Schindler, Bettina Schnor:

Enforcing location privacy policies through an AOP-based reference monitor. 51-56 - Alexander Vensmer, Sebastian Kiesel:

DynFire: Dynamic firewalling in heterogeneous environments. 57-58
Session 3: Access Control
- Jim McAlear:

Compartmentalization architectures for protection of Internet credentials and transactions from CPU resident malware: Providing foolproof protection for critical credentials and transactions. 60-65 - M. Fahim Ferdous Khan, Ken Sakamura:

Toward a synergy among discretionary, role-based and context-aware access control models in healthcare information technology. 66-70 - Radek Holy, Jana Kalikova, Jan Scherks:

Security concept of individual identification in academic environment of CTU in Prague. 71-76 - P. R. Lakshmi Eswari, N. Sarat Chandra Babu:

A practical business security framework to combat malware threat. 77-80
Session 4: Information Security
- Daniel Huluka, Oliver Popov:

Root cause analysis of session management and broken authentication vulnerabilities. 82-86 - C. F. Larry Heimann, Alan Nochenson:

The effects of loss profiles in interdependent network security. 87-92 - Vorapong Suppakitpaisarn, Hiroshi Imai, Masato Edahiro:

Fastest multi-scalar multiplication based on optimal double-base chains. 93-98 - Mirza Baig, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:

The study of evasion of packed PE from static detection. 99-104
Session 5: Internet Application and Technology
- Taiwo Ayodele, Galyna A. Akmayeva, Charles A. Shoniregun:

Machine learning approach towards email management. 106-109 - Ping Lin, Sunil Menon, Shailesh Patel, Lin Lin:

Single Sign-On for multiple unified communications applications. 110-116 - Tyson Brooks, Carlos Caicedo, Joon Park:

Security challenges and countermeasures for trusted virtualized computing environments. 117-122 - Said Rabah Azzam, Shikun Zhou:

Developing compositional ontology alignment framework. 123-125
Session 6: Multimedia and Web Services
- Prithviraj Patil, Sunil Pawar:

Remote agent based automated framework for threat modelling, vulnerability testing of SOA solutions and web services. 127-131 - Alex Naumov, Natalija Vlajic, Hamzeh Roumani:

VLUS: Visual location-based URL screening tool for improved WWW security. 132-138 - Chad M. S. Steel:

The Mask-SIFT cascading classifier for pornography detection. 139-142
Session 7: Information and Network Security
- Arun Nagarle Shivashankarappa, Leonid Smalov, Dharmalingam Ramalingam, Neelamegam Anbazhagan:

Implementing it governance using COBIT: A case study focusing on critical success factors. 144-149 - Cyril Ikenna Nwafor, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:

A COBIT and NIST-based conceptual framework for enterprise user account lifecycle management. 150-157 - Eyad Abdullah Bogari, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:

An analysis of security weaknesses in the evolution of RFID enabled passport. 158-166 - Nashwa A. F. Mohamed, Mohsin H. A. Hashim, Eihab B. M. Bashier, Mohammed Hassouna:

Fully-secure and efficient pairing-free certificateless authenticated key agreement protocol. 167-172
Session 8: Information Security and Access Control
- Norah Farooqi, Siobhán North:

Logging in XML databases: Xlog file for trust based access control. 174-175 - Saad S. Alaboodi, Gordon B. Agnew:

Bayesian networks for modeling failure dependency in access control models. 176-182 - Juan José Martínez Castillo, Karina Aviles Rodriguez:

Security architecture for Ad hoc NOMOHi networks: Development of a project based on emergency rural telecommunications. 183-187
Session 9: Information Security
- Emre Erturk:

A case study in open source software security and privacy: Android adware. 189-191 - Iain Kyte, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:

Enhanced side-channel analysis method to detect hardware virtualization based rootkits. 192-201 - Joon S. Park, Sookyung Kim, Charles A. Kamhoua, Kevin A. Kwiat:

Towards trusted data management in online social network (OSN) services. 202-203 - Ho-Seok Kang, Sung-Ryul Kim:

Small DDoS defense system using routing deployment method. 204-206
Session 10: Information Security
- Taiwo Ayodele, Charles A. Shoniregun, Galyna A. Akmayeva:

Anti-phishing prevention measure for email systems. 208-211 - Adetorera Sogbesan, Ayo Ibidapo, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:

Collusion threat profile analysis: Review and analysis of MERIT model. 212-217 - Des Fernando, Pavol Zavarsky:

Secure decommissioning of confidential electronically stored information (CESI): A framework for managing CESI in the disposal phaseas needed. 218-222
Session 11: Information Security
- Prince Onabajo, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:

The study of civil litigation in data storage environment. 224-230 - Funminiyi Olajide, Nick Savage, Galyna A. Akmayeva, Charles A. Shoniregun:

Digital forensic research - The analysis of user input on volatile memory of Windows application. 231-238 - Maria Angel Marquez Andrade, Natalija Vlajic:

Dirt Jumper: A key player in today's botnet-for-DDoS market. 239-244 - Constantin Anton, Laurentiu Ionescu, Ion Tutanescu, Alin Mazare, Gheorghe Serban:

Using associative memories in coding theory for communication channels. 245-248

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














