


default search action
WorldCIS 2014: London, United Kingdom
- 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014. IEEE 2014, ISBN 978-1-908320-42-1

Session 1: Information Security
- Francesco Buccafurri

, Gianluca Lax
, Serena Nicolazzo
, Antonino Nocera
:
Fortifying TripAdvisor against reputation-system attacks. 20-21 - Bhawani Shanker Bhati, Pallapa Venkataram:

Data privacy preserving scheme in MANETs. 22-23 - Tamir Tsegaye

, Stephen Flowerday
:
Controls for protecting critical information infrastructure from cyberattacks. 24-29 - Hiroyuki Yoshimura:

Fingerprint templates generated by the fractional fourier, cosine and sine transforms and their generation conditions. 30-34
Session 2: Information Security
- Liezel Cilliers, Stephen Flowerday

:
Information security in a public safety, participatory crowdsourcing smart city project. 36-41 - Natasa Suteva, Aleksandra Mileva

, Mario Loleski:
Computer forensic analisys of some web attacks. 42-47 - Dalal Al-Azizy, David E. Millard, Nigel Shadbolt, Kieron O'Hara:

Deanonymisation in Linked Data: A research roadmap. 48-52 - Zeyad S. Aaber, Richard M. Crowder, Nawfal F. Fadhel

, Gary B. Wills:
Preventing document leakage through active document. 53-58
Session 3: Internet Applications and Cyber Security
- Nihar Vuppalapati, Joon S. Park:

Online Behavioral Advertising (OBA) with privacy protection. 60-65 - Akinola Ajijola, Pavol Zavarsky, Ron Ruhl:

A review and comparative evaluation of forensics guidelines of NIST SP 800-101 Rev.1: 2014 and ISO/IEC 27037: 2012. 66-73 - Samuel Laurén, Petteri Mäki, Sampsa Rauti, Shohreh Hosseinzadeh, Sami Hyrynsalmi

, Ville Leppänen
:
Symbol diversification of linux binaries. 74-79 - Roxanne Piderit

, Stephen Flowerday
:
The risk relationship between trust and information sharing in automotive supply chains. 80-85
Session 4: Information and Network Security
- Pryde N. Sema, Pavol Zavarsky, Ron Ruhl:

A critical review of attack scenarios on the IAEA Technical Guidance NSS 17 Computer Security at Nuclear Facilities. 87-90 - Nawfal F. Fadhel

, Richard M. Crowder, Fatimah Y. Akeel, Gary B. Wills:
Component for 3D printing provenance framework: Security properties components for provenance framework. 91-96 - Omer Ozulku, Nawfal F. Fadhel

, David Argles, Gary B. Wills
:
Anomaly detection system: Towards a framework for enterprise log management of security services. 97-102

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














