default search action
8th CRiSIS 2013: La Rochelle, France
- Bruno Crispo, Ravi S. Sandhu, Nora Cuppens-Boulahia, Mauro Conti, Jean-Louis Lanet:
2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23-25, 2013. IEEE Computer Society 2013 - Jean-Louis Lanet:
Foreword. 1 - Wafa Ben Jaballah, Mauro Conti, Roberto Di Pietro, Mohamed Mosbah, Nino Vincenzo Verde:
MASS: An efficient and secure broadcast authentication scheme for resource constrained devices. 1-6 - Rosario Giustolisi, Gabriele Lenzini, Giampaolo Bella:
What security for electronic exams? 1-5 - Olivier Levillain, Hervé Debar, Benjamin Morin:
Parsifal: Writing efficient and robust binary parsers, quickly. 1-6 - Golriz Chehrazi:
Economic impact of software security activities in software development. 1-4 - Guillaume Bouffard, Tom Khefif, Jean-Louis Lanet, Ismael Kane, Sergio Casanova Salvia:
Accessing secure information using export file fraudulence. 1-5 - Roberto Di Pietro, Luigi V. Mancini, Antonio Villani, Domenico Vitali:
Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements. 1-8 - Dhouha Ayed, Muhammad Asim, David Llewellyn-Jones:
An event processing approach for threats monitoring of service compositions. 1-10 - Hamza Ghani, Jesus Luna, Abdelmajid Khelil, Najib Alkadri, Neeraj Suri:
Predictive vulnerability scoring in the context of insufficient information availability. 1-8 - Suliman A. Alsuhibany, Charles Morisset, Aad P. A. van Moorsel:
Detection of attack strategies. 1-8 - Mohammed Alenezi, Martin J. Reed:
Selective record route DoS traceback. 1-7 - Nathan Shone, Qi Shi, Madjid Merabti, Kashif Kifayat:
Misbehaviour monitoring on system-of-systems components. 1-6 - Alireza Sadighian, Saman Taghavi Zargar, José M. Fernandez, Antoine Lemay:
Semantic-based context-aware alert fusion for distributed Intrusion Detection Systems. 1-6 - Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar:
A formal methodology for Enterprise Information Security risk assessment. 1-9 - Hamza Ghani, Jesus Luna, Neeraj Suri:
Quantitative assessment of software vulnerabilities based on economic-driven security metrics. 1-8 - Mónica Pinto, José Miguel Horcas:
How to develop secure applications with Aspect-Oriented Programming. 1-3 - Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro:
Privacy-enhanced filtering and collection middleware in EPCglobal networks. 1-8 - Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro:
CREPUSCOLO: A collusion resistant privacy preserving location verification system. 1-9 - Barbara Carminati, Elena Ferrari, Michele Guglielmi:
Controlled information sharing for unspecified emergencies. 1-8 - Michael Lackner, Reinhard Berlach, Michael Hraschan, Reinhold Weiss, Christian Steger:
A defensive Java Card virtual machine to thwart fault attacks by microarchitectural support. 1-8 - Matteo Cristani, Erisa Karafili, Luca Viganò:
A complete tableau procedure for risk analysis. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.