default search action
8th SIN 2015: Sochi, Russia
- Oleg B. Makarevich, Ron Poet, Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, Ludmila K. Babenko, Md. Sadek Ferdous, Anthony T. S. Ho, Vijay Laxmi, Josef Pieprzyk:
Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015. ACM 2015, ISBN 978-1-4503-3453-2 - Ron Poet:
The use of mobile devices in authentication. 5 - Ramakrishna Thurimella, Rinku Dewri, William Mitchell:
Record linkage applications in health services research: opportunities and challenges. 6 - Alexey Zhukov:
Lightweight cryptography: modern development paradigms. 7
Security in information systems
- Igor Anikin, Lilia Yu. Emaletdinova:
Information security risk management in computer networks based on fuzzy logic and cost/benefit ratio estimation. 8-11 - André Rifaut, Christophe Feltus, Slim Turki, Djamel Khadraoui:
Analysis of the impact of ethical issues on the management of the access rights. 12-19 - Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Priyadarsi Nanda:
sandFOX: secure sandboxed and isolated environment for firefox browser. 20-27 - Alexander Tarasov:
Modern techniques of function-level fault tolerance in MFM-systems. 28-29 - Alexander Barabanov, Alexey Markov:
Modern trends in the regulatory framework of the information security compliance assessment in Russia based on common criteria. 30-33 - Vladimir V. Glukhov, Igor V. Ilin, A. B. Anisiforov:
Problems of data protection in industrial corporations enterprise architecture. 34-37 - Natalia G. Miloslavskaya, Alexander I. Tolstoy, Vladislav Petrov:
Secure e-Learning portal for teaching business continuity and information security management. 38-41 - Sergey Lapin:
Access control model D-TBAC subject to the requirements to tasks' performing. 42-45 - Francesco Buccafurri, Lidia Fotia, Angelo Furfaro, Alfredo Garro, Matteo Giacalone, Andrea Tundis:
An analytical processing approach to supporting cyber security compliance assessment. 46-53 - Artem Garkusha:
Building data in motion DLP system from scratch using opensource software and confirming its effectiveness within "capture the flag" competitions. 54-57
Cryptographic techniques and key management
- Subhasish Banerjee, Manash Pratim Dutta, Chandan Tilak Bhunia:
A perfect dynamic-id and biometric based remote user authentication scheme under multi-server environments using smart cards. 58-64 - Rajat Subhra Goswami, Subhasish Banerjee, Manash Pratim Dutta, Chandan Tilak Bhunia:
Absolute key variation technique of automatic variable key in cryptography. 65-67 - Naila Mukhtar, Muhammad Shamim Baig, L. A. Khan:
Improved trust based key management for end-to-end secure communication in cellular networks. 68-75 - A. Yu. Boruchinkin:
Secure voice communication system with hardware encryption of data on hands-free headset. 76-79 - Ludmila K. Babenko, Alina Trepacheva:
Cryptanalysis of factoring-based fully homomorphic encryption. 80-83 - Philipp Burtyka, Oleg B. Makarevich:
Execution of data-dependent programs over encrypted data. 84-89 - Maxim Anikeev:
Improvement of treeless signature schemes implementation by random oracle buffering. 90-92
Security-aware software engineering
- Alexander Barabanov, Alexey Markov, Andrey Fadin, Valentin Tsirlov, Igor Shakhalov:
Synthesis of secure software development controls. 93-97
Detecting and preventing fraud with data analytics
- Evstifeeva Natalia Alexandrovna, Evstifeeva Olga Urievna:
Approbation of the methodology for web monitoring of terrorism- and extremism-related content. 100-102 - S. S. Alkhasov, Alexander N. Tselykh, Alexey A. Tselykh:
Application of cluster analysis for the assessment of the share of fraud victims among bank card holders. 103-106 - Daria Chukova, Alexey Pakhomov:
Profile-based students assignment to core financial intelligence unit departments. 107-108 - Margarita Knyazeva, Alexander N. Tselykh, Alexey A. Tselykh, Elena Popkova:
A graph-based data mining approach to preventing financial fraud: a case study. 109-113 - Alexey A. Tselykh, Dmitry Petukhov:
Web service for detecting credit card fraud in near real-time. 114-117 - Nezar Nassr, Eric Steegmans:
Mitigating conflicts of interest by authorization policies. 118-126
Cybersecurity of large-scale and distributed systems
- Alexander Minin, Maxim O. Kalinin:
Information security in computer networks with dynamic topology. 127-130 - Artem S. Konoplev, Alexey G. Busygin:
Steganographic methods of communications in distributed computing networks. 131-134 - Tatiana V. Stepanova, Dmitry P. Zegzhda:
Large-scale systems security evolution: control theory approach. 135-141 - Tatiana V. Stepanova, Alexander I. Pechenkin, Daria S. Lavrova:
Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems. 142-149 - Dmitry V. Moskvin, Denis Ivanov:
Cybersecurity of ad-hoc distributed systems. 150-153 - Zainab Saud, M. Hasan Islam:
Towards proactive detection of advanced persistent threat (APT) attacks using honeypots. 154-157 - Emmanouil Vasilomanolakis, Shankar Karuppayah, Panayotis Kikiras, Max Mühlhäuser:
A honeypot-driven cyber incident monitor: lessons learned and steps ahead. 158-164 - Malik S. K. Awan, Mohammed A. AlGhamdi, Sultan H. Almotiri, Pete Burnap, Omer F. Rana:
A classification framework for distinct cyber-attacks based on occurrence patterns. 165-168 - Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi:
DDoS/EDoS attack in cloud: affecting everyone out there! 169-176 - Ludmila K. Babenko, Philipp Burtyka, Oleg B. Makarevich, Alina Trepacheva:
The general model of secure computation system. 177-184 - Evgeny Shcherba:
Two formal problems of network security and a theory of boolean-valued flow networks. 185-188
Network security and protocols
- Ecir Ugur Küçüksille, Mehmet Ali Yalçinkaya, Samet Ganal:
Developing a penetration test methodology in ensuring router security and testing it in a virtual laboratory. 189-195 - Anna Epishkina, Konstantin Kogos:
Protection from binary and multi-symbol packet length covert channels. 196-202 - Evgeny Sergeevich Abramov, Elena Basan, Oleg B. Makarevich:
Trust management system for mobile cluster-based wireless sensor network. 203-209 - Hamid Hanifi, Leemon C. Baird III, Ramakrishna Thurimella:
A new algorithm for unkeyed jam resistance. 210-216 - Aragats Amirkhanyan, Andrey Sapegin, Marian Gawron, Feng Cheng, Christoph Meinel:
Simulation user behavior on a security testbed using user behavior states graph. 217-223 - Alexander Shukhman, Petr Polezhaev, Yuri Ushakov, Leonid Legashev, Veniamin N. Tarasov, Nadezhda F. Bakhareva:
Development of network security tools for enterprise software-defined networks. 224-228 - Marian Gawron, Aragats Amirkhanyan, Feng Cheng, Christoph Meinel:
Automatic vulnerability detection for weakness visualization and advisory creation. 229-236 - Nilesh Chakraborty, Samrat Mondal:
Few notes towards making honeyword system more secure and usable. 237-245
Computational intelligence techniques in security
- Vladimir Eliseev, Yury Shabalin:
Dynamic response recognition by neural network to detect network host anomaly activity. 246-249 - Sergey Zapechnikov, Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Modeling of next-generation firewalls as queueing services. 250-257 - Naghmeh Moradpoor Sheykhkanloo:
SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques. 258-266 - Andrei Petrovski, Prapa Rattadilok, Sergey Petrovski:
Designing a context-aware cyber physical system for detecting security threats in motor vehicles. 267-270 - Princy George, P. Vinod:
Machine learning approach for filtering spam emails. 271-274
Malware analysis
- Xuefei Wang, Hengtai Ma, Lisha Jing:
A dynamic marking method for implicit information flow in dynamic taint analysis. 275-282 - Shweta Bhandari, Rishabh Gupta, Vijay Laxmi, Manoj Singh Gaur, Akka Zemmari, Maxim Anikeev:
DRACO: DRoid analyst combo an android malware analysis framework. 283-289 - Jyoti Gajrani, Jitendra Sarswat, Meenakshi Tripathi, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti:
A robust dynamic analysis system preventing SandBox detection by Android malware. 290-295 - Jithu Raphel, P. Vinod:
Information theoretic method for classification of packed and encoded files. 296-303 - Meenu Mary John, P. Vinod, K. A. Dhanya:
Hartley's test ranked opcodes for Android malware analysis. 304-311
Security algorithms and analysis
- Andrey Shalyapin, Vadim Zhukov:
Case based analysis in information security incidents management system. 312-317 - Elvia León, Brayan S. Reyes Daza, Octavio J. Salcedo Parra:
Comparison between safety and efficient security of the ARP protocol. 318-321 - Bharat Buddhdev, Rati Bhan, Manoj Singh Gaur, Vijay Laxmi:
DynaDroid: dynamic binary instrumentation based app behavior monitoring framework. 322-325 - Dmitry Mikhaylov, Andrey Starikovskiy, Grigoriy Lebedev, Dmitry Rubin, Alexey Egorov, Eugeniy Uleykin, Alexander Boruchinkin, Anastasia M. Tolstaya:
Developing a system for text-messages protection. 326-329 - N. V. Narendra Kumar, R. K. Shyamasundar:
Labelled mobile ambients model for information flow security in distributed systems. 330-337 - Valeriy O. Osipyan:
Mathematical modelling of cryptosystems based on Diophantine problem with gamma superposition method. 338-341
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.