default search action
11th SIN 2018: Cardiff, Wales, UK
- Philipp Reinecke, Naghmeh Moradpoor, George Theodorakopoulos:
Proceedings of the 11th International Conference on Security of Information and Networks, SIN 2018, Cardiff, United Kingdom, September 10-12, 2018. ACM 2018, ISBN 978-1-4503-6608-3
Full Papers
- Felisberto Semedo, Naghmeh Moradpoor, Majid Rafiq:
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. 1:1-1:6 - Yang Ma, Hassan B. Kazemian:
Trapdoor-indistinguishable Secure Channel Free Public Key Encryption with Multi-Keywords Search (Student Contributions). 2:1-2:6 - John Curry, Nick Drage:
Developments in State Level Cyber Wargaming. 3:1-3:6 - Maxim Pismensky, Elena Basan, Oleg B. Makarevich:
Development of a Protection System for a Group of Mobile Robots, Taking into Account the Requirements of Foreign and Russian Legislation. 4:1-4:8 - María Magdalena Payeras Capellà, Macià Mut Puigserver, Llorenç Huguet i Rotger:
Anonymity in Secure Access to Integrated Touristic Services Including Payment. 5:1-5:8 - Liudmila Babenko, Ilya Pisarev:
Distributed E-Voting System Based On Blind Intermediaries Using Homomorphic Encryption. 6:1-6:6 - Peter D. Zegzhda, Dmitry P. Zegzhda, Evgeny Pavlenko, Gleb Ignatev:
Applying deep learning techniques for Android malware detection. 7:1-7:8 - Ludmila K. Babenko, Alexey Kirillov:
Development of method for malware classification based on statistical methods and an extended set of system calls data. 8:1-8:6 - Viacheslav Belenko, Vasiliy M. Krundyshev, Maxim O. Kalinin:
Synthetic datasets generation for intrusion detection in VANET. 9:1-9:6 - Gaurav Pareek, B. R. Purushothama:
Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost. 10:1-10:7 - Vishnu Kumar, Rajveer Singh Shekhawat, Manoj Kumar Bohra:
Secure Data Aggregation in WSNs: A Two Level Framework. 11:1-11:7 - Alexander Branitskiy, Igor V. Kotenko:
Software Tool for Testing the Packet Analyzer of Network Attack Detection Systems. 12:1-12:8 - Alexander I. Pechenkin, Roman Demidov:
Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection. 13:1-13:6 - Evgeniya Ishchukova, Maxim Anikeev, Vyacheslav Salmanov, Oksana Shamilyan:
Linear and Differential Analysis of Simplified Kuznyechik Cipher. 14:1-14:6
Short Papers
- Valeriy O. Osipyan, Kirill I. Litvinov:
A mathematical model of the cryptosystem based on the linear Diophantine equation. 15:1-15:4 - David Bird:
A Conceptual Framework To Identify Cyber Risks Associated With The Use Of Public Cloud Computing. 16:1-16:4 - Dmitriy K. Levonevskiy, Ludmila N. Fedorchenko, Irina Afanasieva, Fedor Novikov:
Architecture of the Software System for Adaptive Protection of Network Infrastructure. 17:1-17:4 - Abdulaziz Almehmadi:
SCADA Networks Anomaly-based Intrusion Detection System. 18:1-18:4 - Ahmed Dauda, Scott Mclean, Abdulaziz Almehmadi, Khalil El-Khatib:
Big Data Analytics Architecture for Security Intelligence. 19:1-19:4 - Elena Basan, Oleg B. Makarevich, Alexandr S. Basan:
Development of the Anomaly Detection Method for a Group of Mobile Robots. 20:1-20:4 - Lauri Koivunen, Sampsa Rauti, Ville Leppänen:
Towards Profiling Program Instances in Host-Based Intrusion Detection Systems by Recognizing Software Update Patterns. 21:1-21:4 - Igor V. Kotenko, Sergey Ageev, Igor Saenko:
Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems. 22:1-22:4
Extended Abstracts
- Ekaterina Maro, Maksim Kovalchuk:
Bypass Biometric Lock Systems With Gelatin Artificial Fingerprint. 23:1-23:2 - Alexey G. Busygin, Artem S. Konoplev, Maxim O. Kalinin, Dmitry P. Zegzhda:
Floating Genesis Block Enhancement for Blockchain Based Routing Between Connected Vehicles and Software-defined VANET Security Services. 24:1-24:2 - Adnan Imeri, Christophe Feltus, Djamel Khadraoui, Nazim Agoulmine, Damien Nicolas:
Solving the trust issues in the process of transportation of dangerous goods by using blockchain technology. 25:1-25:2 - Rawan Baalous, Ronald Poet:
How Dangerous Permissions are Described in Android Apps' Privacy Policies? 26:1-26:2 - Elena Basan, Oleg B. Makarevich, Andrew Stepenkin:
Development of the Methodology for Testing the Security of Group Management System for Mobile Robots. 27:1-27:2 - R. A. Gevorgyan, E. S. Abramov:
Detection of packaged and encrypted PE files with the use of machine-learning algorithm. 28:1-28:2
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.