default search action
9. FPS 2016: Québec City, QC, Canada
- Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquín García-Alfaro:
Foundations and Practice of Security - 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10128, Springer 2017, ISBN 978-3-319-51965-4
Malware and Anomaly Detection
- Antonio La Marra, Fabio Martinelli, Andrea Saracino, Mina Sheikhalishahi:
MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes. 3-19 - Andrew Bedford, Sébastien Garvin, Josée Desharnais, Nadia Tawbi, Hana Ajakan, Frédéric Audet, Bernard Lebel:
Andrana: Quick and Accurate Malware Detection for Android. 20-35 - Richard E. Harang, Peter Mell:
Micro-signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly Detection. 36-47
Intrusion Response
- Tarek Bouyahia, Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel:
Multi-Criteria Recommender Approach for Supporting Intrusion Response System. 51-67 - Nadine Herold, Matthias Wachs, Stephan-Alexander Posselt, Georg Carle:
An Optimal Metric-Aware Response Selection Strategy for Intrusion Response Systems. 68-84 - Zhongtian Chen, Hao Han:
Attack Mitigation by Data Structure Randomization. 85-93
Vulnerability Analysis and Security Metrics
- Salaheddine Zerkane, David Espes, Philippe Le Parc, Frédéric Cuppens:
Vulnerability Analysis of Software Defined Networking. 97-116 - Mickael Emirkanian-Bouchard, Lingyu Wang:
Towards Metric-Driven, Application-Specific Visualization of Attack Graphs. 117-134 - Sofiene Boulares, Kamel Adi, Luigi Logrippo:
Insider Threat Likelihood Assessment for Access Control Systems: Quantitative Approach. 135-142
Privacy and Verification
- Tushar Kanti Saha, Takeshi Koshiba:
An Enhancement of Privacy-Preserving Wildcards Pattern Matching. 145-160 - Mina Sheikhalishahi, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli:
Privacy-Aware Data Sharing in a Tree-Based Categorical Clustering Algorithm. 161-178 - Raphaël Khoury, Sébastien Gaboury, Sylvain Hallé:
Three Views of Log Trace Triaging. 179-195
Crypto and Communication Security
- Hélène Le Bouder, Ronan Lashermes, Yanis Linge, Gaël Thomas, Jean-Yves Zie:
A Multi-round Side Channel Attack on AES Using Belief Propagation. 199-213 - Olivier Blazy, Xavier Bultel, Pascal Lafourcade:
Anonymizable Ring Signature Without Pairing. 214-222 - Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
Security Analysis of WirelessHART Communication Scheme. 223-238
Malware and Antivirus
- Guillaume Bonfante, Julien Oury Nogues:
Function Classification for the Retro-Engineering of Malwares. 241-255 - Saed Alrabaee, Paria Shirani, Mourad Debbabi, Lingyu Wang:
On the Feasibility of Malware Authorship Attribution. 256-272 - Erkan Ersan, Lior Malka, Bruce M. Kapron:
Semantically Non-preserving Transformations for Antivirus Evaluation. 273-281
Web, Cloud, and Delegation
- Deepak Subramanian, Guillaume Hiet, Christophe Bidan:
A Self-correcting Information Flow Control Model for the Web-Browser. 285-301 - Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Threat Modeling for Cloud Data Center Infrastructures. 302-319 - Daniel Servos, Sylvia L. Osborn:
Strategies for Incorporating Delegation into Attribute-Based Access Control (ABAC). 320-328
Physical Security
- Jurek Czyzowicz, Adrian Kosowski, Evangelos Kranakis, Najmeh Taleb:
Patrolling Trees with Mobile Robots. 331-344 - Oscar M. Guillen, Fabrizio De Santis, Ralf Brederlow, Georg Sigl:
Towards Side-Channel Secure Firmware Updates - A Minimalist Anomaly Detection Approach. 345-360
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.