default search action
WorldCIS 2012: Guelph, ON, Canada
- 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012. IEEE 2012, ISBN 978-1-4673-1108-3
Session 1: Information Security
- Petre Anghelescu:
Encryption of multimedia medical content using programmable cellular automata. 11-16 - Sara Jeza Alotaibi, Mike Wald:
IAMS framework: A new framework for acceptable user experiences for integrating physical and virtual identity access management systems. 17-22 - Mohammed M. Alani:
Neuro-cryptanalysis of DES. 23-27 - Oludele Ogundele, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
The implementation of a full EMV smartcard for a point-of-sale transaction. 28-35
Session 2: Network Security
- Dimitry Drinfeld, Natalija Vlajic:
Smart crawlers for flash-crowd DDoS: The attacker's perspective. 37-44 - Thomas Scheffler, Sven Schindler, Bettina Schnor:
Enforcing location privacy policies through an AOP-based reference monitor. 51-56 - Alexander Vensmer, Sebastian Kiesel:
DynFire: Dynamic firewalling in heterogeneous environments. 57-58
Session 3: Access Control
- Jim McAlear:
Compartmentalization architectures for protection of Internet credentials and transactions from CPU resident malware: Providing foolproof protection for critical credentials and transactions. 60-65 - M. Fahim Ferdous Khan, Ken Sakamura:
Toward a synergy among discretionary, role-based and context-aware access control models in healthcare information technology. 66-70 - Radek Holy, Jana Kalikova, Jan Scherks:
Security concept of individual identification in academic environment of CTU in Prague. 71-76 - P. R. Lakshmi Eswari, N. Sarat Chandra Babu:
A practical business security framework to combat malware threat. 77-80
Session 4: Information Security
- Daniel Huluka, Oliver Popov:
Root cause analysis of session management and broken authentication vulnerabilities. 82-86 - C. F. Larry Heimann, Alan Nochenson:
The effects of loss profiles in interdependent network security. 87-92 - Vorapong Suppakitpaisarn, Hiroshi Imai, Masato Edahiro:
Fastest multi-scalar multiplication based on optimal double-base chains. 93-98 - Mirza Baig, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
The study of evasion of packed PE from static detection. 99-104
Session 5: Internet Application and Technology
- Taiwo Ayodele, Galyna A. Akmayeva, Charles A. Shoniregun:
Machine learning approach towards email management. 106-109 - Ping Lin, Sunil Menon, Shailesh Patel, Lin Lin:
Single Sign-On for multiple unified communications applications. 110-116 - Tyson Brooks, Carlos Caicedo, Joon Park:
Security challenges and countermeasures for trusted virtualized computing environments. 117-122 - Said Rabah Azzam, Shikun Zhou:
Developing compositional ontology alignment framework. 123-125
Session 6: Multimedia and Web Services
- Prithviraj Patil, Sunil Pawar:
Remote agent based automated framework for threat modelling, vulnerability testing of SOA solutions and web services. 127-131 - Alex Naumov, Natalija Vlajic, Hamzeh Roumani:
VLUS: Visual location-based URL screening tool for improved WWW security. 132-138 - Chad M. S. Steel:
The Mask-SIFT cascading classifier for pornography detection. 139-142
Session 7: Information and Network Security
- Arun Nagarle Shivashankarappa, Leonid Smalov, Dharmalingam Ramalingam, Neelamegam Anbazhagan:
Implementing it governance using COBIT: A case study focusing on critical success factors. 144-149 - Cyril Ikenna Nwafor, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
A COBIT and NIST-based conceptual framework for enterprise user account lifecycle management. 150-157 - Eyad Abdullah Bogari, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
An analysis of security weaknesses in the evolution of RFID enabled passport. 158-166 - Nashwa A. F. Mohamed, Mohsin H. A. Hashim, Eihab B. M. Bashier, Mohammed Hassouna:
Fully-secure and efficient pairing-free certificateless authenticated key agreement protocol. 167-172
Session 8: Information Security and Access Control
- Norah Farooqi, Siobhán North:
Logging in XML databases: Xlog file for trust based access control. 174-175 - Saad S. Alaboodi, Gordon B. Agnew:
Bayesian networks for modeling failure dependency in access control models. 176-182 - Juan José Martínez Castillo, Karina Aviles Rodriguez:
Security architecture for Ad hoc NOMOHi networks: Development of a project based on emergency rural telecommunications. 183-187
Session 9: Information Security
- Emre Erturk:
A case study in open source software security and privacy: Android adware. 189-191 - Iain Kyte, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
Enhanced side-channel analysis method to detect hardware virtualization based rootkits. 192-201 - Joon S. Park, Sookyung Kim, Charles A. Kamhoua, Kevin A. Kwiat:
Towards trusted data management in online social network (OSN) services. 202-203 - Ho-Seok Kang, Sung-Ryul Kim:
Small DDoS defense system using routing deployment method. 204-206
Session 10: Information Security
- Taiwo Ayodele, Charles A. Shoniregun, Galyna A. Akmayeva:
Anti-phishing prevention measure for email systems. 208-211 - Adetorera Sogbesan, Ayo Ibidapo, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Collusion threat profile analysis: Review and analysis of MERIT model. 212-217 - Des Fernando, Pavol Zavarsky:
Secure decommissioning of confidential electronically stored information (CESI): A framework for managing CESI in the disposal phaseas needed. 218-222
Session 11: Information Security
- Prince Onabajo, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
The study of civil litigation in data storage environment. 224-230 - Funminiyi Olajide, Nick Savage, Galyna A. Akmayeva, Charles A. Shoniregun:
Digital forensic research - The analysis of user input on volatile memory of Windows application. 231-238 - Maria Angel Marquez Andrade, Natalija Vlajic:
Dirt Jumper: A key player in today's botnet-for-DDoS market. 239-244 - Constantin Anton, Laurentiu Ionescu, Ion Tutanescu, Alin Mazare, Gheorghe Serban:
Using associative memories in coding theory for communication channels. 245-248
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.