Stop the war!
Остановите войну!
for scientists:
default search action
CyberSec 2012: Kuala Lumpur, Malaysia
- 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012. IEEE 2012, ISBN 978-1-4673-1425-1
- Kee-Won Kim, Jun-Cheol Jeon:
Cellular semi-systolic Montgomery Multiplier on finite fields. 1-5 - Newton Howard, Sergey Kanareykin:
Intention awareness in cyber security. 6-11 - K. SuganyaDevi, N. Malmurugan, R. Sivakumar:
OF-SMED: An optimal foreground detection method in surveillance system for traffic monitoring. 12-17 - Ghassan Samara, Wafaa A. H. Ali Alsalihy:
A new security mechanism for vehicular communication networks. 18-22 - Salasiah Sulaiman, Zaiton Muda, Julia Juremi:
The new approach of Rijndael key schedule. 23-27 - Somdip Dey:
SD-EI: A cryptographic technique to encrypt images. 28-32 - Ahmad Abusukhon, Mohammad Talib:
A novel network security algorithm based on private key encryption. 33-37 - Julia Juremi, Ramlan Mahmod, Salasiah Sulaiman:
A proposal for improving AES S-box with rotation and key-dependent. 38-42 - Maryam Savari, Mohammad Montazerolzohour, Eng-Thiam Yeoh:
Combining encryption methods in multipurpose smart card. 43-48 - Maryam Savari, Mohammad Montazerolzohour, Eng-Thiam Yeoh:
Comparison of ECC and RSA algorithm in multipurpose smart card application. 49-53 - Maryam Savari, Mohammad Montazerolzohour:
All about encryption in smart card. 54-59 - Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir, Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin:
Towards secure model for SCADA systems. 60-64 - Sung-Hwan Kim, Jung-Ho Eom, Tai-Myoung Chung:
A study on optimization of security function for reducing vulnerabilities in SCADA. 65-69 - M. P. Azuwa, Rabiah Ahmad, Shahrin Sahib, Solahuddin Shamsuddin:
A propose technical security metrics model for SCADA systems. 70-75 - Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa:
How secure is your smartphone: An analysis of smartphone security mechanisms. 76-81 - Abdullahi Arabo, Fadi El-Moussa:
Security framework for smart devices. 82-87 - Liam Smit, Adrie Stander, Jacques Ophoff:
Investigating the accuracy of base station information for estimating cellphone location. 88-93 - Ala A. Abdulrazeg, Norita Md Norwawi, Nurlida Basir:
Security metrics to improve misuse case model. 94-99 - Latifa Ben Arfa Rabai, Mouna Jouini, Marwa Nafati, Anis Ben Aissa, Ali Mili:
An economic model of security threats for cloud computing systems. 100-105 - S. A. I. Yazid, Mohd Faizal Abdollah, Rabiah Ahmad, S. Shahrin, Solahuddin Shamsuddin:
Enhancement of Asset value classification for Mobile devices. 106-110 - Davoud Mougouei, Wan Nurhayati Wan Ab. Rahman, Mohammad Moein Almasi:
Evaluating fault tolerance in security requirements of web services. 111-116 - Mark Evered:
A transitive access control model for dynamic roles and attributes. 117-121 - Alireza Tamjidyamcholo:
Information security risk reduction based on genetic algorithm. 122-127 - Edna Dias Canedo, Rafael Timóteo de Sousa Júnior, Rhandy Rafhael de Carvalho, Robson de Oliveira Albuquerque:
Trust model for private cloud. 128-132 - Hadi KhorasaniZadeh, Norbik Bashah Idris, Jamalul-lail Ab Manan:
Distributed Intrusion Detection trust management through integrity and expertise evaluation. 133-138 - Hamed Khiabani, Norbik Bashah Idris, Jamalul-lail Ab Manan:
Leveraging Remote Attestation to enhance the Unified Trust Model for WSNs. 139-143 - Ali Alkhalifah, John D'Ambra:
The role of Identity Management Systems in enhancing protection of user privacy. 144-149 - Salah Bindahman, Nasriah Zakaria, Norsaadah Zakaria:
3D body scanning technology: Privacy and ethical issues. 150-154 - Mohd Anuar Mat Isa, Jamalul-lail Ab Manan, Ramlan Mahmod, Habibah Hashim, Mar Yah Said, Nur Izura Udzir, Ali Dehghantanha:
Finest authorizing member of common criteria certification. 155-160 - Caiyi Zhu, Xiangkun Dai:
Model of trust management based on finite state machine. 161-164 - Xiangkun Dai, Caiyi Zhu, Yucui Guo:
P2P dynamic trust management system based on trust network. 165-170 - Gareth Owen:
Automated forensic extraction of encryption keys using behavioral analysis. 171-175 - Eric Holm:
Identity crime: The challenges in the regulation of identity crime. 176-179 - Xiaomei Quan, Hongbin Zhang:
Copy-move forgery detection in digital images based on local dimension estimation. 180-185 - Farhood Norouzizadeh Dezfouli, Ali Dehghantanha, Ramlan Mahmoud, Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin:
Volatile memory acquisition using backup for forensic investigation. 186-189 - Mohsen Damshenas, Ali Dehghantanha, Ramlan Mahmoud, Solahuddin bin Shamsuddin:
Forensics investigation challenges in cloud computing environments. 190-194 - Enos K. Mabuto, Hein S. Venter:
User-generated digital forensic evidence in graphic design applications. 195-200 - Mohammed Ibrahim, Mohd Taufik Abdullah, Ali Dehghantanha:
VoIP evidence model: A new forensic method for investigating VoIP malicious attacks. 201-206 - Solmaz Salehian, Farzaneh Masoumiyan, Nur Izura Udzir:
Energy-efficient intrusion detection in Wireless Sensor Network. 207-212 - Warusia Yassin, Nur Izura Udzir, Zaiton Muda, Azizol Abdullah, Mohd Taufik Abdullah:
A Cloud-based Intrusion Detection Service framework. 213-218 - Kamarularifin Abd. Jalil, Qatrunnada Binti Abdul Rahman:
Multiple trusted devices authentication protocol for ubiquitous computing applications. 225-229 - Mohammed A. Alzain, Ben Soh, Eric Pardede:
A New approach using redundancy technique to improve security in cloud computing. 230-235 - Mohammad Faiz Liew Abdullah, A. Z. Yonis:
Performance of LTE Release 8 and Release 10 in wireless communications. 236-241 - Majid Nasirinejad, Alireza Ahmadian Yazdi:
SASy username and password management on the cloud. 242-246 - Fakariah Hani Mohd Ali, Rozita Yunos, Mohd Azuan Mohamad Alias:
Simple port knocking method: Against TCP replay attack and port scanning. 247-252 - Ramya Dharam, Sajjan G. Shiva:
Runtime monitors for tautology based SQL injection attacks. 253-258 - Sumit Kumar, Shashikala Tapaswi:
A centralized detection and prevention technique against ARP poisoning. 259-264 - Maryam Tanha, Seyed Dawood Sajjadi Torshizi, Mohd Taufik Abdullah, Fazirulhisyam Hashim:
An overview of attacks against digital watermarking and their respective countermeasures. 265-270 - Fazli Bin Mat Nor, Kamarularifin Abd. Jalil, Jamalul-lail Ab Manan:
An enhanced remote authentication scheme to mitigate man-in-the-browser attacks. 271-276 - Pin Shen Teh, Shigang Yue, Andrew Beng Jin Teoh:
Improving keystroke dynamics authentication system via multiple feature fusion scheme. 277-282 - Thilla Rajaretnam:
The problem to consent to the collection, use, and disclosure of personal information in cyberspace. 283-288 - Acklyn Murray, Sherali Zeadally, Angelyn Flowers:
An assessment of U.S. legislation on cybersecurity. 289-294 - Jung-Ho Eom, Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung:
Cyber military strategy for cyberspace superiority in cyber warfare. 295-299 - S. M. Nirkhi, Rajiv V. Dharaskar, V. M. Thakre:
Analysis of online messages for identity tracing in cybercrime investigation. 300-305 - Ida Madieha bt. Abdul Ghani Azmi, Sonny Zulhuda, Sigit Puspito Wigati Jarot:
Data breach on the critical information infrastructures: Lessons from the Wikileaks. 306-311 - Bilal Al Sabbagh, Stewart Kowalski:
ST(CS)2 - Featuring socio-technical cyber security warning systems. 312-316 - Mohammad Mahboubian, Nur Izura Udzir, Shamala Subramaniam, Nor Asilah Wati Abdul Hamid:
An alert fusion model inspired by artificial immune system. 317-322 - Rabiah Ahmad, Zahri Yunos, Shahrin Sahib:
Understanding cyber terrorism: The grounded theory method applied. 323-328 - Huyam Al-Amro, Eyas El-Qawasmeh:
Discovering security vulnerabilities and leaks in ASP.NET websites. 329-333
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.