Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2859846guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
CYBERC '15: Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
2015 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
September 17 - 19, 2015
ISBN:
978-1-4673-9200-6
Published:
17 September 2015

Reflects downloads up to 19 Feb 2025Bibliometrics
Abstract

No abstract available.

Article
Cover Art
Page C1
Article
[Front cover]
Page C4
Article
Article
Article
Article
Preface
Article
Program Committee
Article
Reviewers
Article
Keynotes
Article
A Chaos-Based Hash Function

The paper proposes a cubic chaotic mapping. Its bifurcation graph and Lyapunov exponent show that the mapping owns excellent chaotic properties. A chaos-based hash function is then constructed. Compared to a chaotic hash function based on Logistic ...

Article
A Novel Implementation of a Hash Function Based on XML DOM Parser

This paper solves the problem of the excessive memory footprint and the slow speed of parsing when using the DOM method to parse the XML data. As we know the current XML parsing technology is the key of XML research field and now there are a lot of XML ...

Article
Kernel Malware Core Implementation: A Survey

Kernel Malware resides and performs malicious functions in the operating system kernel space. It is more difficult to be detected and cleared than the malwares implemented in the user space because of its higher authority. It also has better flexibility ...

Article
Simulation of the Users' Email Behavior Based on BP-BDI Model

With the development of the Internet, email has become a part of our life to communicate with each other. While bringing convenience for users, it also threats the users' network security. For example, if the user clicks on a malicious URL link in the ...

Article
A Hierarchical Framework of Security Situation Assessment for Information System

Security situation assessment is an effective way to analyze the situation of an information system, which helps administrator understand the current system risk status and make policy to response in time. However, the existing researches for security ...

Article
XSS Vulnerability Detection Using Optimized Attack Vector Repertory

In order to detect the Cross-Site Script (XSS)vulnerabilities in the web applications, this paper proposes a method of XSS vulnerability detection using optimal attack vector repertory. This method generates an attack vector repertory automatically, ...

Article
A 4-Dimensional Discrete Chaotic System and Application in Image Encryption with Avalanche Effects

This paper introduces a 4-dimensional chaotic map, consisting of sine, and cosine functions. Using this map and a generalized synchronization (GCS) theorem designs an 8-dimensional GCS system. The GCS system is used to design a chaotic pseudorandom ...

Article
Advanced Classification Lists (Dirty Word Lists) for Automatic Security Classification

With the increasing risk of data leakage, information guards have emerged as a novel concept in the field of security which bears similarity to spam filter that examine the content of the exchanged messages. A guard is defined as a high-assurance device ...

Article
Analysis of Time-Dependencies in Automatic Security Classification

Research that explores the use of machine learning for automatic security classification of information objects is about to emerge. In this paper we investigate the opportunity to increase the machine learning performance by taking advantage from time ...

Article
A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System

Internet of things has be broadly applied for home, industry, and many other applications. For these applications, secure information transmission becomes a critical issue to ensure the system safety. Hybrid encryption technique is a new cryptographic ...

Article
Recovery of Evidence and the Judicial Identification of Electronic Data Based on ExFAT

The ExFAT file system is for large capacity flash memory medium. On the base of analyzing the characteristics of ExFAT file system, this paper presents a model of electronic data recovery forensics and judicial Identification based on ExFAT. The ...

Article
A CIM System for Use in the UCWW

This paper describes the design and development of a Consumer Identity Module (CIM) system for use in the emerging ubiquitous consumer wireless world (UCWW). The CIM system includes a smart-card, a client application, and a server application. Inserted ...

Article
Application and Management of Cybersecurity Measures for Protection and Control

This paper describes the work of CIGRE's JWG B5-D2.46 which is published in technical brochure #603. Described in this paper is a summary of the challenges protection and control engineers and technicians face when required to manage cyber security ...

Article
Android Malware Detection Based on Static Analysis of Characteristic Tree

The number of mobile malware is greatly increasing and the malware detection malware has become a critical problem. Android is fast becoming the most popular mobile platform resulting in quick increase in malware targeting the platform. Current static-...

Article
The Multilinear Maps Based Certificateless Aggregate Signcryption Scheme

Aggregate signcryption could verify the multiple messages via a single operation. Most of the identity-based aggregate signcryption are based on random oracle. To exploit the advantage of multilinear maps and erase the key escrow problem, a new Identity-...

Article
Randomized Ring-Partition Fingerprinting with Dithered Lattice Vector Quantization

Image fingerprinting is required to depend on one or several keys to ensure the content security. In this paper, we propose randomized ring-partition fingerprinting with dithered lattice vector quantization which achieves the security of image hashing ...

Article
A "Dynamic Tunnel" Defense Mechanism Based on GTP Protocol

For the user packet data transmission security and privacy issues in xGSN of mobile communication network, we propose a "dynamic tunnel" defense mechanism based on GTP protocol. The method dynamically changes the Tunnel Endpoint Identifier (TEID) used ...

Article
An Application of Horizontal and Vertical Integration in Cyber-Physical Production Systems

It has a need to meet the demands of individual customers and solve the problems in current production caused by changing of the markets and the global influence and general competition situation. Utilization of the progress achieved in the information ...

Article
A Decentralized Load Balancing Architecture for Cache System

Cache technology has emerged as a promising approach for distributed web systems to mitigate the web server's data access performance bottleneck. In this paper, we propose a decentralized load balancing architecture. The cache system takes advantage of ...

Index Terms

  1. Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
        Index terms have been assigned to the content through auto-classification.

        Recommendations