No abstract available.
Cover Art
[Front cover]
Preface
Program Committee
Reviewers
Keynotes
A Chaos-Based Hash Function
The paper proposes a cubic chaotic mapping. Its bifurcation graph and Lyapunov exponent show that the mapping owns excellent chaotic properties. A chaos-based hash function is then constructed. Compared to a chaotic hash function based on Logistic ...
A Novel Implementation of a Hash Function Based on XML DOM Parser
This paper solves the problem of the excessive memory footprint and the slow speed of parsing when using the DOM method to parse the XML data. As we know the current XML parsing technology is the key of XML research field and now there are a lot of XML ...
Kernel Malware Core Implementation: A Survey
Kernel Malware resides and performs malicious functions in the operating system kernel space. It is more difficult to be detected and cleared than the malwares implemented in the user space because of its higher authority. It also has better flexibility ...
Simulation of the Users' Email Behavior Based on BP-BDI Model
With the development of the Internet, email has become a part of our life to communicate with each other. While bringing convenience for users, it also threats the users' network security. For example, if the user clicks on a malicious URL link in the ...
A Hierarchical Framework of Security Situation Assessment for Information System
Security situation assessment is an effective way to analyze the situation of an information system, which helps administrator understand the current system risk status and make policy to response in time. However, the existing researches for security ...
XSS Vulnerability Detection Using Optimized Attack Vector Repertory
In order to detect the Cross-Site Script (XSS)vulnerabilities in the web applications, this paper proposes a method of XSS vulnerability detection using optimal attack vector repertory. This method generates an attack vector repertory automatically, ...
A 4-Dimensional Discrete Chaotic System and Application in Image Encryption with Avalanche Effects
This paper introduces a 4-dimensional chaotic map, consisting of sine, and cosine functions. Using this map and a generalized synchronization (GCS) theorem designs an 8-dimensional GCS system. The GCS system is used to design a chaotic pseudorandom ...
Advanced Classification Lists (Dirty Word Lists) for Automatic Security Classification
With the increasing risk of data leakage, information guards have emerged as a novel concept in the field of security which bears similarity to spam filter that examine the content of the exchanged messages. A guard is defined as a high-assurance device ...
Analysis of Time-Dependencies in Automatic Security Classification
Research that explores the use of machine learning for automatic security classification of information objects is about to emerge. In this paper we investigate the opportunity to increase the machine learning performance by taking advantage from time ...
A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System
Internet of things has be broadly applied for home, industry, and many other applications. For these applications, secure information transmission becomes a critical issue to ensure the system safety. Hybrid encryption technique is a new cryptographic ...
Recovery of Evidence and the Judicial Identification of Electronic Data Based on ExFAT
The ExFAT file system is for large capacity flash memory medium. On the base of analyzing the characteristics of ExFAT file system, this paper presents a model of electronic data recovery forensics and judicial Identification based on ExFAT. The ...
A CIM System for Use in the UCWW
This paper describes the design and development of a Consumer Identity Module (CIM) system for use in the emerging ubiquitous consumer wireless world (UCWW). The CIM system includes a smart-card, a client application, and a server application. Inserted ...
Application and Management of Cybersecurity Measures for Protection and Control
This paper describes the work of CIGRE's JWG B5-D2.46 which is published in technical brochure #603. Described in this paper is a summary of the challenges protection and control engineers and technicians face when required to manage cyber security ...
Android Malware Detection Based on Static Analysis of Characteristic Tree
The number of mobile malware is greatly increasing and the malware detection malware has become a critical problem. Android is fast becoming the most popular mobile platform resulting in quick increase in malware targeting the platform. Current static-...
The Multilinear Maps Based Certificateless Aggregate Signcryption Scheme
Aggregate signcryption could verify the multiple messages via a single operation. Most of the identity-based aggregate signcryption are based on random oracle. To exploit the advantage of multilinear maps and erase the key escrow problem, a new Identity-...
Randomized Ring-Partition Fingerprinting with Dithered Lattice Vector Quantization
Image fingerprinting is required to depend on one or several keys to ensure the content security. In this paper, we propose randomized ring-partition fingerprinting with dithered lattice vector quantization which achieves the security of image hashing ...
A "Dynamic Tunnel" Defense Mechanism Based on GTP Protocol
For the user packet data transmission security and privacy issues in xGSN of mobile communication network, we propose a "dynamic tunnel" defense mechanism based on GTP protocol. The method dynamically changes the Tunnel Endpoint Identifier (TEID) used ...
An Application of Horizontal and Vertical Integration in Cyber-Physical Production Systems
It has a need to meet the demands of individual customers and solve the problems in current production caused by changing of the markets and the global influence and general competition situation. Utilization of the progress achieved in the information ...
A Decentralized Load Balancing Architecture for Cache System
Cache technology has emerged as a promising approach for distributed web systems to mitigate the web server's data access performance bottleneck. In this paper, we propose a decentralized load balancing architecture. The cache system takes advantage of ...
Index Terms
- Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery