Abstract is missing.
- Containing the Cloud: Security Issues in a Large Scale Observational Pharmacovigilance Research ProjectJeffery Painter. 3-9
- Group Proposal to Secure Vehicular Ad-Hoc NetworksJezabel Molina-Gil, Cándido Caballero-Gil, Pino Caballero-Gil. 10-15
- Improving Transaction Success Rate by Detecting and Correcting Access Control MisconfigurationsRavi Mukkamala, Bhavana Tapde. 16-22
- Travelling Information For Intrusion Prevention SystemsMauro Migliardi, Gianluca Stringhini. 23-29
- Traffic Management and Security Based on Priority Queueing and Multicore Firewall ImplementationVladimir S. Zaborovsky, Vladimir Mulukha, Sergey Kouprienko, Oleg Zayats. 30-35
- Security Challenges in Cloud ComputingLevent Ertaul, S. Singhal, Gökay Saldamli. 36-42
- The Application of One-Way Hash Functions in Information Security ProtocolsJonathan Z. Sun. 43-49
- Analyzing Call Initiation Intrusion in Mobile PhonesReyhane Nowrouzi, Seyed Morteza Babamir, Mehdi Dabbaghian, Mohsen Farrokhi, Farzad Azizkhani. 57-62
- Protecting Resource-Constrained Network Devices from Denial-of-Service AttacksHongQian Karen Lu. 63-67
- Outsourcing Your Data Warehouse and Business Intelligence Activities; Is Your Data Safe?Errol Blake, Godwin Fumey-Nassah, Victor A. Clincy. 68-74
- General Context-Aware Role-Based Access Control SystemKang-hak Han, Sanghyun Ryu, Jee-hong Kim, Young Ik Eom. 75-80
- An Analysis of Security Policy Specification TechniquesLuay Wahsheh. 81-86
- Cyber Defense Architecture for Campus IntranetDinesh Kumar Saini, Wail M. Omar, Hemraj Saini. 87-93
- A Phylogenetic Approach to Analyzing IP-Address Artifacts of Cyber-AttacksJack Horner. 94-98
- Governance, Risk and Compliance Equilibrium Model for Optimizing Enterprise Information SecurityArun Nagarle Shivashankarappa, Dharmalingam Ramalingam. 99-103
- A Security Measure Selection Scheme with Consideration of Potential LawsuitsTakumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshimi Teshigawara, Ryoichi Sasaki, Masakatsu Nishigaki. 104-110
- Multipath Authentication without shared Secrets and with Applications in Quantum NetworksStefan Rass, Peter Schartner. 111-115
- Design and Evaluation of an Image-based Authentication System for Small Touch-screensJonathan Citty, Dugald Ralph Hutchings. 116-122
- A Secure Image Watermarking Scheme for Image Copy Control and Copyright Protection Using BiometricsYang Liang, Nandita Bhattacharjee, Xiaodong Meng. 123-129
- A New Approach For Formulating Randomized Cryptographic Key Generation Using Cancelable BiometricsSunil V. K. Gaddam, Manohar Lal. 130-137
- Vulnerabilities and Performance Analysis over Fingerprint Recognition SystemsEdward Guillen, Daniel Padilla, Karina Martinez. 138-145
- Firewall Configuration based on Specifications of Access Policy and Network EnvironmentAnton Titov, Vladimir S. Zaborovsky. 146-151
- Single Sign-on Techniques with PKI-based Authentication for Mobile PhonesRyu Watanabe, Yuto Nakano, Toshiaki Tanaka. 152-156
- A Summary on the Authentication Protocol in WiMAX SecurityShah Ahsanul Haque, A. S. M. Bakibillah, Abdullah Al Helal. 157-159
- Secure Cryptosystem Implementation for Authentication DongleShrikant Vinchurkar. 160-166
- A Low-energy Consuming and Component-based Security Management Architecture for Mobile DevicesMichel Kamel, Karima Boudaoud, Michel Riveill. 167-173
- An Agile Approach for Mobile applications SecurityNabil El-Kadhi, Sofien Beji. 174-180
- Security Issues for Mobile GovernmentLevent Ertaul, Swetha Chelivendri, Gökay Saldamli. 181-187
- A VoIP Security Framework for Mobile DevicesAlessandro Brawerman, Paulo Seleme Correa. 188-196
- Applying Hash Functions in the Latin Square Based Secret Sharing SchemesChi Sing Chum, Xiaowen Zhang. 197-203
- Node Based Interpretative Key Management FrameworkSaman Shojae Chaeikar, Hamidreza Sabet Moghaddam, Hossein Rouhani Zeidanloo. 204-210
- A New Scheme for Hash Function ConstructionChi Sing Chum, Xiaowen Zhang. 211-217
- Design, Evaluation and Implementation Technique for Cryptographically Secure Dynamic S-BoxesMuhammad Nadeem Sial, Muhammed Nauman Qureshi. 218-224
- A Quantum Key Distribution ProtocolParag K. Lala. 225-228
- Password Hardening Using Keystroke DynamicsAnsab Ijaz, Arslan Javed, Saad Chaudhry, Syed Annas Shah. 229-233
- Symmetric Key Cryptography Using Random Key GeneratorAsoke Nath, Saima Ghosh, Meheboob Alam Mallick. 234-242
- Consumer Guide to Online Cybersecurity Resources: UMCEGGeorge Markowsky, Linda Markowsky. 243-247
- An SELinux Sourcebook for Cybersecurity EducatorsLinda Markowsky. 248-254
- A Cradle-to-Grave Approach to Retaining Students in Information Security ProgramsJoshua J. Pauli, Patrick Henry Engebretson. 255-260
- Lessons Learned from an Evolving Information Assurance LabPatrick Henry Engebretson, Joshua J. Pauli, Joshua Bosma. 261-266
- A Re-examination of Network Address Translation SecurityBruce Hartpence, Daryl Johnson. 267-272
- The Potential Pitfalls and Security Risks of IPv6Michael Kozma, Jeffrey Scaparra, Aaron Doty, Matthew Simmons. 273-279
- High School Cyber Defense Competitions: Lessons from the TrenchesRaymond Albert, George Markowsky, JoAnne Wallingford. 280-285
- Security Attacks And Defenses In Sensor NetworksDavid Pearson, Sumita Mishra, Yin Pan. 286-292
- Keyloggers in Cybersecurity EducationChristopher Wood, Rajendra Raj. 293-299
- Cyber Storm: The Culmination of an Undergraduate Course in Cyber SecurityJean Gourd. 300-306
- One Individual s Three Perspectives of the Collegiate Cyber Defense CompetitionJeffrey Scaparra. 307-316
- Toward Sender Anonymity in the Presence of an Active Global AdversaryPeyman Taher, M. H. Samadzadeh. 317-322
- A Frst Step Towards Automated Permission-enforcement Analysis of the Android FrameworkWook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka. 323-329
- Event Capture Approaches for Vulnerability DetectionRaymond Wu, Masayuki Hisada, Atsushi Kara, Takafumi Hayashi. 330-335
- Mapping of the Traffics of IP-Packets on 2-dimensional Plane using Pareto Learning SOMHiroshi Dozono, Takeru Kabashima, Masanori Nakakuni. 336-341
- All About Malwares (Malicious Codes)Hossein Rouhani Zeidanloo, Farzaneh Tabatabaei, Payam Vahdani Amoli, Atefeh Tajpour. 342-348
- Energy Efficient and Secure In-Network Storage for Wireless Sensor NetworksAlireza T. Boloorchi, M. H. Samadzadeh. 349-355
- Laser Printer Source Forensics for Arbitrary Chinese CharactersXiangwei Kong, Xingang You, Bo Wang, Shize Shang, Linjie Shen. 356-360
- A Framework for Smart Trusted Indicators for Browsers (STIB)Jude Desti, Hongmei Chi. 361-367
- Computer Ethics - Review of Global PerspectiveMeysam Namayandeh, Hamed Taherdoost, Neda Jalaliyoon. 368-374
- Behavioral Obfuscation in Malware and its Mitigation via Signature GeneralizationArnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh. 375-385
- Ontological Approach to the Business Continuity Management System DevelopmentAndrzej Bialas. 386-392
- A New Approach to Detecting Malicious Modification to Streaming Data Using Integer StuffingHuijie Cui, Huiping Guo, Chengyu Sun, Behzad Parviz. 393-399
- Toward an Algebraic Framework for Security Policy Enforcement in Concurrent SystemsMahjoub Langar, Mohamed Mejri, Kamel Adi. 400-405
- Internet Voting Protocol Design and ImplementationZhou Fang, Huiping Guo, Behzad Parviz. 406-412
- Zero-day Polymorphic Worms Detection Using A modified Boyer-Moore AlgorithmMohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura, Mohsin Hashim, Izzeldin Amin. 413-418
- Blind Audio Watermarking Based on Neighbouring Energy FeatureXiaodong Meng, Nandita Bhattacharjee. 419-425
- Reversible Data Hiding Using Characteristics of Original ContentsHsiang-Cheh Huang, Wai-Chi Fang. 426-432
- TLS Timings On A Bare PCAli Emdadi, Ramesh K. Karne, Alexander L. Wijesinha. 433-438
- A Statistical Approach for Anomaly-Based Network Intrusion Detection Using Logistic RegressionAbrar Qureshi, Kamel Rekab, Carlos Otero. 439-443
- Modeling NIDS Evasion with Genetic ProgrammingSergio Pastrana, Agustín Orfila, Arturo Ribagorda. 444-448
- Resource Evaluation of Positive and Negative SelectionSuhair Amer, John Hamilton. 449-453
- Learning-based Threshold Estimation Model for Detection of Botnet Malicious ActivitiesDo-Hoon Kim, Hoh Peter In, Hyun-Cheol Jeong. 454-458
- Working Towards a Primary Binary Analysis SystemHyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao. 459-465
- Asset Identification and ValuationAhmad Ghafarian, Jonathan Strahan. 466-470
- Usability and Performance of Firewalls in IPv6 NetworksJaved Parvez, Mushtaq Peer. 471-476
- Multiagent Based Approach for Supporting Situation AssessmentRichard Wasniowski. 477-480
- Detecting Network Faults with FilteringMo Adda, Adamantini Peratikou, Djazia Ghefir. 481-486
- An Approach to Secure E-Visit SystemsKevin Daimi, Jinnan Song. 487-494
- A Java Implementation of the Elliptic Curve Integrated Encryption SchemeVictor Gayoso Martinez, Luis Hernández Encinas, Carmen Sanchez-Avila. 495-504
- An Interdisciplinary Minor in Computer and Network SecurityKevin Daimi, Nizar Al-Holou, Utayba Mohammed. 505-510
- Designing a Course on Jini-Based Vehicle Network SecurityRami Baroody, Nizar Al-Holou. 511-515
- Development of Capstone Projects on Secure Communications for Engineering StudentsVictor Gayoso Martinez, Ascensión Hernández Encinas, Luis Hernández Encinas, Araceli Queiruga Dios, Isabel Visus Ruiz. 516-522
- Mission Assurance Issues with the Federal Aviation Administration's Policy to Implement GPS Navigational SystemWilliam Sitzabee, Michael Stepaniak, Peter Feng. 523-528
- Enabling Performance of Mission-Oriented Networks Through Quality of Service MethodsVinod Naga, John Colombi, Michael R. Grimaila, Kenneth M. Hopkinson. 529-535
- Achieving Situational Awareness in Extreme EventsTay Johannes, Michael R. Grimaila. 536-541
- Towards Predictive Mission Risk Analysis to Operationalize Mission Assured NetworkingDavid Sorrels, Michael R. Grimaila. 542-547
- SCADA Trust Management SystemJose Fadul, Kenneth M. Hopkinson, James Moore, Todd R. Andel, Stuart H. Kurkowski. 548-554
- Engineering Mission Assurance for the Cyber Security of Supervisory Control and Data Aquisition (SCADA) SystemsJuan Lopez Jr., Eddie Mendezllovet, Jeffrey Humphries. 555-564
- Digital Image Steganography Using Matrix AdditionGevorg Margarov, Vahan Markarov. 565-571
- Quasigroup Equipped Strong Public Key Cryptosystem based on Boolean Product of MatricesYeghisabet Alaverdyan, Gevorg Margarov. 572-576
- A New Approach for Fingerprint Minutia Extraction AlgorithmMaha Tolba, Tigran Andreasyan, Vahan Markarov. 577-583
- Reconfigurable Steganographic System for Secure and Long-term Data StorageAshot Khachaturov, Vahan Markarov. 584-588
- Detection of Distributed Attacks Based on Hybrid Neural NetworksVahan Markarov, Armen Ghazaryan. 589-593
- eLearning Model for Information Security EducationArmen Abrahamyan, Donara Gabrielyan. 594-598
- On Information Security Knowledge AssessmentArtur Mkrtchyan, Donara Gabrielyan. 599-603
- Object Recognition on the Securing AreaRobert Hakobyan, Hovhannes Hovsepyan. 604-610
- The 2010 IDN Homograph Attack Mitigation SurveyPeter Hannay, Christopher Bolan. 611-614
- Developing VoIP Router HoneypotsCraig Valli, Mohammed Al Lawati. 615-619
- Using Traffic Analysis to Identify Tor Usage - A Proposed StudyJohn Barker, Peter Hannay, Christopher Bolan. 620-623
- Forensic Data Reocvery on the 8GB Fifth Generation iPod NanoDavid Cooper, Damon Pollard, Christopher Bolan. 624-626
- Geotagging Where Cyberspace Comes to Your PlaceCraig Valli, Peter Hannay. 627-632
- Breaches in Medical Information Security: The Problem of ReportingNeha Patel, Patricia Williams. 633-636
- An Information Security Governance Encounter for Australian Primary Care Health ProvidersDonald McDermid, Rachel J. Mahncke, Patricia A. H. Williams. 637-643
- Medical Information Security: Is it all too hard?Patricia A. H. Williams. 644-650
- Mission Assurance: Issues and ChallengesMichael R. Grimaila, Robert F. Mills, Michael Haas, Douglas J. Kelly. 651-657
- Combining Smart Card Services with a Secure Memory TokenAsad M. Ali, Mehdi Asnaashari, Karen Lu. 658-664
- A Trust Borkerage Framework for Cloud ComputingRajib Joshi-Acharya, Ju An Wang. 665-671
- The Need for Interdisciplinary Programs for Cyber Security of Industrial Control SystemsJoseph Weiss. 672-677
- CAPTCHA Based E-mail Hacking PreventionAditya Patel, Amanpreet Singh Arora, Radhika Medury, Anisha Pabbi, Nitin. 678-682
- Hiding Data in Images Using Pixel Mapping Method (PMM)Souvik Bhattacharyya, Goutam Sanyal. 683-689
- Design and implementation of a Secure Text Based Steganography ModelSouvik Bhattacharyya, Indradip Banerjee, Goutam Sanyal. 690-696
- Performance Analysis of Intrusion Detection System at Training Time Using AdaBoost AlgorithmVivek Patole, V. K. Pachghare, Parag Kulkarni. 697-702
- A Review of Approaching Customer Online Banking Authentication Against Cyber AttacksNattakant Utakrit. 703-708
- Investigating Forensic Software Solutions to Acquire Information from Mobile DeviceChialin Chen, Elijah Mike, Fan Wu. 709-713
- Extension of Diffie-Hellman s Secure Key Distribution Technique to Multipoint BroadcastingEltayeb Abuelyaman, Atikan Teber, Khaled Al Mustafa. 714-720
- Development Document Framework of IT Security Products for CCJong-Hyuk Kim, Jae-Chel Ryou, Hee Bong Choi, Keon-Woo Kang. 721