researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2007
2008
2009
2010
Filter by Tag
[+]
OR
AND
NOT
1
Meta-Environment
access control
analysis
architecture
classification
data-flow
deployment
design
e-science
information models
meta-model
meta-objects
mobile
modeling
protocol
role-based access control
rule-based
security
social
systematic-approach
Filter by Author
[+]
OR
AND
NOT
1
A. J. Varela-Vaca
Adel Bouhoula
Ajaz Hussain Mir
Alireza Shahrestani
Amr M. Youssef
Anders Moen Hagalisletto
Andrea Spadaccini
Christian Toinard
Cynthia Y. Lester
Jean-François Lalande
Jean-Marc Seigneur
Juha Röning
Jérémy Briffaut
Masaru Takesue
Rainer Falk
Slobodan Bojanic
Stéphane Ubéda
Sureswaran Ramadass
Vicente Hernández
Wolfgang Boehmer
Filter by Top terms
[+]
OR
AND
NOT
1
access
ad
analysis
approach
architecture
attacks
authentication
control
detection
dynamic
evaluation
hoc
identity
information
management
networks
secure
security
system
systems
SECURWARE (securware)
Editions
Publications
Viewing Publication 1 - 100 from 200
2010
An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation
Ali Ahmed 0001
,
Ning Zhang
.
securware 2010
:
251-260
[doi]
Prospect of Fine Grain Dynamic Memory Access Control with Profiling
Dongkyun Ahn
,
Gyungho Lee
.
securware 2010
:
69-74
[doi]
Performance Evaluation of SNR Estimation Methods in Forensic Speaker Recognition
Francesco Beritelli
,
Salvatore Casale
,
Rosario Grasso
,
Andrea Spadaccini
.
securware 2010
:
88-92
[doi]
A Statistical Approach to Biometric Identity Verification Based on Heart Sounds
Francesco Beritelli
,
Andrea Spadaccini
.
securware 2010
:
93-96
[doi]
Protecting Next Generation High Speed Network Protocol - UDT through Generic Security Service Application Program Interface - GSS-API
Danilo Valeros Bernardo
,
Doan Hoang
.
securware 2010
:
266-272
[doi]
Protection of a Shared HPC Cluster
Mathieu Blanc
,
Jérémy Briffaut
,
Thibault Coullet
,
Maxime Fonda
,
Christian Toinard
.
securware 2010
:
273-279
[doi]
Analysis of Strongly and Weakly Coupled Management Systems in Information Security
Wolfgang Boehmer
.
securware 2010
:
109-116
[doi]
Patch Scheduling for Risk Exposure Mitigation under Service Disruption Constraints
Praveen Bommannavar
,
Nicholas Bambos
.
securware 2010
:
176-181
[doi]
An Analysis of the Asprox Botnet
Ravishankar Borgaonkar
.
securware 2010
:
148-153
[doi]
RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases
Ahlem Bouchahda
,
Nhan Le Thanh
,
Adel Bouhoula
,
Faten Labbene
.
securware 2010
:
135-140
[doi]
SOA-Based Security Governance Middleware
Pierre de Leusse
,
Theo Dimitrakos
.
securware 2010
:
57-62
[doi]
Forthcoming Aggregating Intrusion Detection System Alerts Framework
Homam El-Taj
,
Omar Abouabdalla
,
Ahmed M. Manasrah
,
Ahmed Al-Madi
,
Muhammad Imran Sarwar
,
Sureswaran Ramadass
.
securware 2010
:
40-44
[doi]
Heuristic Search in Encrypted Graphs
Pierluigi Failla
.
securware 2010
:
82-87
[doi]
Industrial Sensor Network Security Architecture
Rainer Falk
,
Hans-Joachim Hof
.
securware 2010
:
97-102
[doi]
Identity Management without Revocation
Anders Fongen
.
securware 2010
:
75-81
[doi]
Biometric Transaction Authentication Protocol
Daniel Hartung
,
Christoph Busch
.
securware 2010
:
207-215
[doi]
Towards Sybil Resistant Authentication in Mobile Ad Hoc Networks
Sarosh Hashmi
,
John Brooke
.
securware 2010
:
17-24
[doi]
Detection Methods Improving Reliability of Automatic Human Tracking System
Hiroto Kakiuchi
,
Takao Kawamura
,
Toshihiko Sasama
,
Kazunori Sugahara
.
securware 2010
:
240-246
[doi]
Applications of SAT Solvers to AES Key Recovery from Decayed Key Schedule Images
Abdel Alim Kamal
,
Amr M. Youssef
.
securware 2010
:
216-220
[doi]
Blind Detectors in Spread Spectrum Watermarking for Interference Reduction
Cagatay Karabat
,
Mehmet Keskinoz
.
securware 2010
:
103-108
[doi]
Security Analysis of Firewall Rule Sets in Computer Networks
Bilal Khan
,
Muhammad Khurram Khan
,
Maqsood Mahmud
,
Khaled Alghathbar
.
securware 2010
:
51-56
[doi]
Shifting the Paradigm: Training Undergraduate Students in Software Security
Cynthia Y. Lester
.
securware 2010
:
117-122
[doi]
A Security Adaptation Reference Monitor (SARM) for Highly Dynamic Wireless Environments
Tewfiq El Maliki
,
Jean-Marc Seigneur
.
securware 2010
:
63-68
[doi]
Towards a Structural Secure Design Process
S. Hasan Mirjalili
,
Arjen K. Lenstra
.
securware 2010
:
280-286
[doi]
Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat
Thomas Ormerod
,
Lingyu Wang
,
Mourad Debbabi
,
Amr M. Youssef
,
Hamad Binsalleeh
,
Amine Boukhtouta
,
Prosenjit Sinha
.
securware 2010
:
195-200
[doi]
A Security Control Architecture for SOAP-Based Services
Boulares Ouchenne
,
Ousmane Koné
.
securware 2010
:
261-265
[doi]
Universal Bluetooth Access Control and Security System for e-Keys Enviroments
Francisco José Bellido Outeiriño
,
Pedro Canales Aranda
,
José Luis de la Cruz Fernández
,
Benito Pérez Jarauta
.
securware 2010
:
247-250
[doi]
BlogCrypt: Private Content Publishing on the Web
Tamás Paulik
,
Ádám Máté Földes
,
Gábor György Gulyás
.
securware 2010
:
123-128
[doi]
A Shuffling Scheme with Strict and Strong Security
Kun Peng
,
Feng Bao
.
securware 2010
:
201-206
[doi]
Exploiting the x86 Architecture to Derive Virtual Machine State Information
Jonas Pfoh
,
Christian Schneider
,
Claudia Eckert
.
securware 2010
:
166-175
[doi]
Socio-technical Security Assessment of a VoIP System
Pekka Pietikäinen
,
Kati Karjalainen
,
Juha Röning
,
Juhani Eronen
.
securware 2010
:
141-147
[doi]
A Study of a Social Behavior inside the Online Black Markets
Jaziar Radianti
.
securware 2010
:
189-194
[doi]
Eliciting Information on the Vulnerability Black Market from Interviews
Jaziar Radianti
.
securware 2010
:
154-159
[doi]
Vulnerabilities and Improvements of Du-Xiao-Chen-Wu's Secure Cell Relay Routing Protocol for Sensor Networks
Keunwoo Rhee
,
Byunghee Lee
,
Dongho Won
,
Hac Yun Na
,
Seungjoo Kim
.
securware 2010
:
1-4
[doi]
An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OS
Jonathan Rouzaud-Cornabas
,
Patrice Clemente
,
Christian Toinard
.
securware 2010
:
11-16
[doi]
Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010
Reijo Savola
,
Masaru Takesue
,
Rainer Falk
,
Manuela Popescu
, editors,
IEEE Computer Society,
2010.
[doi]
Security-Measurability-Enhancing Mechanisms for a Distributed Adaptive Security Monitoring System
Reijo M. Savola
,
Petri Heinonen
.
securware 2010
:
25-34
[doi]
Strategies for Managed Software Integrity Protection
Manfred Schäfer
,
Wolf-Dietrich Moeller
.
securware 2010
:
45-50
[doi]
Discovery of Invariant Bot Behavior through Visual Network Monitoring System
Alireza Shahrestani
,
Maryam Feily
,
Rodina Ahmad
,
Sureswaran Ramadass
.
securware 2010
:
182-188
[doi]
An Efficient Vein Pattern-Based Recognition System
Mohit Soni
,
Sandesh Gupta
,
M. S. Rao
,
Phalguni Gupta
.
securware 2010
:
234-239
[doi]
Analyzing the DPA Leakage of the Masked S-box via Digital Simulation and Reducing the Leakage by Inserting Delay Cells
Sedat Soydan
.
securware 2010
:
221-227
[doi]
Cascaded Simple Filters for Accurate and Lightweight Email-Spam Detection
Masaru Takesue
.
securware 2010
:
160-165
[doi]
Improving the Efficiency of a Highly-Used Access Control Scheme
Jin Tamura
.
securware 2010
:
35-39
[doi]
Protecting Kernel Data through Virtualization Technology
Donghai Tian
,
Deguang Kong
,
Changzhen Hu
,
Peng Liu 0005
.
securware 2010
:
5-10
[doi]
Verifying Hotspot Quality User Rating with Certified QoS Evidence
Xavier Titi
,
Jean-Marc Seigneur
.
securware 2010
:
129-134
[doi]
An Efficient Acceleration of Symmetric Key Cryptography Using General Purpose Graphics Processing Unit
Fan Wu
,
Chung-Han Chen
,
Hira N. Narang
.
securware 2010
:
228-233
[doi]
2009
Replay Attack of Dynamic Rights within an Authorised Domain
Imad M. Abbadi
,
Muntaha Alawneh
.
securware 2009
:
148-154
[doi]
Suspicion-Driven Formal Analysis of Security Requirements
Nuno Amálio
.
securware 2009
:
217-223
[doi]
Runtime Protection via Dataflow Flattening
Bertrand Anckaert
,
Mariusz H. Jakubowski
,
Ramarathnam Venkatesan
,
Chit Wei Saw
.
securware 2009
:
242-248
[doi]
Security in Ad Hoc Networks: From Vulnerability to Risk Management
Marianne Azer
,
Sherif El-Kassas
,
Magdy M. S. El-Soudani
.
securware 2009
:
203-209
[doi]
Detecting Man-in-the-Middle Attacks by Precise Timing
Benjamin Aziz
,
Geoff W. Hamilton
.
securware 2009
:
81-86
[doi]
Quantification of the Effect of Security on Performance in Wireless LANs
Gh. Rasool Begh
,
Ajaz Hussain Mir
.
securware 2009
:
57-62
[doi]
Secrecy for Bounded Security Protocols without Freshness Check
Catalin V. Birjoveanu
.
securware 2009
:
37-41
[doi]
Survivability and Business Continuity Management System According to BS 25999
Wolfgang Boehmer
.
securware 2009
:
142-147
[doi]
Generation of Role Based Access Control Security Policies for Java Collaborative Applications
Jérémy Briffaut
,
X. Kauffmann-Tourkestansky
,
Jean-François Lalande
,
Waleed W. Smari
.
securware 2009
:
224-229
[doi]
Enforcement of Security Properties for Dynamic MAC Policies
Jérémy Briffaut
,
Jean-François Lalande
,
Christian Toinard
,
Mathieu Blanc
.
securware 2009
:
114-120
[doi]
Correlation Based Node Behavior Profiling for Enterprise Network Security
Su Chang
,
Thomas E. Daniels
.
securware 2009
:
298-305
[doi]
Integration of a Security Product in Service-Oriented Architecture
Aleksander Dikanski
,
Christian Emig
,
Sebastian Abeck
.
securware 2009
:
1-7
[doi]
The Pushdown Attack on AES
Mohamed Abo El-Fotouh
,
Klaus Diepold
.
securware 2009
:
280-285
[doi]
The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece
Rainer Falk
,
Wilson Goudalo
,
Eric Y. Chen
,
Reijo Savola
,
Manuela Popescu
, editors,
IEEE Computer Society,
2009.
Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks
Rainer Falk
,
Hans-Joachim Hof
.
securware 2009
:
191-196
[doi]
Simulating a Multi-domain RFID System for Replacement Part Tracking
Rainer Falk
,
Andreas Koepf
,
Hermann Seuschek
,
Ming-Yuh Huang
,
Mingyan Li
.
securware 2009
:
197-202
[doi]
A Survey of Botnet and Botnet Detection
Maryam Feily
,
Alireza Shahrestani
,
Sureswaran Ramadass
.
securware 2009
:
268-273
[doi]
Towards Proactive Policies Supporting Event-Based Task Delegation
Khaled Gaaloul
,
Philip Miseldine
,
François Charoy
.
securware 2009
:
99-104
[doi]
A New Approach to Protect the OS from Off-line Attacks Using the Smart Card
Hossein Rezaei Ghaleh
,
Shahin Norouzi
.
securware 2009
:
185-190
[doi]
The Process of Engineering of Security of Information Systems (ESIS): The Formalism of Business Processes
Wilson Goudalo
,
Dominique Seret
.
securware 2009
:
105-113
[doi]
A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-repudiation Proofs
Rüdiger Grimm
.
securware 2009
:
49-56
[doi]
Analysis of a Password Strengthening Technique and Its Practical Use
Bogdan Groza
.
securware 2009
:
292-297
[doi]
Modeling Role-Based Privacy in Social Networking Services
Gabor Gyorgy Gulyas
,
Róbert Schulcz
,
Sándor Imre
.
securware 2009
:
173-178
[doi]
Security Framework for DPWS Compliant Devices
Vicente Hernández
,
Lourdes López
,
Oscar Prieto
,
Jose F. Martinez
,
Ana B. Garcia
,
Antonio da Silva
.
securware 2009
:
87-92
[doi]
A Two-Step Execution Mechanism for Thin Secure Hypervisors
Manabu Hirano
,
Takahiro Shinagawa
,
Hideki Eiraku
,
Shoichi Hasegawa
,
Kazumasa Omote
,
Kouichi Tanimoto
,
Takashi Horie
,
Seiji Mune
,
Kazuhiko Kato
,
Takeshi Okuda
,
Eiji Kawai
,
Suguru Yamaguchi
.
securware 2009
:
129-135
[doi]
Security Management with Virtual Gateway Platforms
Mario Ibáñez
,
Natividad Martínez Madrid
,
Ralf Seepold
.
securware 2009
:
70-75
[doi]
Fingerprint Texture Feature for Discrimination and Personal Verification
Zahoor Ahmad Jhat
,
Ajaz Hussain Mir
,
Simeen Rubab
.
securware 2009
:
230-236
[doi]
On the Tradeoff between MAC-Layer and Network-Layer Topology-Controlled Malware Spreading Schemes in Ad Hoc and Sensor Networks
Vasileios Karyotis
,
Anastasios Kakalis
,
Symeon Papavassiliou
.
securware 2009
:
255-261
[doi]
Extending Role-Based Access Control for Business Usage
Heiko Klarl
,
Korbinian Molitorisz
,
Christian Emig
,
Karsten Klinger
,
Sebastian Abeck
.
securware 2009
:
136-141
[doi]
Secure Routing Approach for Unstructured P2P Systems
Stefan Kraxberger
,
Udo Payer
.
securware 2009
:
210-216
[doi]
Criteria for Evaluating the Privacy Protection Level of Identity Management Services
Hyangjin Lee
,
InKyoung Jeun
,
Hyuncheol Jung
.
securware 2009
:
155-160
[doi]
Incorporating Software Security into an Undergraduate Software Engineering Course
Cynthia Y. Lester
,
Frank Jamerson
.
securware 2009
:
161-166
[doi]
Detection of Security and Dependability Threats: A Belief Based Reasoning Approach
Davide Lorenzoli
,
George Spanoudakis
.
securware 2009
:
312-320
[doi]
Secure Distributed Multiplication of Two Polynomially Shared Values: Enhancing the Efficiency of the Protocol
Peter Lory
.
securware 2009
:
286-291
[doi]
Comparison of Static Code Analysis Tools
Matti Mantere
,
Ilkka Uusitalo
,
Juha Röning
.
securware 2009
:
15-22
[doi]
Distributed Intrusion Detection: Simulation and Evaluation of Two Methodologies
Mauro Migliardi
,
Valentina Resaz
.
securware 2009
:
42-48
[doi]
Multi-level Authentication Scheme Utilizing Smart Cards and Biometrics
Mucahit Mutlugun
,
Ibrahim Sogukpinar
.
securware 2009
:
93-98
[doi]
Social Networks Security
Jan Nagy
,
Peter Pecho
.
securware 2009
:
321-325
[doi]
Forward Secure ID-Based Group Key Agreement Protocol with Anonymity
Hyewon Park
,
Zeen Kim
,
Kwangjo Kim
.
securware 2009
:
274-279
[doi]
List of Criteria for a Secure Computer Architecture
Igor Podebrad
,
Klaus Hildebrandt
,
Bernd Klauer
.
securware 2009
:
76-80
[doi]
Using Object-Oriented Concepts to Develop a High-Level Information Privacy Risk Management Model
Kamil Reddy
,
Hein S. Venter
.
securware 2009
:
23-30
[doi]
AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems
Alireza Sadighian
,
Rasool Jalili
.
securware 2009
:
31-36
[doi]
Identification of Basic Measurable Security Components for a Distributed Messaging System
Reijo Savola
,
Habtamu Abie
.
securware 2009
:
121-128
[doi]
True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots
Christian Seifert
,
Peter Komisarczuk
,
Ian Welch
.
securware 2009
:
63-69
[doi]
A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing
Peipei Shi
,
Bo Zhu
,
Amr M. Youssef
.
securware 2009
:
237-241
[doi]
A Threat Analysis Methodology for Security Evaluation and Enhancement Planning
Antonietta Stango
,
Neeli R. Prasad
,
Dimitris M. Kyriazanos
.
securware 2009
:
262-267
[doi]
Personalized Filtering of Polymorphic E-mail Spam
Masaru Takesue
.
securware 2009
:
249-254
[doi]
Phishing and Countermeasures in Spanish Online Banking
Ilkka Uusitalo
,
Josep M. Catot
,
Ramon Loureiro
.
securware 2009
:
167-172
[doi]
Self Protection through Collaboration Using D-CAF: A Distributed Context-Aware Firewall
Cristian Varas
,
Thomas Hirsch
.
securware 2009
:
179-184
[doi]
A Credit-Based Incentive Mechanism for Recommendation Acquisition in Multihop Mobile Ad Hoc Networks
Wei Zhou
,
Zhiqiang Wei
,
Mijun Kang
,
Paddy Nixon
,
Lang Jia
.
securware 2009
:
306-311
[doi]
A Security Pattern for Untraceable Secret Handshakes
Ángel Cuevas
,
Paul El Khoury
,
Laurent Gomez
,
Annett Laube
,
Alessandro Sorniotti
.
securware 2009
:
8-14
[doi]
2008
Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France
IEEE,
2008.
Scalable Detection of SIP Fuzzing Attacks
Eric Y. Chen
,
Mitsutaka Itoh
.
securware 2008
:
114-119
[doi]
Public Key Cryptography: A Dynamical Systems Perspective
Roland Schmitz
.
securware 2008
:
209-212
[doi]
Sign in
or
sign up
to see more results.