2. SECURWARE 2008:
Cap Esterel,
France
Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France.
IEEE 2008 BibTeX
Frameworks,
Architectures and Protocols I
Frameworks,
Architectures and Protocols II
- H. Rezaei Ghaleh, M. A. Doustari:
A New Approach for Secure and Portable OS.
28-33
Electronic Edition (link) BibTeX
- Thomas Gamer, Christoph P. Mayer, Martina Zitterbart:
Distack -- A Framework for Anomaly-Based Large-Scale Attack Detection.
34-40
Electronic Edition (link) BibTeX
- Jérémy Briffaut, Jean-François Lalande, Waleed W. Smari:
Team--Based MAC Policy over Security--Enhanced Linux.
41-46
Electronic Edition (link) BibTeX
- Shu-Lin Chen, Stanley Chow, Christophe Gustave, Dmitri Vinokurov:
Prototyping a New Identity Authentication Framework for IP Telephony.
47-52
Electronic Edition (link) BibTeX
- Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Gasca, A. J. Varela-Vaca:
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets.
53-61
Electronic Edition (link) BibTeX
Frameworks,
Architectures and Protocols III
System Security
Malware & Security
- Ian Castle, Eimear Buckley:
The Automatic Discovery, Identification and Measurement of Botnets.
127-132
Electronic Edition (link) BibTeX
- Masaru Takesue:
A Protection Scheme against the Attacks Deployed by Hiding the Violation of the Same Origin Policy.
133-138
Electronic Edition (link) BibTeX
- Nikolaos Chatzis, Enric Pujol:
Email Worm Mitigation by Controlling the Name Server Response Rate.
139-145
Electronic Edition (link) BibTeX
- Cheun Ngen Chong, Dan Jiang, Jiagang Zhang, Long Guo:
Anti-counterfeiting with a Random Pattern.
146-153
Electronic Edition (link) BibTeX
- Yuka Ikebe, Takehiro Nakayama, Masaji Katagiri, Satoshi Kawasaki, Hirotake Abe, Takahiro Shinagawa, Kazuhiko Kato:
Efficient Anomaly Detection System for Mobile Handsets.
154-160
Electronic Edition (link) BibTeX
Ecosystem Security and Trust
Cryptography
Information Security I
Information Security II
- Wilson Goudalo, Dominique Seret:
Toward the Engineering of Security of Information Systems (ESIS): UML and the IS Confidentiality.
248-256
Electronic Edition (link) BibTeX
- Cynthia Y. Lester, Frank Jamerson:
Designing an Undergraduate Software Security Course.
257-262
Electronic Edition (link) BibTeX
- Carlos Aguilar Melchor, Benoît Crespin, Philippe Gaborit, Vincent Jolivet, Pierre Rousseau:
High-Speed Private Information Retrieval Computation on GPU.
263-272
Electronic Edition (link) BibTeX
- Kreetta Askola, Rauli Puuperä, Pekka Pietikäinen, Juhani Eronen, Marko Laakso, Kimmo Halunen, Juha Röning:
Vulnerability Dependencies in Antivirus Software.
273-278
Electronic Edition (link) BibTeX
Information Security III
Profiling Data Mining
DEPEND I
DEPEND II
DEPEND III
DEPEND IV
Copyright © Sat May 16 23:37:21 2009
by Michael Ley (ley@uni-trier.de)