


default search action
CyberSecurity 2012: Alexandria, VA, USA
- 2012 ASE International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012. IEEE Computer Society 2012, ISBN 978-1-4799-0219-4

- Chung-Wei Lin, Alberto L. Sangiovanni-Vincentelli

:
Cyber-Security for the Controller Area Network (CAN) Communication Protocol. 1-7 - Todd Baumeister, Yingfei Dong, Zhenhai Duan, Guanyu Tian:

A Routing Table Insertion (RTI) Attack on Freenet. 8-15 - Hanchen Song, Chris Muelder, Kwan-Liu Ma:

Crucial Nodes Centric Visual Monitoring and Analysis of Computer Networks. 16-23 - Satyajeet Nimgaonkar, Srujan D. Kotikela

, Mahadevan Gomathisankaran:
CTrust: A Framework for Secure and Trustworthy Application Execution in Cloud Computing. 24-31 - Fernando Sanchez, Zhenhai Duan:

A Sender-Centric Approach to Detecting Phishing Emails. 32-39 - Ahmed Aleroud, George Karabatis:

A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks. 40-45 - Nazari Skrupsky, Maliheh Monshizadeh, Prithvi Bisht, Timothy L. Hinrichs, V. N. Venkatakrishnan, Lenore D. Zuck:

WAVES: Automatic Synthesis of Client-Side Validation Code for Web Applications. 46-53 - Johannes de Vries, Hans Hoogstraaten, Jan van den Berg, Semir Daskapan:

Systems for Detecting Advanced Persistent Threats: A Development Roadmap Using Intelligent Data Analysis. 54-61 - Woohyun Shim, Luca Allodi

, Fabio Massacci
:
Crime Pays If You Are Just an Average Hacker. 62-68 - Paul Giura, Wei Wang:

A Context-Based Detection Framework for Advanced Persistent Threats. 69-74 - Shams Zawoad, Ragib Hasan

:
I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics. 75-82 - Jun Dai

, Xiaoyan Sun, Peng Liu, Nicklaus A. Giacobe:
Gaining Big Picture Awareness through an Interconnected Cross-Layer Situation Knowledge Reference Model. 83-92 - Denise Ferebee, Dipankar Dasgupta, Qishi Wu:

A Cyber-Security Storm MAP. 93-102 - Olga Kulikova, Ronald Heil, Jan van den Berg, Wolter Pieters:

Cyber Crisis Management: A Decision-Support Framework for Disclosing Security Incident Information. 103-112 - Pallavi Patil, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:

Fault Tree Analysis of Accidental Insider Security Events. 113-118 - Simon Reay Atkinson, David Walker, Kevin Beaulne, Liaquat Hossain:

Cyber - Transparencies, Assurance and Deterrence. 119-126 - Sharif Hassan, Ratan Guha:

Security and Integrity Analysis Using Indicators. 127-135 - Andre Abadie, Duminda Wijesekera:

Leveraging an Inventory of the Cognitive Radio Attack Surface. 136-143 - Marlies Rybnicek, Rainer Poisel, Manfred Ruzicka, Simon Tjoa

:
A Generic Approach to Critical Infrastructure Modeling and Simulation. 144-151 - Anass Bayaga, Stephen Flowerday

:
Principal Causes of Information Communication Technology (ICT) Risk Failure in an SME. 152-156 - Tanja Zseby:

Is IPv6 Ready for the Smart Grid? 157-164 - Kazuya Kishimoto, Kenji Ohira

, Yukiko Yamaguchi, Hirofumi Yamaki, Hiroki Takakura:
An Adaptive Honeypot System to Capture IPv6 Address Scans. 165-172 - Wade Gasior, Li Yang:

Exploring Covert Channel in Android Platform. 173-177 - Munene W. Kanampiu, Justin Zhan:

A Dynamic Covert Passive Actors Detection Scheme for a Healthy Networked Community. 178-186 - Robert F. Erbacher, Steve E. Hutchinson:

Extending Case-Based Reasoning to Network Alert Reporting. 187-194 - Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim

, Madjid Merabti, David J. Lamb:
A Compose Language-Based Framework for Secure Service Composition. 195-202 - Shlomi Dolev

, Niv Gilboa
, Marina Kopeetsky:
Permanent Revocation in Attribute Based Broadcast Encryption. 203-208 - Alex Doyal, Justin Zhan, Huiming Anna Yu:

Towards Defeating DDoS Attacks. 209-212

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














