Stop the war!
Остановите войну!
for scientists:
default search action
10th CRiSIS 2015: Mytilene, Lesbos Island, Greece
- Costas Lambrinoudakis, Alban Gabillon:
Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9572, Springer 2016, ISBN 978-3-319-31810-3
Trust and Privacy Issues
- Michalis Pavlidis, Haralambos Mouratidis, Cesar Gonzalez-Perez, Christos Kalloniatis:
Addressing Privacy and Trust Issues in Cultural Heritage Modelling. 3-16 - Maherzia Belaazi, Hanene Boussi Rahmouni, Adel Bouhoula:
An Ontology Regulating Privacy Oriented Access Controls. 17-35 - Dalal Al-Azizy, David E. Millard, Iraklis Symeonidis, Kieron O'Hara, Nigel Shadbolt:
A Literature Survey and Classifications on Data Deanonymisation. 36-51
Privacy Policies and Policy Based Protocols
- Oluwa Lawani, Esma Aïmeur, Kimiz Dalkir:
Improving Users' Trust Through Friendly Privacy Policies: An Empirical Study. 55-70 - Abdulrahman Al-Mutairi, Stephen D. Wolthusen:
MPLS Policy Target Recognition Network. 71-87
Risk Management
- Tarek Bouyahia, Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens:
Context Aware Intrusion Response Based on Argumentation Logic. 91-106 - Elena Doynikova, Igor V. Kotenko:
Countermeasure Selection Based on the Attack and Service Dependency Graphs for Security Incident Management. 107-124
Risk Analysis and Vulnerability Assessment
- Gaute Wangen, Andrii Shalaginov:
Quantitative Risk, Statistical Methods and the Four Quadrants for Information Security. 127-143 - Oliver J. Farnan, Jason R. C. Nurse:
Exploring a Controls-Based Assessment of Infrastructure Vulnerability. 144-159 - Salma Dammak, Faiza Ghozzi Jedidi, Faïez Gargouri:
Quantifying Security in Web ETL Processes. 160-173
Cloud Systems and Cryptography
- Stavros Simou, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis:
A Meta-model for Assisting a Cloud Forensics Process. 177-187 - Kazumasa Omote, Tran Phuong Thao:
POR-2P: Network Coding-Based POR for Data Provision-Payment System. 188-206 - Jiageng Chen, Rashed Mazumder, Atsuko Miyaji:
A Single Key Scheduling Based Compression Function. 207-222
Attacks and Security Measures
- Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
Security Issue of WirelessHART Based SCADA Systems. 225-241 - Gustavo Gonzalez Granadillo, Grégoire Jacob, Hervé Debar:
Attack Volume Model: Geometrical Approach and Application. 242-257 - Nikolaos Tsalis, Alexios Mylonas, Dimitris Gritzalis:
An Intensive Analysis of Security and Privacy Browser Add-Ons. 258-273 - Xin Meng, George Spanoudakis:
MBotCS: A Mobile Botnet Detection System Based on Machine Learning. 274-291 - Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
Toward Securing MANET Against the Energy Depletion Attack. 292-306
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.