default search action
Security and Management 2010: Las Vegas, Nevada, USA
- Hamid R. Arabnia, Kevin Daimi, Michael R. Grimaila, George Markowsky, Selim Aissi, Victor A. Clincy, Leonidas Deligiannidis, Donara Gabrielyan, Gevorg Margarov, Ashu M. G. Solo, Craig Valli, Patricia A. H. Williams:
Proceedings of the 2010 International Conference on Security & Management, SAM 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes. CSREA Press 2010, ISBN 1-60132-163-5
Security Policies and Issues
- Jeffery Painter:
Containing the Cloud: Security Issues in a Large Scale Observational Pharmacovigilance Research Project. Security and Management 2010: 3-9 - Jezabel Molina-Gil, Cándido Caballero-Gil, Pino Caballero-Gil:
Group Proposal to Secure Vehicular Ad-Hoc Networks. Security and Management 2010: 10-15 - Ravi Mukkamala, Bhavana Tapde:
Improving Transaction Success Rate by Detecting and Correcting Access Control Misconfigurations. Security and Management 2010: 16-22 - Mauro Migliardi, Gianluca Stringhini:
Travelling Information For Intrusion Prevention Systems. Security and Management 2010: 23-29 - Vladimir S. Zaborovsky, Vladimir Mulukha, Sergey Kouprienko, Oleg Zayats:
Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation. Security and Management 2010: 30-35 - Levent Ertaul, S. Singhal, Gökay Saldamli:
Security Challenges in Cloud Computing. Security and Management 2010: 36-42 - Jonathan Z. Sun:
The Application of One-Way Hash Functions in Information Security Protocols. Security and Management 2010: 43-49 - Pedro Diaz-Gomez, Gregory Steen:
A Hacking View of Access Control. Security and Management 2010: 50-56 - Reyhane Nowrouzi, Seyed Morteza Babamir, Mehdi Dabbaghian, Mohsen Farrokhi, Farzad Azizkhani:
Analyzing Call Initiation Intrusion in Mobile Phones. Security and Management 2010: 57-62 - HongQian Karen Lu:
Protecting Resource-Constrained Network Devices from Denial-of-Service Attacks. Security and Management 2010: 63-67 - Errol Blake, Godwin Fumey-Nassah, Victor A. Clincy:
Outsourcing Your Data Warehouse and Business Intelligence Activities; Is Your Data Safe? Security and Management 2010: 68-74 - Kang-hak Han, Sanghyun Ryu, Jee-hong Kim, Young Ik Eom:
General Context-Aware Role-Based Access Control System. Security and Management 2010: 75-80 - Luay A. Wahsheh:
An Analysis of Security Policy Specification Techniques. Security and Management 2010: 81-86 - Dinesh Kumar Saini, Wail M. Omar, Hemraj Saini:
Cyber Defense Architecture for Campus Intranet. Security and Management 2010: 87-93 - Jack Horner:
A Phylogenetic Approach to Analyzing IP-Address Artifacts of Cyber-Attacks. Security and Management 2010: 94-98 - Arun Nagarle Shivashankarappa, Dharmalingam Ramalingam:
Governance, Risk and Compliance Equilibrium Model for Optimizing Enterprise Information Security. Security and Management 2010: 99-103 - Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshimi Teshigawara, Ryôichi Sasaki, Masakatsu Nishigaki:
A Security Measure Selection Scheme with Consideration of Potential Lawsuits. Security and Management 2010: 104-110
Authentication + Biometrics
- Stefan Rass, Peter Schartner:
Multipath Authentication without shared Secrets and with Applications in Quantum Networks. Security and Management 2010: 111-115 - Jonathan Citty, Dugald Ralph Hutchings:
Design and Evaluation of an Image-based Authentication System for Small Touch-screens. Security and Management 2010: 116-122 - Yang Liang, Nandita Bhattacharjee, Xiaodong Meng:
A Secure Image Watermarking Scheme for Image Copy Control and Copyright Protection Using Biometrics. Security and Management 2010: 123-129 - Sunil V. K. Gaddam, Manohar Lal:
A New Approach For Formulating Randomized Cryptographic Key Generation Using Cancelable Biometrics. Security and Management 2010: 130-137 - Edward P. Guillén, Daniel Padilla, Karina Martinez:
Vulnerabilities and Performance Analysis over Fingerprint Recognition Systems. Security and Management 2010: 138-145 - Anton Titov, Vladimir S. Zaborovsky:
Firewall Configuration based on Specifications of Access Policy and Network Environment. Security and Management 2010: 146-151 - Ryu Watanabe, Yuto Nakano, Toshiaki Tanaka:
Single Sign-on Techniques with PKI-based Authentication for Mobile Phones. Security and Management 2010: 152-156 - Shah Ahsanul Haque, A. S. M. Bakibillah, Abdullah Al Helal:
A Summary on the Authentication Protocol in WiMAX Security. Security and Management 2010: 157-159 - Shrikant Vinchurkar:
Secure Cryptosystem Implementation for Authentication Dongle. Security and Management 2010: 160-166
Mobile Computing
- Michel Kamel, Karima Boudaoud, Michel Riveill:
A Low-energy Consuming and Component-based Security Management Architecture for Mobile Devices. Security and Management 2010: 167-173 - Nabil El-Kadhi, Sofien Beji:
An Agile Approach for Mobile applications Security. Security and Management 2010: 174-180 - Levent Ertaul, Swetha Chelivendri, Gökay Saldamli:
Security Issues for Mobile Government. Security and Management 2010: 181-187 - Alessandro Brawerman, Paulo Seleme Correa:
A VoIP Security Framework for Mobile Devices. Security and Management 2010: 188-196
Cryptography + Key Management Strategies
- Chi Sing Chum, Xiaowen Zhang:
Applying Hash Functions in the Latin Square Based Secret Sharing Schemes. Security and Management 2010: 197-203 - Saman Shojae Chaeikar, Hamidreza Sabet Moghaddam, Hossein Rouhani Zeidanloo:
Node Based Interpretative Key Management Framework. Security and Management 2010: 204-210 - Chi Sing Chum, Xiaowen Zhang:
A New Scheme for Hash Function Construction. Security and Management 2010: 211-217 - Muhammad Nadeem Sial, Muhammed Nauman Qureshi:
Design, Evaluation and Implementation Technique for Cryptographically Secure Dynamic S-Boxes. Security and Management 2010: 218-224 - Parag K. Lala:
A Quantum Key Distribution Protocol. Security and Management 2010: 225-228 - Ansab Ijaz, Arslan Javed, Saad Chaudhry, Syed Annas Shah:
Password Hardening Using Keystroke Dynamics. Security and Management 2010: 229-233 - Asoke Nath, Saima Ghosh, Meheboob Alam Mallick:
Symmetric Key Cryptography Using Random Key Generator. Security and Management 2010: 234-242
Cybersecurity Education
- George Markowsky, Linda Markowsky:
Consumer Guide to Online Cybersecurity Resources: UMCEG. Security and Management 2010: 243-247 - Linda Markowsky:
An SELinux Sourcebook for Cybersecurity Educators. Security and Management 2010: 248-254 - Joshua J. Pauli, Patrick Henry Engebretson:
A Cradle-to-Grave Approach to Retaining Students in Information Security Programs. Security and Management 2010: 255-260 - Patrick Henry Engebretson, Joshua J. Pauli, Joshua Bosma:
Lessons Learned from an Evolving Information Assurance Lab. Security and Management 2010: 261-266 - Bruce Hartpence, Daryl Johnson:
A Re-examination of Network Address Translation Security. Security and Management 2010: 267-272 - Michael Kozma, Jeffrey Scaparra, Aaron Doty, Matthew Simmons:
The Potential Pitfalls and Security Risks of IPv6. Security and Management 2010: 273-279 - Raymond Albert, George Markowsky, JoAnne Wallingford:
High School Cyber Defense Competitions: Lessons from the Trenches. Security and Management 2010: 280-285 - David Pearson, Sumita Mishra, Yin Pan:
Security Attacks And Defenses In Sensor Networks. Security and Management 2010: 286-292 - Christopher Wood, Rajendra Raj:
Keyloggers in Cybersecurity Education. Security and Management 2010: 293-299 - Jean Gourd:
Cyber Storm: The Culmination of an Undergraduate Course in Cyber Security. Security and Management 2010: 300-306 - Jeffrey Scaparra:
One Individual's Three Perspectives of the Collegiate Cyber Defense Competition. Security and Management 2010: 307-316
Applications
- Peyman Taher, Mansur H. Samadzadeh:
Toward Sender Anonymity in the Presence of an Active Global Adversary. Security and Management 2010: 317-322 - Wook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework. Security and Management 2010: 323-329 - Raymond Wu, Masayuki Hisada, Atsushi Kara, Takafumi Hayashi:
Event Capture Approaches for Vulnerability Detection. Security and Management 2010: 330-335 - Hiroshi Dozono, Takeru Kabashima, Masanori Nakakuni:
Mapping of the Traffics of IP-Packets on 2-dimensional Plane using Pareto Learning SOM. Security and Management 2010: 336-341 - Hossein Rouhani Zeidanloo, Farzaneh Tabatabaei, Payam Vahdani Amoli, Atefeh Tajpour:
All About Malwares (Malicious Codes). Security and Management 2010: 342-348 - Alireza T. Boloorchi, Mansur H. Samadzadeh:
Energy Efficient and Secure In-Network Storage for Wireless Sensor Networks. Security and Management 2010: 349-355 - Xiangwei Kong, Xingang You, Bo Wang, Shize Shang, Linjie Shen:
Laser Printer Source Forensics for Arbitrary Chinese Characters. Security and Management 2010: 356-360 - Jude Desti, Hongmei Chi:
A Framework for Smart Trusted Indicators for Browsers (STIB). Security and Management 2010: 361-367 - Meysam Namayandeh, Hamed Taherdoost, Neda Jalaliyoon:
Computer Ethics - Review of Global Perspective. Security and Management 2010: 368-374
Protocols, Theory and Algorithms
- Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh:
Behavioral Obfuscation in Malware and its Mitigation via Signature Generalization. Security and Management 2010: 375-385 - Andrzej Bialas:
Ontological Approach to the Business Continuity Management System Development. Security and Management 2010: 386-392 - Huijie Cui, Huiping Guo, Chengyu Sun, Behzad Parviz:
A New Approach to Detecting Malicious Modification to Streaming Data Using Integer Stuffing. Security and Management 2010: 393-399 - Mahjoub Langar, Mohamed Mejri, Kamel Adi:
Toward an Algebraic Framework for Security Policy Enforcement in Concurrent Systems. Security and Management 2010: 400-405 - Zhou Fang, Huiping Guo, Behzad Parviz:
Internet Voting Protocol Design and Implementation. Security and Management 2010: 406-412 - Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura, Mohsin Hashim, Izzeldin Amin:
Zero-day Polymorphic Worms Detection Using A modified Boyer-Moore Algorithm. Security and Management 2010: 413-418 - Xiaodong Meng, Nandita Bhattacharjee:
Blind Audio Watermarking Based on Neighbouring Energy Feature. Security and Management 2010: 419-425 - Hsiang-Cheh Huang, Wai-Chi Fang:
Reversible Data Hiding Using Characteristics of Original Contents. Security and Management 2010: 426-432 - Ali Emdadi, Ramesh K. Karne, Alexander L. Wijesinha:
TLS Timings On A Bare PC. Security and Management 2010: 433-438 - Abrar A. Qureshi, Kamel Rekab, Carlos E. Otero:
A Statistical Approach for Anomaly-Based Network Intrusion Detection Using Logistic Regression. Security and Management 2010: 439-443 - Sergio Pastrana, Agustín Orfila, Arturo Ribagorda:
Modeling NIDS Evasion with Genetic Programming. Security and Management 2010: 444-448 - Suhair Amer, John Hamilton:
Resource Evaluation of Positive and Negative Selection. Security and Management 2010: 449-453 - Do-Hoon Kim, Hoh Peter In, Hyun-Cheol Jeong:
Learning-based Threshold Estimation Model for Detection of Botnet Malicious Activities. Security and Management 2010: 454-458 - Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao:
Working Towards a Primary Binary Analysis System. Security and Management 2010: 459-465 - Ahmad Ghafarian, Jonathan Strahan:
Asset Identification and Valuation. Security and Management 2010: 466-470 - Javed Parvez, Mushtaq Peer:
Usability and Performance of Firewalls in IPv6 Networks. Security and Management 2010: 471-476 - Richard Wasniowski:
Multiagent Based Approach for Supporting Situation Assessment. Security and Management 2010: 477-480 - Mo Adda, Adamantini Peratikou, Djazia Ghefir:
Detecting Network Faults with Filtering. Security and Management 2010: 481-486
Special Track on Applied Cryptology and Network Security, STACNS'10
- Kevin Daimi, Jinnan Song:
An Approach to Secure E-Visit Systems. Security and Management 2010: 487-494 - Victor Gayoso Martínez, Luis Hernández Encinas, Carmen Sanchez-Avila:
A Java Implementation of the Elliptic Curve Integrated Encryption Scheme. Security and Management 2010: 495-504
Special Track on Security and Information Assurance Education, STSIAE'10
- Kevin Daimi, Nizar Al-Holou, Utayba Mohammed:
An Interdisciplinary Minor in Computer and Network Security. Security and Management 2010: 505-510 - Rami Baroody, Nizar Al-Holou:
Designing a Course on Jini-Based Vehicle Network Security. Security and Management 2010: 511-515 - Victor Gayoso Martínez, Ascensión Hernández Encinas, Luis Hernández Encinas, Araceli Queiruga Dios, Isabel Visus Ruiz:
Development of Capstone Projects on Secure Communications for Engineering Students. Security and Management 2010: 516-522
Mission Assurance - Tools, Techniques, and Methodologies
- William Sitzabee, Michael Stepaniak, Peter Feng:
Mission Assurance Issues with the Federal Aviation Administration's Policy to Implement GPS Navigational System. Security and Management 2010: 523-528 - Vinod Naga, John M. Colombi, Michael R. Grimaila, Kenneth M. Hopkinson:
Enabling Performance of Mission-Oriented Networks Through Quality of Service Methods. Security and Management 2010: 529-535 - Tay Johannes, Michael R. Grimaila:
Achieving Situational Awareness in Extreme Events. Security and Management 2010: 536-541 - David Sorrels, Michael R. Grimaila:
Towards Predictive Mission Risk Analysis to Operationalize Mission Assured Networking. Security and Management 2010: 542-547 - Jose Fadul, Kenneth M. Hopkinson, James T. Moore, Todd R. Andel, Stuart H. Kurkowski:
SCADA Trust Management System. Security and Management 2010: 548-554 - Juan Lopez Jr., Eddie Mendezllovet, Jeffrey W. Humphries:
Engineering Mission Assurance for the Cyber Security of Supervisory Control and Data Aquisition (SCADA) Systems. Security and Management 2010: 555-564
Information Security and Education
- Gevorg Margarov, Vahan Markarov:
Digital Image Steganography Using Matrix Addition. Security and Management 2010: 565-571 - Yeghisabet Alaverdyan, Gevorg Margarov:
Quasigroup Equipped Strong Public Key Cryptosystem based on Boolean Product of Matrices. Security and Management 2010: 572-576 - Maha Tolba, Tigran Andreasyan, Vahan Markarov:
A New Approach for Fingerprint Minutia Extraction Algorithm. Security and Management 2010: 577-583 - Ashot Khachaturov, Vahan Markarov:
Reconfigurable Steganographic System for Secure and Long-term Data Storage. Security and Management 2010: 584-588 - Vahan Markarov, Armen Ghazaryan:
Detection of Distributed Attacks Based on Hybrid Neural Networks. Security and Management 2010: 589-593 - Armen Abrahamyan, Donara Gabrielyan:
eLearning Model for Information Security Education. Security and Management 2010: 594-598 - Artur Mkrtchyan, Donara Gabrielyan:
On Information Security Knowledge Assessment. Security and Management 2010: 599-603 - Robert Hakobyan, Hovhannes Hovsepyan:
Object Recognition on the Securing Area. Security and Management 2010: 604-610
Digital Forensics
- Peter Hannay, Christopher Bolan:
The 2010 IDN Homograph Attack Mitigation Survey. Security and Management 2010: 611-614 - Craig Valli, Mohammed Al Lawati:
Developing VoIP Router Honeypots. Security and Management 2010: 615-619 - John Barker, Peter Hannay, Christopher Bolan:
Using Traffic Analysis to Identify Tor Usage - A Proposed Study. Security and Management 2010: 620-623 - David Cooper, Damon Pollard, Christopher Bolan:
Forensic Data Reocvery on the 8GB Fifth Generation iPod Nano. Security and Management 2010: 624-626 - Craig Valli, Peter Hannay:
Geotagging Where Cyberspace Comes to Your Place. Security and Management 2010: 627-632
Securing Medical Information
- Neha Patel, Patricia Williams:
Breaches in Medical Information Security: The Problem of Reporting. Security and Management 2010: 633-636 - Donald McDermid, Rachel J. Mahncke, Patricia A. H. Williams:
An Information Security Governance Encounter for Australian Primary Care Health Providers. Security and Management 2010: 637-643 - Patricia A. H. Williams:
Medical Information Security: Is it all too hard? Security and Management 2010: 644-650
Mission Assurance, Smart Cards, Cloud Computing, Cyber Security, Hacking Prevention, Steganography, Intrusion 1G, Forensic, and Information Security
- Michael R. Grimaila, Robert F. Mills, Michael W. Haas, Douglas J. Kelly:
Mission Assurance: Issues and Challenges. Security and Management 2010: 651-657 - Asad M. Ali, Mehdi Asnaashari, Karen Lu:
Combining Smart Card Services with a Secure Memory Token. Security and Management 2010: 658-664 - Rajib Joshi-Acharya, Ju An Wang:
A Trust Borkerage Framework for Cloud Computing. Security and Management 2010: 665-671 - Joseph Weiss:
The Need for Interdisciplinary Programs for Cyber Security of Industrial Control Systems. Security and Management 2010: 672-677 - Aditya Patel, Amanpreet Singh Arora, Radhika Medury, Anisha Pabbi, Nitin:
CAPTCHA Based E-mail Hacking Prevention. Security and Management 2010: 678-682 - Souvik Bhattacharyya, Goutam Sanyal:
Hiding Data in Images Using Pixel Mapping Method (PMM). Security and Management 2010: 683-689 - Souvik Bhattacharyya, Indradip Banerjee, Goutam Sanyal:
Design and implementation of a Secure Text Based Steganography Model. Security and Management 2010: 690-696 - Vivek Patole, Vinod Keshaorao Pachghare, Parag Kulkarni:
Performance Analysis of Intrusion Detection System at Training Time Using AdaBoost Algorithm. Security and Management 2010: 697-702 - Nattakant Utakrit:
A Review of Approaching Customer Online Banking Authentication Against Cyber Attacks. Security and Management 2010: 703-708 - Chialin Chen, Elijah Mike, Fan Wu:
Investigating Forensic Software Solutions to Acquire Information from Mobile Device. Security and Management 2010: 709-713 - Eltayeb Abuelyaman, Atikan Teber, Khaled Al Mustafa:
Extension of Diffie-Hellman's Secure Key Distribution Technique to Multipoint Broadcasting. Security and Management 2010: 714-720 - Jong-Hyuk Kim, Jae-Chel Ryou, Hee-Bong Choi, Keon-Woo Kang:
Development Document Framework of IT Security Products for CC. Security and Management 2010: 721-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.