default search action
MMM-ACNS 2017: Warsaw, Poland
- Jacek Rak, John Bay, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin, Krzysztof Szczypiorski:
Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings. Lecture Notes in Computer Science 10446, Springer 2017, ISBN 978-3-319-65126-2
Invited Papers
- Janusz Górski, Katarzyna Lukasiewicz:
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile. 3-15 - Andrew Hutchison:
Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking Models. 16-27 - Alexander A. Grusho:
Data Mining and Information Security. 28-33
Critical Infrastructure Protection and Visualization
- Laurens Lemaire, Jan Vossaert, Bart De Decker, Vincent Naessens:
Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems. 37-49 - Evgenia Novikova, Ivan Murenin:
Visualization-Driven Approach to Anomaly Detection in the Movement of Critical Infrastructure. 50-61 - Emrah Korkmaz, Matthew Davis, Andrey M. Dolgikh, Victor A. Skormin:
Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs. 62-74 - Maxim Kolomeec, Gustavo Gonzalez Granadillo, Elena Doynikova, Andrey Chechulin, Igor V. Kotenko, Hervé Debar:
Choosing Models for Security Metrics Visualization. 75-87
Security and Resilience of Network Systems
- Deeraj Nagothu, Andrey M. Dolgikh:
iCrawl: A Visual High Interaction Web Crawler. 91-103 - Leonard J. Popyack, Jay Biernat:
Race Condition Faults in Multi-core Systems. 104-114 - Vasileios Gkioulos, Stephen D. Wolthusen:
Security Requirements for the Deployment of Services Across Tactical SOA. 115-127
Adaptive Security
- Jerzy Konorski, Karol Rydzewski:
Nodal Cooperation Equilibrium Analysis in Multi-hop Wireless Ad Hoc Networks with a Reputation System. 131-142 - Alexander Branitskiy, Igor V. Kotenko:
Network Anomaly Detection Based on an Ensemble of Adaptive Binary Classifiers. 143-157 - Albert Sitek, Zbigniew Kotulski:
Cardholder's Reputation System for Contextual Risk Management in Payment Transactions. 158-170 - Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
Towards Self-aware Approach for Mobile Devices Security. 171-182
Anti-malware Techniques: Detection, Analysis, Prevention
- Matthew Davis, Emrah Korkmaz, Andrey M. Dolgikh, Victor A. Skormin:
Resident Security System for Government/Industry Owned Computers. 185-194 - Anton Kopeikin, Arnur G. Tokhtabayev, Nurlan Tashatov, Dina Satybaldina:
tLab: A System Enabling Malware Clustering Based on Suspicious Activity Trees. 195-210 - Arnur G. Tokhtabayev, Anton Kopeikin, Nurlan Tashatov, Dina Satybaldina:
Malware Analysis and Detection via Activity Trees in User-Dependent Environment. 211-222 - Hubert Ostap, Ryszard Antkiewicz:
A Concept of Clustering-Based Method for Botnet Detection. 223-234 - Stig Fr. Mjølsnes, Ruxandra F. Olimid:
Easy 4G/LTE IMSI Catchers for Non-Programmers. 235-246 - Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, Kai Zeng:
Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis. 247-259 - An Braeken, Sergey Bezzateev, Abdellah Touhafi, Natalia Voloshina:
HEPPA: Highly Efficient Privacy Preserving Authentication for ITS. 260-271
Applied Cryptography
- Roberto Metere, Changyu Dong:
Automated Cryptographic Analysis of the Pedersen Commitment Scheme. 275-287 - Valery I. Korzhik, Ivan Fedyanin, Artur Godlewski, Guillermo Morales-Luna:
Steganalysis Based on Statistical Properties of the Encrypted Messages. 288-298 - Marcin Niemiec, Maciej Francikiewicz:
Security Assessment of Cryptographic Algorithms. 299-312 - Vasileios Mavroeidis, Mathew Nicho:
Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks. 313-324
New Ideas and Paradigms for Security
- Steven Drager, Janusz Zalewski:
A Novel and Unifying View of Trustworthiness in Cyberphysical Systems. 327-338 - Alexander A. Grusho, Nick A. Grusho, Michael I. Zabezhailo, Alexander Zatsarinny, Elena E. Timonina:
Information Security of SDN on the Basis of Meta Data. 339-347 - Omar Iraqi, Hanan El Bakkali:
Toward Third-Party Immune Applications. 348-359
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.