Default Cover Image

2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS)

Oct. 10 2012 to Oct. 12 2012

Cork

Table of Contents

Papers
[Copyright notice]Full-text access may be available. Sign in or learn about subscription options.pp. 1
Papers
Trust-based delegation for Ad Hoc QoS enhancingFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Papers
A vector based model approach for defining trust in Multi-Organization EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Towards efficient access control in a mobile agent based wireless sensor networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Papers
Privacy-by-design based on quantitative threat modelingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
A honeypot for arbitrary malware on USB storage devicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Evasion-resistant malware signature based on profiling kernel data structure objectsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Browser function calls modeling for banking malware detectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Papers
Don't work. Can't work? Why it's time to rethink security warningsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Distributed e-voting using the Smart Card Web ServerFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Anomaly analysis for Physical Access Control security configurationFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Security-related vulnerability life cycle analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Semantic matching of web services security policiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Managing and accessing data in the cloud: Privacy risks and approachesFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Papers
CRiSIS 2012 security standards tutorialFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Papers
Semiring-based constraint models and frameworks for security-related scenariosFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Papers
Attacks against smart cards: Hands on sessionFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
Modeling the Stuxnet attack with BDMP: Towards more formal risk assessmentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Detecting attacks against data in web applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Partitioning the InternetFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Improving the detection of on-line vertical port scan in IP trafficFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
Hash pile ups: Using collisions to identify unknown hash functionsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
ForewordFreely available from IEEE.pp. 1-1
Papers
Conference organizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Showing 25 out of 25