Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CRISIS
CRISIS 2012
Generate Citations
2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS)
Oct. 10 2012 to Oct. 12 2012
Cork
Table of Contents
Papers
[Copyright notice]
Full-text access may be available. Sign in or learn about subscription options.
pp. 1
Papers
Trust-based delegation for Ad Hoc QoS enhancing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Ryma Abassi
,
Sihem Guemara El Fatmi
Papers
A vector based model approach for defining trust in Multi-Organization Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Mazen El Maarabani
,
Ana Cavalli
,
Khalifa Toumi
,
Cesar Andres
Papers
Towards efficient access control in a mobile agent based wireless sensor network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
J. Borrell
,
S. N. Foley
,
E. Mercadal
,
G. Navarro-Arribas
Papers
Privacy-by-design based on quantitative threat modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jesus Luna
,
Neeraj Suri
,
Ioannis Krontiris
Papers
A honeypot for arbitrary malware on USB storage devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sebastian Poeplau
,
Jan Gassen
Papers
Evasion-resistant malware signature based on profiling kernel data structure objects
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Marcus Matten
,
Chen-Ching Liu
Papers
Browser function calls modeling for banking malware detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Manuel Garcia-Cervigon
,
Manel Medina Llinas
Papers
Don't work. Can't work? Why it's time to rethink security warnings
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
M. Angela Sasse
,
Kat Krol
,
Matthew Moroz
Papers
Distributed e-voting using the Smart Card Web Server
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Song Dong
,
Konstantinos Markantonakis
,
Keith Mayes
,
Lazaros Kyrillidis
,
Sheila Cobourne
Papers
Anomaly analysis for Physical Access Control security configuration
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Barry O'Sullivan
,
Simon N. Foley
,
William M. Fitzgerald
,
Fatih Turkmen
Papers
Security-related vulnerability life cycle analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Mohamed Kaaniche
,
Geraldine Vache Marconato
,
Vincent Nicomette
Papers
Semantic matching of web services security policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Maher Ben Jemaa
,
Mohamed Jmaiel
,
Tarak Chaari
,
Monia Ben Brahim
Papers
Managing and accessing data in the cloud: Privacy risks and approaches
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Pierangela Samarati
,
Sabrina De Capitani di Vimercati
,
Sara Foresti
Papers
CRiSIS 2012 security standards tutorial
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Stephen Farrell
Papers
Semiring-based constraint models and frameworks for security-related scenarios
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Stefano Bistarelli
,
Francesco Santini
Papers
Attacks against smart cards: Hands on session
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Jean-Louis Lanet
Papers
Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ludovic Pietre-Cambacedes
,
Siwar Kriaa
,
Marc Bouissou
Papers
Detecting attacks against data in web applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yann Bachy
,
Rim Akrout
,
Eric Alata
,
Mohamed Kaaniche
,
Vincent Nicomette
,
Frederic Tronel
,
Romaric Ludinard
,
Eric Totel
Papers
Partitioning the Internet
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ramakrishna Thurimella
,
Matthias Wachs
,
Christian Grothoff
Papers
Improving the detection of on-line vertical port scan in IP traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Philippe Robert
,
Yousra Chabchoub
,
Christine Fricker
Papers
Hash pile ups: Using collisions to identify unknown hash functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
David Malone
,
R. Joshua Tobin
Papers
Investigating the dark cyberspace: Profiling, threat-based analysis and correlation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Mourad Debbabi
,
Farkhund Iqbal
,
Amine Boukhtouta
,
Son Dinh
,
Claude Fachkha
,
Elias Bou-Harb
Papers
Foreword
Freely available from IEEE.
pp. 1-1
Papers
Conference organization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
Showing 25 out of 25