Default Cover Image

2013 International Conference on Risks and Security of Internet and Systems (CRiSIS)

Oct. 23 2013 to Oct. 25 2013

La Rochelle, France

Table of Contents

[Copyright notice]Freely available from IEEE.pp. 1-1
Conference organizationFreely available from IEEE.pp. 1-1
Parsifal: Writing efficient and robust binary parsers, quicklyFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
How to develop secure applications with Aspect-Oriented ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Accessing secure information using export file fraudulenceFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Misbehaviour monitoring on system-of-systems componentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
What security for electronic exams?Full-text access may be available. Sign in or learn about subscription options.pp. 1-5
Economic impact of software security activities in software developmentFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
A complete tableau procedure for risk analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Detection of attack strategiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A formal methodology for Enterprise Information Security risk assessmentFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Controlled information sharing for unspecified emergenciesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
CREPUSCOLO: A collusion resistant privacy preserving location verification systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Quantitative assessment of software vulnerabilities based on economic-driven security metricsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Selective record route DoS tracebackFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
An event processing approach for threats monitoring of service compositionsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Showing 22 out of 22