Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CYBERSEC
CYBERSEC 2015
Generate Citations
2015 Fourth International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)
Oct. 29 2015 to Oct. 31 2015
Jakarta, Indonesia
Table of Contents
title page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-vii
Message from the General Chair
Freely available from IEEE.
pp. viii-viii
Preface
Freely available from IEEE.
pp. ix-ix
Organizing Committee
Freely available from IEEE.
pp. x-x
International Program Committee
Freely available from IEEE.
pp. xi-xii
Reviewers
Freely available from IEEE.
pp. xiii-xiii
An Approach to Mine Suspicious Domain Based on HTTP Automated Software Communication Behavior
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Tran Cong Manh
,
Yasuhiro Nakamura
Analysis of Awareness Structures in Information Security Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 6-10
by
Mikhail Styugin
Securing Official Account Twitter Using Social Media Management System: Accuracy of the Data and Information Publish with Twitter
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-15
by
Dwiki Jatikusumo
,
Hanny Hikmayanti H
,
Feriadi
,
Wendi Usino
Development of Intellectual Network Forensic System LIFT against Targeted Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-21
by
Kazuki Hashimoto
,
Hiroyuki Hiruma
,
Takashi Matsumoto
,
Kosetus Kayama
,
Yoshio Kaikizaki
,
Hiroshi Yamaki
,
Tetsutaro Uehara
,
Ryoichi Sasaki
Data Security Using LSB Steganography and Vigenere Chiper in an Android Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-27
by
Chyquitha Danuputri
,
Teddy Mantoro
,
Mardi Hardjianto
Study on Countermeasures Using Mitigation Software against Vulnerability Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-33
by
Ryohei Koizumi
,
Ryoichi Sasaki
Implementation of Secure Smart Grid as Critical Information Infrastructure in Indonesia: A Case Study in Smart Grid Electricity
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-39
by
Ahmad Budi Setiawan
,
Aries Syamsudin
,
Ashwin Sasongko
Proposal of a Method for Identifying the Infection Route for Targeted Attacks Based on Malware Behavior in a Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-45
by
Makoto Sato
,
Akihiko Sugimoto
,
Naoki Hayashi
,
Yoshiaki Isobe
,
Ryoichi Sasaki
Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-51
by
Naoto Nakagawa
,
Yoshimi Teshigawara
,
Ryoichi Sasaki
Evaluation of a Risk-Based Management Method for Online Accounts
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-57
by
Takumi Akiyama
,
Kazuya Otani
,
Yoshio Kakizaki
,
Ryoichi Sasaki
An Intrusion Detection System Based on NSGA-II Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-61
by
Ali Tamimi
,
Desineni Subbaram Naidu
,
Sanaz Kavianpour
Malware Detection through Call System on Android Smartphone Using Vector Machine Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-67
by
Victor Wahanggara
,
Yudi Prayudi
Real-Time Printed Document Authentication Using Watermarked QR Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-72
by
Teddy Mantoro
,
M. Iman Wahyudi
,
Media A. Ayu
,
Wendi Usino
A Case Study of SQL Injection Vulnerabilities Assessment of .bd Domain Web Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-77
by
Delwar Alam
,
Md. Alamgir Kabir
,
Touhid Bhuiyan
,
Tanjila Farah
Hybrid Solution for Secured and Energy Aware Routing Path in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-83
by
Abdullah Said Alkalbani
,
Teddy Mantoro
,
Sardjoeni Moedjiono
,
Media A. Ayu
From Risk Analysis to the Expression of Security Requirements for Systems Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-89
by
Nabil Laoufi
Portable Toolkit for Penetration Testing and Firewall Configuration
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-94
by
Herny Ramadhani Husny Hamid
,
Megat Ahmad Izzat b Megat Ahmad Kamil
,
Norhaiza Ya Abdullah
Exploiting Ambient Light Sensor for Authentication on Wearable Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-100
by
Hyoseok Yoon
,
Se-Ho Park
,
Kyung-Taek Lee
Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-106
by
Muhammad Hilmi Kamarudin
,
Carsten Maple
,
Tim Watson
,
Hasliza Sofian
MLDED: Multi-layer Data Exfiltration Detection System
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-112
by
Mohammad Ahmad Abu Allawi
,
Ali Hadi
,
Arafat Awajan
Estimating Posterior Probabilities to Identify Breach Points during Cyber-attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-116
by
Sriram Raghavan
,
S.V. Raghavan
Process Model of Digital Forensics Readiness Scheme (DFRS) as a Recommendation of Digital Evidence Preservation
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-122
by
Ahmad Luthfi
,
Yudi Prayudi
Mobile Device Forensics: Extracting and Analysing Data from an Android-Based Smartphone
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-128
by
Normaziah A. Aziz
,
Fakhrulrazi Mokhti
,
M. Nadhar M. Nozri
Similarity-Based Malware Classification Using Hidden Markov Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-134
by
Mohammad Imran
,
Muhammad Tanvir Afzal
,
Muhammad Abdul Qadir
Physical Authentication Using Random Number Generated (RNG) Keypad Based on One Time Pad (OTP) Concept
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-139
by
Herny Ramadhani Mohd Husny Hamid
,
Norhaiza Ya Abdullah
Folder Lock by Using Multimodal Biometric: Fingerprint and Signature Authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-145
by
Norhaiza Bt Ya Abdullah
,
Herny Ramadhani Bt Mohd Husny Hamid
Comparative Study of Cyber Security Policies among Malaysia, Australia, Indonesia: A Responsibility Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-150
by
P.D. Persadha
,
A.A. Waskita
,
S. Yazid
Author Index
Freely available from IEEE.
pp. 151-151
Publisher's Information
Freely available from IEEE.
pp. 152-152
Showing 38 out of 38