Default Cover Image

2015 Fourth International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)

Oct. 29 2015 to Oct. 31 2015

Jakarta, Indonesia

Table of Contents

title page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-vii
Message from the General ChairFreely available from IEEE.pp. viii-viii
PrefaceFreely available from IEEE.pp. ix-ix
Organizing CommitteeFreely available from IEEE.pp. x-x
International Program CommitteeFreely available from IEEE.pp. xi-xii
ReviewersFreely available from IEEE.pp. xiii-xiii
An Approach to Mine Suspicious Domain Based on HTTP Automated Software Communication BehaviorFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Analysis of Awareness Structures in Information Security SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 6-10
Data Security Using LSB Steganography and Vigenere Chiper in an Android EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 22-27
Study on Countermeasures Using Mitigation Software against Vulnerability AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 28-33
Evaluation of a Risk-Based Management Method for Online AccountsFull-text access may be available. Sign in or learn about subscription options.pp. 52-57
An Intrusion Detection System Based on NSGA-II AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 58-61
Malware Detection through Call System on Android Smartphone Using Vector Machine MethodFull-text access may be available. Sign in or learn about subscription options.pp. 62-67
Real-Time Printed Document Authentication Using Watermarked QR CodeFull-text access may be available. Sign in or learn about subscription options.pp. 68-72
A Case Study of SQL Injection Vulnerabilities Assessment of .bd Domain Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 73-77
From Risk Analysis to the Expression of Security Requirements for Systems InformationFull-text access may be available. Sign in or learn about subscription options.pp. 84-89
Exploiting Ambient Light Sensor for Authentication on Wearable DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 95-100
MLDED: Multi-layer Data Exfiltration Detection SystemFull-text access may be available. Sign in or learn about subscription options.pp. 107-112
Estimating Posterior Probabilities to Identify Breach Points during Cyber-attacksFull-text access may be available. Sign in or learn about subscription options.pp. 113-116
Process Model of Digital Forensics Readiness Scheme (DFRS) as a Recommendation of Digital Evidence PreservationFull-text access may be available. Sign in or learn about subscription options.pp. 117-122
Mobile Device Forensics: Extracting and Analysing Data from an Android-Based SmartphoneFull-text access may be available. Sign in or learn about subscription options.pp. 123-128
Similarity-Based Malware Classification Using Hidden Markov ModelFull-text access may be available. Sign in or learn about subscription options.pp. 129-134
Folder Lock by Using Multimodal Biometric: Fingerprint and Signature AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 140-145
Comparative Study of Cyber Security Policies among Malaysia, Australia, Indonesia: A Responsibility PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 146-150
Author IndexFreely available from IEEE.pp. 151-151
Publisher's InformationFreely available from IEEE.pp. 152-152
Showing 38 out of 38