Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CRISIS
CRISIS 2013
Generate Citations
2013 International Conference on Risks and Security of Internet and Systems (CRiSIS)
Oct. 23 2013 to Oct. 25 2013
La Rochelle, France
Table of Contents
[Copyright notice]
Freely available from IEEE.
pp. 1-1
Conference organization
Freely available from IEEE.
pp. 1-1
Parsifal: Writing efficient and robust binary parsers, quickly
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Olivier Levillain
,
Herve Debar
,
Benjamin Morin
How to develop secure applications with Aspect-Oriented Programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Monica Pinto
,
Jose M. Horcas
Accessing secure information using export file fraudulence
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Guillaume Bouffard
,
Tom Khefif
,
Jean-Louis Lanet
,
Ismael Kane
,
Sergio Casanova Salvia
Misbehaviour monitoring on system-of-systems components
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Nathan Shone
,
Qi Shi
,
Madjid Merabti
,
Kashif Kifayat
What security for electronic exams?
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Rosario Giustolisi
,
Gabriele Lenzini
,
Giampaolo Bella
Economic impact of software security activities in software development
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Golriz Chehrazi
MASS: An efficient and secure broadcast authentication scheme for resource constrained devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Wafa Ben Jaballah
,
Mauro Conti
,
Roberto Di Pietro
,
Mohamed Mosbah
,
Nino Vincenzo Verde
A complete tableau procedure for risk analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Matteo Cristani
,
Erisa Karafili
,
Luca Vigano
Semantic-based context-aware alert fusion for distributed Intrusion Detection Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Alireza Sadighian
,
Saman Taghavi Zargar
,
Jose M. Fernandez
,
Antoine Lemay
Detection of attack strategies
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Suliman A. Alsuhibany
,
Charles Morisset
,
Aad van Moorsel
A formal methodology for Enterprise Information Security risk assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Jaya Bhattacharjee
,
Anirban Sengupta
,
Chandan Mazumdar
Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Roberto Di Pietro
,
Luigi V. Mancini
,
Antonio Villani
,
Domenico Vitali
Controlled information sharing for unspecified emergencies
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Barbara Carminati
,
Elena Ferrari
,
Michele Guglielmi
CREPUSCOLO: A collusion resistant privacy preserving location verification system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Eyup S. Canlar
,
Mauro Conti
,
Bruno Crispo
,
Roberto Di Pietro
Privacy-enhanced filtering and collection middleware in EPCglobal networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Wiem Tounsi
,
Nora Cuppens-Boulahia
,
Frederic Cuppens
,
Joaquin Garcia-Alfaro
Predictive vulnerability scoring in the context of insufficient information availability
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hamza Ghani
,
Jesus Luna
,
Abdelmajid Khelil
,
Najib Alkadri
,
Neeraj Suri
A defensive Java Card virtual machine to thwart fault attacks by microarchitectural support
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Michael Lackner
,
Reinhard Berlach
,
Michael Hraschan
,
Reinhold Weiss
,
Christian Steger
Quantitative assessment of software vulnerabilities based on economic-driven security metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hamza Ghani
,
Jesus Luna
,
Neeraj Suri
Selective record route DoS traceback
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Mohammed Alenezi
,
Martin J. Reed
An event processing approach for threats monitoring of service compositions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Dhouha Ayed
,
Muhammad Asim
,
David Llewellyn-Jones
Showing 22 out of 22