Table of Contents
|
Availability, Reliability, and Security in Information Systems Stephanie Teufel, Tjoa A Min, IlsunYou, EdgarWeippl (Eds.)
|
Front Matter |
Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Information Systems (CD-ARES 2014)
|
Knowledge Management
|
Argumentation-Based Group Decision Support for Collectivist Communities Marijke Coetzee |
1-16 |
A Knowledge Integration Approach for Safety-Critical Software Development and Operation Based on the Method Architecture Shuichiro Yamamoto |
17-28 |
Metrics-Based Incremental Determinization of Finite Automata Sergiu Balan, Gianfranco Lamperti, Michele Scandale |
29-44 |
Mobile and Social Computing
|
Mobile Computing is not Always Advantageous: Lessons Learned from a Real-World Case Study in a Hospital Andreas Holzinger, Bettina Sommerauer, Peter Spitzer, Simon Juric, Borut Zalik, Matjaz Debevc, Chantal Lidynia, André Valdez, Carsten Roecker, Martina Ziefle |
110-123 |
Towards Interactive Visualization of Longitudinal Data to Support Knowledge Discovery on Multi-touch Tablet Computers Andreas Holzinger, Michael Schwarz, Bernhard Ofner, Fleur Jeanquartier, Andre Calero-Valdez, Carsten Roecker, Martina Ziefle |
124-137 |
Semantic-Aware Mashups for Personal Resources in SemanticLIFE and SocialLIFE Sao-Khue Vo, Amin Anjomshoaa, A. Tjoa |
138-154 |
Software Security
|
Towards Developing Secure Software Using Problem-Oriented Security Patterns Azadeh Alebrahim, Maritta Heisel |
45-62 |
Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services Evgenia Novikova, Igor Kotenko |
63-78 |
A Review of Security Requirements Engineering Methods with Respect to Risk Analysis and Model-Driven Engineering Denisse Muñante, Vanea Chiprianov, Laurent Gallon, Philippe Aniorté |
79-93 |
Adaptive User-Centered Security Sven Wohlgemuth |
94-109 |
4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2014)
|
Trust Extension Protocol for Authentication in Networks Oriented to Management (TEPANOM) Antonio Jara |
155-165 |
Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters Yi-Li Huang, Fang-Yie Leu, Ilsun You, Jing-Hao Yang |
166-171 |
Crypto-Biometric Models for Information Secrecy Marek Ogiela, Lidia Ogiela, Urszula Ogiela |
172-178 |
One-Time Biometrics for Online Banking and Electronic Payment Authentication Aude Plateaux, Patrick Lacharme, Christophe Rosenberger, Audun Jøsang |
179-193 |
Expert Knowledge Based Design and Verification of Secure Systems with Embedded Devices Vasily Desnitsky, Igor Kotenko |
194-210 |
PrivacyFrost2: A Efficient Data Anonymization Tool Based on Scoring Functions Shinsaku Kiyomoto, Yutaka Miyake |
211-225 |
Detection of Malicious Web Pages Using System Calls Sequences Gerardo Canfora, Eric Medvet, Francesco Mercaldo, Corrado Visaggio |
226-238 |
Risk Reduction Overview Hellen Havinga, Olivier Sessink |
239-249 |
Towards Analysis of Sophisticated Attacks, with Conditional Probability, Genetic Algorithm and a Crime Function Wolfgang Boehmer |
250-256 |
A High-Speed Network Content Filtering System Guohong Zhao, Shuhui Chen, Baokang Zhao, Ilsun You, Jinshu Su, Wanrong Yu |
257-269 |
Feature Grouping for Intrusion Detection System Based on Hierarchical Clustering Jingping Song, Zhiliang Zhu, Chris Price |
270-280 |
Towards a Key Consuming Detection in QKD-VoIP Systems Guohong Zhao, Wanrong Yu, Baokang Zhao, Chunqing Wu |
281-285 |
A Structure P2P Based Web Services Registry with Access and Control He Qian, Zhao Baokang, Long Yunjian, Su Jinshu, Ilsun You |
286-297 |
Amplification DDoS Attacks: Emerging Threats and Defense Strategies Antonio Colella, Clara Colombini |
298-310 |