Search - IFIP Open Digital Library Access content directly

Filter your results

46 results
Structure: Internal structure identifier : 452410
Image document

Consistent Query Plan Generation in Secure Cooperative Data Access

Meixing Le , Krishna Kant , Sushil Jajodia
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.227-242, ⟨10.1007/978-3-662-43936-4_15⟩
Conference papers hal-01284858v1
Image document

Reducing Security Risks of Clouds Through Virtual Machine Placement

Jin Han , Wanyu Zang , Songqing Chen , Meng Yu
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.275-292, ⟨10.1007/978-3-319-61176-1_15⟩
Conference papers hal-01684346v1
Image document

Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments

Changwei Liu , Anoop Singhal , Duminda Wijesekera
16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.161-180, ⟨10.1007/978-3-030-56223-6_9⟩
Conference papers hal-03657230v1
Image document

Creating Integrated Evidence Graphs for Network Forensics

Changwei Liu , Anoop Singhal , Duminda Wijesekera
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.227-241, ⟨10.1007/978-3-642-41148-9_16⟩
Conference papers hal-01460608v1
Image document

Timely Delivery of Messages in Positive Train Control

Andre Bondi , Damindra Bandara , Michael Smith , Rajni Goel , Duminda Wijesekera
7th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2013, Washington, DC, United States. pp.139-152, ⟨10.1007/978-3-642-45330-4_10⟩
Conference papers hal-01456882v1
Image document

Enhancing the Usability of the Commercial Mobile Alert System

Paul Ngo , Duminda Wijesekera
5th International Conference Critical Infrastructure Protection (ICCIP), Mar 2011, Hanover, NH, United States. pp.137-149, ⟨10.1007/978-3-642-24864-1_10⟩
Conference papers hal-01571774v1
Image document

Enforcing Subscription-Based Authorization Policies in Cloud Scenarios

Sabrina De Capitani Di Vimercati , Sara Foresti , Sushil Jajodia , Giovanni Livraga
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.314-329, ⟨10.1007/978-3-642-31540-4_24⟩
Conference papers hal-01534756v1
Image document

Optimizing Integrity Checks for Join Queries in the Cloud

Sabrina De Capitani Di Vimercati , Sara Foresti , Sushil Jajodia , Stefano Paraboschi , Pierangela Samarati
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.33-48, ⟨10.1007/978-3-662-43936-4_3⟩
Conference papers hal-01284840v1
Image document

Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks

Ekawat Homsirikamol , Paweł Morawiecki , Marcin Rogawski , Marian Srebrny
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.56-67, ⟨10.1007/978-3-642-33260-9_4⟩
Conference papers hal-01551728v1
Image document

CASFinder: Detecting Common Attack Surface

Mengyuan Zhang , Yue Xin , Lingyu Wang , Sushil Jajodia , Anoop Singhal
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.338-358, ⟨10.1007/978-3-030-22479-0_18⟩
Conference papers hal-02384581v1
Image document

Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks

Daniel Borbor , Lingyu Wang , Sushil Jajodia , Anoop Singhal
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.295-312, ⟨10.1007/978-3-319-41483-6_21⟩
Conference papers hal-01633677v1
Image document

A Digital Media Similarity Measure for Triage of Digital Forensic Evidence

Myeong Lim , James Jones
16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.111-135, ⟨10.1007/978-3-030-56223-6_7⟩
Conference papers hal-03657240v1
Image document

Towards the Detection of Malicious URL and Domain Names Using Machine Learning

Nastaran Farhadi Ghalati , Nahid Farhady Ghalaty , José Barata
11th Doctoral Conference on Computing, Electrical and Industrial Systems (DoCEIS), Jul 2020, Costa de Caparica, Portugal. pp.109-117, ⟨10.1007/978-3-030-45124-0_10⟩
Conference papers hal-03741567v1
Image document

A Framework for Moving Target Defense Quantification

Warren Connell , Massimiliano Albanese , Sridhar Venkatesan
32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.124-138, ⟨10.1007/978-3-319-58469-0_9⟩
Conference papers hal-01648997v1
Image document

Evaluation of Temporal Resolution Effect in Remote Sensing Based Crop Phenology Detection Studies

Hu Zhao , Zhengwei Yang , Liping Di , Zhiyuan Pei
5th Computer and Computing Technologies in Agriculture (CCTA), Oct 2011, Beijing, China. pp.135-150, ⟨10.1007/978-3-642-27278-3_16⟩
Conference papers hal-01360974v1
Image document

Real-Time Covert Timing Channel Detection in Networked Virtual Environments

Anyi Liu , Jim Chen , Harry Wechsler
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.273-288, ⟨10.1007/978-3-642-41148-9_19⟩
Conference papers hal-01460611v1