Search - IFIP Open Digital Library Access content directly

Filter your results

46 results
Structure: Internal structure identifier : 452410
Image document

A Digital Media Similarity Measure for Triage of Digital Forensic Evidence

Myeong Lim , James Jones
16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.111-135, ⟨10.1007/978-3-030-56223-6_7⟩
Conference papers hal-03657240v1
Image document

A Framework for Moving Target Defense Quantification

Warren Connell , Massimiliano Albanese , Sridhar Venkatesan
32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.124-138, ⟨10.1007/978-3-319-58469-0_9⟩
Conference papers hal-01648997v1
Image document

A Layered Graphical Model for Cloud Forensic Mission Attack Impact Analysis

Changwei Liu , Anoop Singhal , Duminda Wijesekera
14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.263-289, ⟨10.1007/978-3-319-99277-8_15⟩
Conference papers hal-01988841v1
Image document

A LOGIC-BASED NETWORK FORENSIC MODEL FOR EVIDENCE ANALYSIS

Changwei Liu , Anoop Singhal , Duminda Wijesekera
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.129-145, ⟨10.1007/978-3-319-24123-4_8⟩
Conference papers hal-01449074v1
Image document

A Model Based Continuous Improvement Methodology for Sustainable Manufacturing

Sanjay Jain , Gordon Shao , Alexander Brodsky , Frank Riddick
20th Advances in Production Management Systems (APMS), Sep 2013, State College, PA, United States. pp.268-277, ⟨10.1007/978-3-642-41266-0_33⟩
Conference papers hal-01452124v1
Image document

A Probabilistic Network Forensic Model for Evidence Analysis

Changwei Liu , Anoop Singhal , Duminda Wijesekera
12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.189-210, ⟨10.1007/978-3-319-46279-0_10⟩
Conference papers hal-01758685v1
Image document

An Attack-Fault Tree Analysis of a Movable Railroad Bridge

Matthew Jablonski , Yongxin Wang , Chaitanya Yavvari , Zezhou Wang , Xiang Liu , et al.
13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.51-71, ⟨10.1007/978-3-030-34647-8_3⟩
Conference papers hal-03364561v1
Image document

An Automated Dialog System for Conducting Security Interviews for Access Control

Mohammad Ababneh , Malek Athamnah , Duminda Wijesekera , Paulo Costa
8th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2014, Arlington, United States. pp.111-125, ⟨10.1007/978-3-662-45355-1_8⟩
Conference papers hal-01386758v1
Image document

An Integrated Control and Intrusion Detection System for Smart Grid Security

Eniye Tebekaemi , Duminda Wijesekera , Paulo Costa
12th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2018, Arlington, VA, United States. pp.243-264, ⟨10.1007/978-3-030-04537-1_13⟩
Conference papers hal-02076307v1
Image document

CASFinder: Detecting Common Attack Surface

Mengyuan Zhang , Yue Xin , Lingyu Wang , Sushil Jajodia , Anoop Singhal
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.338-358, ⟨10.1007/978-3-030-22479-0_18⟩
Conference papers hal-02384581v1
Image document

Consistent Query Plan Generation in Secure Cooperative Data Access

Meixing Le , Krishna Kant , Sushil Jajodia
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.227-242, ⟨10.1007/978-3-662-43936-4_15⟩
Conference papers hal-01284858v1
Image document

Cooperative Data Access in Multi-cloud Environments

Meixing Le , Krishna Kant , Sushil Jajodia
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.14-28, ⟨10.1007/978-3-642-22348-8_4⟩
Conference papers hal-01586583v1
Image document

Creating Integrated Evidence Graphs for Network Forensics

Changwei Liu , Anoop Singhal , Duminda Wijesekera
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.227-241, ⟨10.1007/978-3-642-41148-9_16⟩
Conference papers hal-01460608v1

Data and Applications Security and Privacy XXIV

Sara Foresti , Sushil Jajodia
Springer, LNCS-6166, 2010, Lecture Notes in Computer Science, 978-3-642-13738-9. ⟨10.1007/978-3-642-13739-6⟩
Books hal-01555409v1
Image document

Detecting data manipulation attacks on the substation interlocking function using direct power feedback

Eniye Tebekaemi , Edward Colbert , Duminda Wijesekera
11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.45-62, ⟨10.1007/978-3-319-70395-4_3⟩
Conference papers hal-01819136v1
Image document

Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services

Murat Gunestas , Murad Mehmet , Duminda Wijesekera
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.133-150, ⟨10.1007/978-3-642-15506-2_10⟩
Conference papers hal-01060614v1
Image document

Determining the Forensic Data Requirements for Investigating Hypervisor Attacks

Changwei Liu , Anoop Singhal , Ramaswamy Chandramouli , Duminda Wijesekera
15th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2019, Orlando, FL, United States. pp.253-272, ⟨10.1007/978-3-030-28752-8_14⟩
Conference papers hal-02534598v1
Image document

Distributed Query Evaluation over Encrypted Data

Sabrina de Capitani Di Vimercati , Sara Foresti , Sushil Jajodia , Giovanni Livraga , Stefano Paraboschi , et al.
35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.96-114, ⟨10.1007/978-3-030-81242-3_6⟩
Conference papers hal-03677027v1
Image document

Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks

Daniel Borbor , Lingyu Wang , Sushil Jajodia , Anoop Singhal
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.295-312, ⟨10.1007/978-3-319-41483-6_21⟩
Conference papers hal-01633677v1
Image document

Emergency Messages in the Commercial Mobile Alert System

Paul Ngo , Duminda Wijesekera
6th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2012, Washington, DC, United States. pp.171-184, ⟨10.1007/978-3-642-35764-0_13⟩
Conference papers hal-01483812v1
Image document

Enforcing Subscription-Based Authorization Policies in Cloud Scenarios

Sabrina De Capitani Di Vimercati , Sara Foresti , Sushil Jajodia , Giovanni Livraga
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.314-329, ⟨10.1007/978-3-642-31540-4_24⟩
Conference papers hal-01534756v1
Image document

Enhancing the Usability of the Commercial Mobile Alert System

Paul Ngo , Duminda Wijesekera
5th International Conference Critical Infrastructure Protection (ICCIP), Mar 2011, Hanover, NH, United States. pp.137-149, ⟨10.1007/978-3-642-24864-1_10⟩
Conference papers hal-01571774v1
Image document

Evaluating WELI: A Wrist-Worn Application to Assist Young Adults with Neurodevelopmental Disorders in Inclusive Classes

Hui Zheng , Vivian Genaro Motti , Kudirat Giwa-Lawal , Anna Evmenova , Heidi Graff
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.114-134, ⟨10.1007/978-3-030-29384-0_7⟩
Conference papers hal-02544603v1
Image document

Evaluation of Temporal Resolution Effect in Remote Sensing Based Crop Phenology Detection Studies

Hu Zhao , Zhengwei Yang , Liping Di , Zhiyuan Pei
5th Computer and Computing Technologies in Agriculture (CCTA), Oct 2011, Beijing, China. pp.135-150, ⟨10.1007/978-3-642-27278-3_16⟩
Conference papers hal-01360974v1
Image document

Extending Loose Associations to Multiple Fragments

Sabrina De Capitani Di Vimercati , Sara Foresti , Sushil Jajodia , Giovanni Livraga , Stefano Paraboschi , et al.
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.1-16, ⟨10.1007/978-3-642-39256-6_1⟩
Conference papers hal-01490711v1
Image document

Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments

Changwei Liu , Anoop Singhal , Duminda Wijesekera
16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.161-180, ⟨10.1007/978-3-030-56223-6_9⟩
Conference papers hal-03657230v1
Image document

Guiding Supervised Learning by Bio-Ontologies in Medical Data Analysis

Janusz Wojtusiak , Hua Min , Eman Elashkar , Hedyeh Mobahi
4th IFIP International Workshop on Artificial Intelligence for Knowledge Management (AI4KM), Jul 2016, New York, NY, United States. pp.1-18, ⟨10.1007/978-3-319-92928-6_1⟩
Conference papers hal-01950012v1

ICT Systems Security and Privacy Protection

Nora Cuppens-Boulahia , Frédéric Cuppens , Sushil Jajodia , Anas Abou El Kalam , Thierry Sans
Springer, AICT-428, 2014, IFIP Advances in Information and Communication Technology, 978-3-642-55414-8. ⟨10.1007/978-3-642-55415-5⟩
Books hal-01370409v1
Image document

Identifying Evidence for Cloud Forensic Analysis

Changwei Liu , Anoop Singhal , Duminda Wijesekera
13th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2017, Orlando, FL, United States. pp.111-130, ⟨10.1007/978-3-319-67208-3_7⟩
Conference papers hal-01716407v1

Information Security Theory and Practice

Raja Naeem Akram , Sushil Jajodia
Raja Naeem Akram; Sushil Jajodia. Springer, LNCS-9311, 2015, Information Security Theory and Practice, 978-3-319-24017-6. ⟨10.1007/978-3-319-24018-3⟩
Books hal-01442559v1