Search - IFIP Open Digital Library Access content directly

Filter your results

46 results
Structure: Internal structure identifier : 452410
Image document

Optimizing Integrity Checks for Join Queries in the Cloud

Sabrina De Capitani Di Vimercati , Sara Foresti , Sushil Jajodia , Stefano Paraboschi , Pierangela Samarati
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.33-48, ⟨10.1007/978-3-662-43936-4_3⟩
Conference papers hal-01284840v1
Image document

Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks

Ekawat Homsirikamol , Paweł Morawiecki , Marcin Rogawski , Marian Srebrny
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.56-67, ⟨10.1007/978-3-642-33260-9_4⟩
Conference papers hal-01551728v1
Image document

CASFinder: Detecting Common Attack Surface

Mengyuan Zhang , Yue Xin , Lingyu Wang , Sushil Jajodia , Anoop Singhal
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.338-358, ⟨10.1007/978-3-030-22479-0_18⟩
Conference papers hal-02384581v1
Image document

Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks

Daniel Borbor , Lingyu Wang , Sushil Jajodia , Anoop Singhal
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.295-312, ⟨10.1007/978-3-319-41483-6_21⟩
Conference papers hal-01633677v1
Image document

A Digital Media Similarity Measure for Triage of Digital Forensic Evidence

Myeong Lim , James Jones
16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.111-135, ⟨10.1007/978-3-030-56223-6_7⟩
Conference papers hal-03657240v1
Image document

Towards the Detection of Malicious URL and Domain Names Using Machine Learning

Nastaran Farhadi Ghalati , Nahid Farhady Ghalaty , José Barata
11th Doctoral Conference on Computing, Electrical and Industrial Systems (DoCEIS), Jul 2020, Costa de Caparica, Portugal. pp.109-117, ⟨10.1007/978-3-030-45124-0_10⟩
Conference papers hal-03741567v1
Image document

A Framework for Moving Target Defense Quantification

Warren Connell , Massimiliano Albanese , Sridhar Venkatesan
32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.124-138, ⟨10.1007/978-3-319-58469-0_9⟩
Conference papers hal-01648997v1
Image document

Evaluation of Temporal Resolution Effect in Remote Sensing Based Crop Phenology Detection Studies

Hu Zhao , Zhengwei Yang , Liping Di , Zhiyuan Pei
5th Computer and Computing Technologies in Agriculture (CCTA), Oct 2011, Beijing, China. pp.135-150, ⟨10.1007/978-3-642-27278-3_16⟩
Conference papers hal-01360974v1
Image document

Real-Time Covert Timing Channel Detection in Networked Virtual Environments

Anyi Liu , Jim Chen , Harry Wechsler
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.273-288, ⟨10.1007/978-3-642-41148-9_19⟩
Conference papers hal-01460611v1
Image document

Identifying Evidence for Cloud Forensic Analysis

Changwei Liu , Anoop Singhal , Duminda Wijesekera
13th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2017, Orlando, FL, United States. pp.111-130, ⟨10.1007/978-3-319-67208-3_7⟩
Conference papers hal-01716407v1
Image document

Distributed Query Evaluation over Encrypted Data

Sabrina de Capitani Di Vimercati , Sara Foresti , Sushil Jajodia , Giovanni Livraga , Stefano Paraboschi , et al.
35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.96-114, ⟨10.1007/978-3-030-81242-3_6⟩
Conference papers hal-03677027v1
Image document

Support for Write Privileges on Outsourced Data

Sabrina De Capitani Di Vimercati , Sara Foresti , Sushil Jajodia , Stefano Paraboschi , Pierangela Samarati
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.199-210, ⟨10.1007/978-3-642-30436-1_17⟩
Conference papers hal-01518257v1
Image document

Integrity for Approximate Joins on Untrusted Computational Servers

Sabrina de Capitani Di Vimercati , Sara Foresti , Sushil Jajodia , Stefano Paraboschi , Pierangela Samarati
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.446-459, ⟨10.1007/978-3-319-18467-8_30⟩
Conference papers hal-01345135v1
Image document

An Automated Dialog System for Conducting Security Interviews for Access Control

Mohammad Ababneh , Malek Athamnah , Duminda Wijesekera , Paulo Costa
8th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2014, Arlington, United States. pp.111-125, ⟨10.1007/978-3-662-45355-1_8⟩
Conference papers hal-01386758v1
Image document

A LOGIC-BASED NETWORK FORENSIC MODEL FOR EVIDENCE ANALYSIS

Changwei Liu , Anoop Singhal , Duminda Wijesekera
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.129-145, ⟨10.1007/978-3-319-24123-4_8⟩
Conference papers hal-01449074v1
Image document

Cooperative Data Access in Multi-cloud Environments

Meixing Le , Krishna Kant , Sushil Jajodia
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.14-28, ⟨10.1007/978-3-642-22348-8_4⟩
Conference papers hal-01586583v1
Image document

Guiding Supervised Learning by Bio-Ontologies in Medical Data Analysis

Janusz Wojtusiak , Hua Min , Eman Elashkar , Hedyeh Mobahi
4th IFIP International Workshop on Artificial Intelligence for Knowledge Management (AI4KM), Jul 2016, New York, NY, United States. pp.1-18, ⟨10.1007/978-3-319-92928-6_1⟩
Conference papers hal-01950012v1
Image document

Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services

Murat Gunestas , Murad Mehmet , Duminda Wijesekera
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.133-150, ⟨10.1007/978-3-642-15506-2_10⟩
Conference papers hal-01060614v1
Image document

Emergency Messages in the Commercial Mobile Alert System

Paul Ngo , Duminda Wijesekera
6th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2012, Washington, DC, United States. pp.171-184, ⟨10.1007/978-3-642-35764-0_13⟩
Conference papers hal-01483812v1
Image document

Real-Time Detection of Covert Channels in Highly Virtualized Environments

Anyi Liu , Jim Chen , Li Yang
5th International Conference Critical Infrastructure Protection (ICCIP), Mar 2011, Hanover, NH, United States. pp.151-164, ⟨10.1007/978-3-642-24864-1_11⟩
Conference papers hal-01571783v1
Image document

Detecting data manipulation attacks on the substation interlocking function using direct power feedback

Eniye Tebekaemi , Edward Colbert , Duminda Wijesekera
11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.45-62, ⟨10.1007/978-3-319-70395-4_3⟩
Conference papers hal-01819136v1
Image document

A Layered Graphical Model for Cloud Forensic Mission Attack Impact Analysis

Changwei Liu , Anoop Singhal , Duminda Wijesekera
14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.263-289, ⟨10.1007/978-3-319-99277-8_15⟩
Conference papers hal-01988841v1

Data and Applications Security and Privacy XXIV

Sara Foresti , Sushil Jajodia
Springer, LNCS-6166, 2010, Lecture Notes in Computer Science, 978-3-642-13738-9. ⟨10.1007/978-3-642-13739-6⟩
Books hal-01555409v1

Information Security Theory and Practice

Raja Naeem Akram , Sushil Jajodia
Raja Naeem Akram; Sushil Jajodia. Springer, LNCS-9311, 2015, Information Security Theory and Practice, 978-3-319-24017-6. ⟨10.1007/978-3-319-24018-3⟩
Books hal-01442559v1
Image document

Rule Enforcement with Third Parties in Secure Cooperative Data Access

Meixing Le , Krishna Kant , Sushil Jajodia
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.282-288, ⟨10.1007/978-3-642-39256-6_20⟩
Conference papers hal-01490712v1
Image document

Using parallel distributed processing to reduce the computational time of digital media similarity measures

Myeong Lim , James Jones
17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.65-87, ⟨10.1007/978-3-030-88381-2_4⟩
Conference papers hal-03764373v1
Image document

An Integrated Control and Intrusion Detection System for Smart Grid Security

Eniye Tebekaemi , Duminda Wijesekera , Paulo Costa
12th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2018, Arlington, VA, United States. pp.243-264, ⟨10.1007/978-3-030-04537-1_13⟩
Conference papers hal-02076307v1
Image document

Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options

Daniel Borbor , Lingyu Wang , Sushil Jajodia , Anoop Singhal
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.509-528, ⟨10.1007/978-3-319-61176-1_28⟩
Conference papers hal-01684351v1
Image document

Determining the Forensic Data Requirements for Investigating Hypervisor Attacks

Changwei Liu , Anoop Singhal , Ramaswamy Chandramouli , Duminda Wijesekera
15th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2019, Orlando, FL, United States. pp.253-272, ⟨10.1007/978-3-030-28752-8_14⟩
Conference papers hal-02534598v1

ICT Systems Security and Privacy Protection

Nora Cuppens-Boulahia , Frédéric Cuppens , Sushil Jajodia , Anas Abou El Kalam , Thierry Sans
Springer, AICT-428, 2014, IFIP Advances in Information and Communication Technology, 978-3-642-55414-8. ⟨10.1007/978-3-642-55415-5⟩
Books hal-01370409v1