


default search action
MMM-ACNS 2017: Warsaw, Poland
- Jacek Rak, John Bay, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin, Krzysztof Szczypiorski

:
Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings. Lecture Notes in Computer Science 10446, Springer 2017, ISBN 978-3-319-65126-2
Invited Papers
- Janusz Górski

, Katarzyna Lukasiewicz:
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile. 3-15 - Andrew Hutchison:

Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking Models. 16-27 - Alexander A. Grusho

:
Data Mining and Information Security. 28-33
Critical Infrastructure Protection and Visualization
- Laurens Lemaire, Jan Vossaert, Bart De Decker, Vincent Naessens:

Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems. 37-49 - Evgenia Novikova

, Ivan Murenin
:
Visualization-Driven Approach to Anomaly Detection in the Movement of Critical Infrastructure. 50-61 - Emrah Korkmaz, Matthew Davis, Andrey M. Dolgikh, Victor A. Skormin:

Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs. 62-74 - Maxim Kolomeec

, Gustavo Gonzalez Granadillo, Elena Doynikova
, Andrey Chechulin
, Igor V. Kotenko
, Hervé Debar
:
Choosing Models for Security Metrics Visualization. 75-87
Security and Resilience of Network Systems
- Deeraj Nagothu, Andrey M. Dolgikh:

iCrawl: A Visual High Interaction Web Crawler. 91-103 - Leonard J. Popyack, Jay Biernat:

Race Condition Faults in Multi-core Systems. 104-114 - Vasileios Gkioulos, Stephen D. Wolthusen:

Security Requirements for the Deployment of Services Across Tactical SOA. 115-127
Adaptive Security
- Jerzy Konorski

, Karol Rydzewski:
Nodal Cooperation Equilibrium Analysis in Multi-hop Wireless Ad Hoc Networks with a Reputation System. 131-142 - Alexander Branitskiy, Igor V. Kotenko

:
Network Anomaly Detection Based on an Ensemble of Adaptive Binary Classifiers. 143-157 - Albert Sitek, Zbigniew Kotulski

:
Cardholder's Reputation System for Contextual Risk Management in Payment Transactions. 158-170 - Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen

, Jouni Isoaho:
Towards Self-aware Approach for Mobile Devices Security. 171-182
Anti-malware Techniques: Detection, Analysis, Prevention
- Matthew Davis, Emrah Korkmaz, Andrey M. Dolgikh, Victor A. Skormin:

Resident Security System for Government/Industry Owned Computers. 185-194 - Anton Kopeikin, Arnur G. Tokhtabayev, Nurlan Tashatov

, Dina Satybaldina
:
tLab: A System Enabling Malware Clustering Based on Suspicious Activity Trees. 195-210 - Arnur G. Tokhtabayev, Anton Kopeikin, Nurlan Tashatov

, Dina Satybaldina
:
Malware Analysis and Detection via Activity Trees in User-Dependent Environment. 211-222 - Hubert Ostap

, Ryszard Antkiewicz
:
A Concept of Clustering-Based Method for Botnet Detection. 223-234 - Stig Fr. Mjølsnes

, Ruxandra F. Olimid
:
Easy 4G/LTE IMSI Catchers for Non-Programmers. 235-246 - Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, Kai Zeng:

Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis. 247-259 - An Braeken

, Sergey Bezzateev, Abdellah Touhafi
, Natalia Voloshina
:
HEPPA: Highly Efficient Privacy Preserving Authentication for ITS. 260-271
Applied Cryptography
- Roberto Metere

, Changyu Dong:
Automated Cryptographic Analysis of the Pedersen Commitment Scheme. 275-287 - Valery I. Korzhik, Ivan Fedyanin, Artur Godlewski, Guillermo Morales-Luna:

Steganalysis Based on Statistical Properties of the Encrypted Messages. 288-298 - Marcin Niemiec

, Maciej Francikiewicz:
Security Assessment of Cryptographic Algorithms. 299-312 - Vasileios Mavroeidis, Mathew Nicho

:
Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks. 313-324
New Ideas and Paradigms for Security
- Steven Drager, Janusz Zalewski:

A Novel and Unifying View of Trustworthiness in Cyberphysical Systems. 327-338 - Alexander A. Grusho

, Nick A. Grusho
, Michael I. Zabezhailo, Alexander Zatsarinny
, Elena E. Timonina
:
Information Security of SDN on the Basis of Meta Data. 339-347 - Omar Iraqi

, Hanan El Bakkali:
Toward Third-Party Immune Applications. 348-359

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














