


default search action
7. FPS 2014: Montreal, QC, Canada
- Frédéric Cuppens, Joaquín García-Alfaro

, Nur Zincir-Heywood, Philip W. L. Fong:
Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8930, Springer 2015, ISBN 978-3-319-17039-8
Attacks and Vulnerabilities
- Brent Carrara, Carlisle Adams:

On Acoustic Covert Channels Between Air-Gapped Systems. 3-16 - Thomas Korak:

Location-Dependent EM Leakage of the ATxmega Microcontroller. 17-32
Privacy
- Naelah Alkhojandi, Ali Miri:

Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication. 35-48 - Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch:

A Maximum Variance Approach for Graph Anonymization. 49-64 - Vinh-Thong Ta

, Thibaud Antignac:
Privacy by Design: On the Conformance Between Protocols and Architectures. 65-81
Software Security and Malware Analysis
- Joe Portner, Joel Kerr, Bill Chu:

Moving Target Defense Against Cross-Site Scripting Attacks (Position Paper). 85-91 - Lionel Rivière, Marie-Laure Potet, Thanh-Ha Le, Julien Bringer, Hervé Chabanne

, Maxime Puys
:
Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks. 92-111 - Guillaume Bonfante, Jean-Yves Marion, Thanh Dinh Ta:

Malware Message Classification by Dynamic Analysis. 112-128
Network Security and Protocols
- Myria Bouhaddi

, Mohammed Said Radjef
, Kamel Adi
:
A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc Networks. 131-146 - Diego A. Ortiz-Yepes:

Optimizing TLS for Low Bandwidth Environments. 147-167 - Serguei A. Mokhov

, Michael J. Assels, Joey Paquet, Mourad Debbabi
:
Automating MAC Spoofer Evidence Gathering and Encoding for Investigations. 168-183
Access Control Models and Policy Analysis
- Daniel Servos

, Sylvia L. Osborn:
HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control. 187-204 - Luigi Logrippo:

Logical Method for Reasoning About Access Control and Data Flow Control Models. 205-220 - Ahmed Khoumsi, Wadie Krombi, Mohammed Erradi:

A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies. 221-236
Protocol Verification
- Fabio Martinelli, Francesco Santini

:
Debating Cybersecurity or Securing a Debate? - (Position Paper). 239-246 - Ali Kassem, Pascal Lafourcade

, Yassine Lakhnech:
Formal Verification of e-Reputation Protocols. 247-261 - Raphaël Jamet, Pascal Lafourcade

:
(In)Corruptibility of Routing Protocols. 262-276
Cryptographic Technologies
- Wen Wen, Binod Vaidya, Dimitrios Makrakis, Carlisle Adams:

Decentralized CRT-Based Efficient Verifiable (n, t, n) Multi-secret Sharing Scheme. 279-293 - Peeter Laud

, Jan Willemson:
Composable Oblivious Extended Permutations. 294-310 - Tim Waage, Lena Wiese

:
Benchmarking Encrypted Data Storage in HBase and Cassandra with YCSB. 311-325
Short Papers
- Fariba Haddadi, Nur Zincir-Heywood

:
Data Confirmation for Botnet Traffic Analysis. 329-336 - Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:

Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps. 337-346 - Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray:

A Responsive Defense Mechanism Against DDoS Attacks. 347-355 - Sachini S. Weerawardhana, Subhojeet Mukherjee, Indrajit Ray, Adele E. Howe:

Automated Extraction of Vulnerability Information for Home Computer Security. 356-366 - Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli:

A Formal Approach to Automatic Testing of Security Policies Specified in XACML. 367-374

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














