Full Text Documents

Search


Table of Contents
Open Research Problems in Network Security
Jan Camenisch, Valentin Kisimov, Maria Dubovitskaya (Eds.)
Front Matter

Part 1: Invited Talk and Scheduling


Securing the Internet: Fact or Fiction?
Basie Solms
1-8
Open Research Questions of Privacy-Enhanced Event Scheduling
Benjamin Kellermann
9-19

Part 2: Adversaries


Event Handoff Unobservability in WSN
Stefano Ortolani, Mauro Conti, Bruno Crispo, Roberto Pietro
20-28
Emerging and Future Cyber Threats to Critical Systems
Edita Djambazova, Magnus Almgren, Kiril Dimitrov, Erland Jonsson
29-46
Adversarial Security: Getting to the Root of the Problem
Raphael Phan, John Whitley, David Parish
47-55
Practical Experiences with Purenet, a Self-Learning Malware Prevention System
Alapan Arnab, Tobias Martin, Andrew Hutchison
56-69
A Biometrics-Based Solution to Combat SIM Swap Fraud
Louis Jordaan, Basie Solms
70-87
Are BGP Routers Open to Attack? An Experiment
Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna
88-103

Part 3: Secure Processes


Securing the Core University Business Processes
Veliko Ivanov, Monika Tzaneva, Alexandra Murdjeva, Valentin Kisimov
104-116
Some Technologies for Information Security Protection in Weak-Controlled Computer Systems and Their Applicability for eGovernment Services Users
Anton Palazov
117-122
Real-Time System for Assessing the Information Security of Computer Networks
Dimitrina Polimirova, Eugene Nickolov
123-133
Evidential Notions of Defensibility and Admissibility with Property Preservation
Raphael Phan, Ahmad Amran, John Whitley, David Parish
134-139

Part 4: Security for Clouds


Cloud Infrastructure Security
Dimiter Velev, Plamena Zlateva
140-148
Security and Privacy Implications of Cloud Computing – Lost in the Cloud
Vassilka Tchifilionova
149-158
The Need for Interoperable Reputation Systems
Sandra Steinbrecher
159-169

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/