Skip to Main content Skip to Navigation
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Availability, Reliability, and Security in Information Systems
Stephanie Teufel, Tjoa A Min, IlsunYou, EdgarWeippl (Eds.)
Front Matter

Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Information Systems (CD-ARES 2014)


Knowledge Management

Argumentation-Based Group Decision Support for Collectivist Communities
Marijke Coetzee
1-16
A Knowledge Integration Approach for Safety-Critical Software Development and Operation Based on the Method Architecture
Shuichiro Yamamoto
17-28
Metrics-Based Incremental Determinization of Finite Automata
Sergiu Balan, Gianfranco Lamperti, Michele Scandale
29-44

Mobile and Social Computing

Mobile Computing is not Always Advantageous: Lessons Learned from a Real-World Case Study in a Hospital
Andreas Holzinger, Bettina Sommerauer, Peter Spitzer, Simon Juric, Borut Zalik, Matjaz Debevc, Chantal Lidynia, André Valdez, Carsten Roecker, Martina Ziefle
110-123
Towards Interactive Visualization of Longitudinal Data to Support Knowledge Discovery on Multi-touch Tablet Computers
Andreas Holzinger, Michael Schwarz, Bernhard Ofner, Fleur Jeanquartier, Andre Calero-Valdez, Carsten Roecker, Martina Ziefle
124-137
Semantic-Aware Mashups for Personal Resources in SemanticLIFE and SocialLIFE
Sao-Khue Vo, Amin Anjomshoaa, A. Tjoa
138-154

Software Security

Towards Developing Secure Software Using Problem-Oriented Security Patterns
Azadeh Alebrahim, Maritta Heisel
45-62
Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services
Evgenia Novikova, Igor Kotenko
63-78
A Review of Security Requirements Engineering Methods with Respect to Risk Analysis and Model-Driven Engineering
Denisse Muñante, Vanea Chiprianov, Laurent Gallon, Philippe Aniorté
79-93
Adaptive User-Centered Security
Sven Wohlgemuth
94-109

4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2014)


Trust Extension Protocol for Authentication in Networks Oriented to Management (TEPANOM)
Antonio Jara
155-165
Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters
Yi-Li Huang, Fang-Yie Leu, Ilsun You, Jing-Hao Yang
166-171
Crypto-Biometric Models for Information Secrecy
Marek Ogiela, Lidia Ogiela, Urszula Ogiela
172-178
One-Time Biometrics for Online Banking and Electronic Payment Authentication
Aude Plateaux, Patrick Lacharme, Christophe Rosenberger, Audun Jøsang
179-193
Expert Knowledge Based Design and Verification of Secure Systems with Embedded Devices
Vasily Desnitsky, Igor Kotenko
194-210
PrivacyFrost2: A Efficient Data Anonymization Tool Based on Scoring Functions
Shinsaku Kiyomoto, Yutaka Miyake
211-225
Detection of Malicious Web Pages Using System Calls Sequences
Gerardo Canfora, Eric Medvet, Francesco Mercaldo, Corrado Visaggio
226-238
Risk Reduction Overview
Hellen Havinga, Olivier Sessink
239-249
Towards Analysis of Sophisticated Attacks, with Conditional Probability, Genetic Algorithm and a Crime Function
Wolfgang Boehmer
250-256
A High-Speed Network Content Filtering System
Guohong Zhao, Shuhui Chen, Baokang Zhao, Ilsun You, Jinshu Su, Wanrong Yu
257-269
Feature Grouping for Intrusion Detection System Based on Hierarchical Clustering
Jingping Song, Zhiliang Zhu, Chris Price
270-280
Towards a Key Consuming Detection in QKD-VoIP Systems
Guohong Zhao, Wanrong Yu, Baokang Zhao, Chunqing Wu
281-285
A Structure P2P Based Web Services Registry with Access and Control
He Qian, Zhao Baokang, Long Yunjian, Su Jinshu, Ilsun You
286-297
Amplification DDoS Attacks: Emerging Threats and Defense Strategies
Antonio Colella, Clara Colombini
298-310

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/