ComputationWorld 2018
February 18 - 22, 2018 - Barcelona, Spain

  • SERVICE COMPUTATION 2018, The Tenth International Conference on Advanced Service Computing
  • CLOUD COMPUTING 2018, The Ninth International Conference on Cloud Computing, GRIDs, and Virtualization
  • FUTURE COMPUTING 2018, The Tenth International Conference on Future Computational Technologies and Applications
  • COGNITIVE 2018, The Tenth International Conference on Advanced Cognitive Technologies and Applications
  • ADAPTIVE 2018, The Tenth International Conference on Adaptive and Self-Adaptive Systems and Applications
  • CONTENT 2018, The Tenth International Conference on Creative Content Technologies
  • PATTERNS 2018, The Tenth International Conference on Pervasive Patterns and Applications
  • COMPUTATION TOOLS 2018, The Ninth International Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking
  • BUSTECH 2018, The Eighth International Conference on Business Intelligence and Technology

DigitalWorld 2018
March 25 - 29, 2018 - Rome, Italy

  • ICDS 2018, The Twelfth International Conference on Digital Society and eGovernments
  • ACHI 2018, The Eleventh International Conference on Advances in Computer-Human Interactions
  • GEOProcessing 2018, The Tenth International Conference on Advanced Geographic Information Systems, Applications, and Services
  • eTELEMED 2018, The Tenth International Conference on eHealth, Telemedicine, and Social Medicine
  • eLmL 2018, The Tenth International Conference on Mobile, Hybrid, and On-line Learning
  • eKNOW 2018, The Tenth International Conference on Information, Process, and Knowledge Management
  • ALLSENSORS 2018, The Third International Conference on Advances in Sensors, Actuators, Metering and Sensing
  • SMART ACCESSIBILITY 2018, The Third International Conference on Universal Accessibility in the Internet of Things and Smart Environments

NexComm 2018
April 22 - 26, 2018 - Athens, Greece

  • ICDT 2018, The Thirteenth International Conference on Digital Telecommunications
  • SPACOMM 2018, The Tenth International Conference on Advances in Satellite and Space Communications
  • ICN 2018, The Seventeenth International Conference on Networks
    • SOFTNETWORKING 2018, The International Symposium on Advances in Software Defined Networking and Network Functions Virtualization
  • ICONS 2018, The Thirteenth International Conference on Systems
  • MMEDIA 2018, The Tenth International Conference on Advances in Multimedia
  • PESARO 2018, The Eighth International Conference on Performance, Safety and Robustness in Complex Systems and Applications
  • CTRQ 2018, The Eleventh International Conference on Communication Theory, Reliability, and Quality of Service
  • COCORA 2018, The Eighth International Conference on Advances in Cognitive Radio
  • ALLDATA 2018, The Fourth International Conference on Big Data, Small Data, Linked Data and Open Data
    • KESA 2018, The International Workshop on Knowledge Extraction and Semantic Annotation
  • SOFTENG 2018, The Fourth International Conference on Advances and Trends in Software Engineering

InfoSys 2018
May 20 - 24, 2018 - Nice, France

  • ICNS 2018, The Fourteenth International Conference on Networking and Services
  • ICAS 2018, The Fourteenth International Conference on Autonomic and Autonomous Systems
  • ENERGY 2018, The Eighth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies
  • WEB 2018, The Sixth International Conference on Building and Exploring Web Based Environments
  • DBKDA 2018, The Tenth International Conference on Advances in Databases, Knowledge, and Data Applications
    • GraphSM 2018, The Fifth International Workshop on Large-scale Graph Analysis, Management and Applications
  • SIGNAL 2018, The Third International Conference on Advances in Signal, Image and Video Processing

BioSciencesWorld 2018
May 20 - 24, 2018 - Nice, France

  • BIOTECHNO 2018, The Tenth International Conference on Bioinformatics, Biocomputational Systems and Biotechnologies
  • BIONATURE 2018, The Ninth International Conference on Bioenvironment, Biodiversity and Renewable Energies

DataSys 2018
July 22 - 26, 2018- Barcelona, Spain

  • AICT 2018, The Fourteenth Advanced International Conference on Telecommunications
  • ICIW 2018, The Thirteenth International Conference on Internet and Web Applications and Services
  • ICIMP 2018, The Thirteenth International Conference on Internet Monitoring and Protection
  • SMART 2018, The Seventh International Conference on Smart Cities, Systems, Devices and Technologies
  • IMMM 2018, The Eighth International Conference on Advances in Information Mining and Management
  • INFOCOMP 2018, The Eighth International Conference on Advanced Communications and Computation
    • MODOPT 2018, The International Symposium on Modeling and Optimization
  • MOBILITY 2018, The Eighth International Conference on Mobile Services, Resources, and Users
  • SPWID 2018, The Fourth International Conference on Smart Portable, Wearable, Implantable and Disability-oriented Devices and Systems
  • ACCSE 2018, The Third International Conference on Advances in Computation, Communications and Services

(to be completed)

 


ThinkMind // SECURWARE 2011, The Fifth International Conference on Emerging Security Information, Systems and Technologies

Type: conference

Download: SECURWARE 2011 cover page

Download: SECURWARE 2011 foreword page

Download: SECURWARE 2011 committee page

Download: SECURWARE 2011 table of contents

Download: SECURWARE 2011 full proceedings

Notes: IARIA Conference.

Editors:
Masaru Takesue, Hosei University, Japan
Rainer Falk, Siemens AG - München, Germany

Event editions: - there are 7 editions.

ISSN: 2162-2116

ISBN: 978-1-61208-146-5

Location: Nice/Saint Laurent du Var, France

Dates: from August 21, 2011 to August 27, 2011

Articles: there are 21 articles

Lightweight Detection of Spamming Botnets
Masaru Takesue
keywords: Spam, bot, botnet, clustering, fingerprint, spam-specific word

Detecting & Defeating Split Personality Malware
Kalpa Vishnani, Alwyn R. Pais, and Radhesh Mohandas
keywords: - Detecting Virtual Machines, Vmware, Analysis Aware Malware, Split Personality Malware, guest OS, host OS.

Proposal of n-gram Based Algorithm for Malware Classification
Abdurrahman Pektaş, Mehmet Eriş, and Tankut Acarman
keywords: malware; n-gram based; classification

Protecting Remote Component Authentication
Rainer Falk and Steffen Fries
keywords: device authentication, counterfeiting, tunneled authentication

Extended Fault Based Attack against Discrete Logarithm Based Public Key Cryptosystems
Sung-Ming Yen and Chi-Dian Wu
keywords: exponentiation algorithm; hardware fault attack; physical attack; public key cryptosystem

Implementations of Block Cipher SEED on Smartphone Operating Systems
HwanJin Lee, DongHoon Shin, and Hyun-Chul Jung
keywords: SEED; Windows mobile; iOS; Android; implementation; blockcipher

An Approach for Enhancing the Security of Remotely Accessible, Sensitive Services with On-Site Monitoring
Tuomas Kekkonen and Teemu Kanstrén
keywords: network monitoring, security situation awareness, security management, security policy, network capture

Toward Engineering of Security of Information Systems: The Security Acts
Wilson Goudalo
keywords: security acts; security engineering; BPM; enterprise information system security.

Establishing Authentication Trust in Open Environment Using Social Approach
Hidehito Gomi
keywords: trust metric, identity federation, delegation

Migration towards a more secure authentication in the Session Initiation Protocol
Lars Strand, Wolfgang Leister, and Alan Duric
keywords: VoIP, SIP, authentication, PAKE, SASL

PASER: Position Aware Secure and Efficient Route Discovery Protocol for Wireless Mesh Networks
Mohamad Sbeiti, Andreas Wolff, and Christian Wietfeld
keywords: Secure routing protocols; wireless mesh networks; emergency and rescue operations.

Reliablity and Survivability of Wireless Sensor Network Using Security Adaptation Reference Monitor (SARM)
Tewfiq El Maliki and Jean-Marc Seigneur
keywords: Framework, Autonomic, Security adaptation, Sinkhole, Sensor Network

Federated Identity Management for Android
Anders Fongen
keywords: Identity management, Android, Authentication

A Scalable Architecture for Countering Network-Centric Insider Threats
Faisal M. Sibai and Daniel A. Menasce
keywords: insider threat; scalability; network security.

A Framework for Protocol Vulnerability Condition Detection
Yuxin Meng and Lam for Kwok
keywords: intrusion detection; vulnerability analysis

Access Control in BitTorrent P2P Networks Using the Enhanced Closed Swarms Protocol
Vladimir Jovanovikj, Dušan Gabrijelčič, and Tomaž Klobučar
keywords: access control, P2P, BitTorrent, flexible policy, Closed Swarms

Enhancing System-Called-Based Intrusion Detection with Protocol Context
Anyi Liu, Xuxian Jiang, Jing Jin, Feng Mao, and Jim Chen
keywords: Intrusion detection; System calls; Protocol specification; Context

StegoWeb: Towards the Ideal Private Web Content Publishing Tool
Tamás Besenyei, Ádám Máté Földes, Gábor György Gulyás, and Sándor Imre
keywords: Web 2.0; web privacy; user content; steganography

End User Computing Environments for Improved Information Security
Pankaj Goyal
keywords: information security; data loss prevention; insider threats; end-user computing environment

Using Avatars for Improved Authentication with Challenge Questions
Nicholas Micallef and Mike Just
keywords: authentication, avatar, security, usability

Application of Scenario-driven Role Engineering to the MinaBASE Process Knowledge Database
Daniel Kimmig, Andreas Schmidt, Klaus Bittner, and Markus Dickerhof
keywords: Data confidentiality and integrity;knowledge management; RBAC;

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.