ComputationWorld 2019
May 05, 2019 to May 09, 2019 - Venice, Italy

  • SERVICE COMPUTATION 2019, The Eleventh International Conference on Advanced Service Computing
  • CLOUD COMPUTING 2019, The Tenth International Conference on Cloud Computing, GRIDs, and Virtualization
  • FUTURE COMPUTING 2019, The Eleventh International Conference on Future Computational Technologies and Applications
  • COGNITIVE 2019, The Eleventh International Conference on Advanced Cognitive Technologies and Applications
  • ADAPTIVE 2019, The Eleventh International Conference on Adaptive and Self-Adaptive Systems and Applications
  • CONTENT 2019, The Eleventh International Conference on Creative Content Technologies
  • PATTERNS 2019, The Eleventh International Conference on Pervasive Patterns and Applications
  • COMPUTATION TOOLS 2019, The Tenth International Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking
  • BUSTECH 2019, The Ninth International Conference on Business Intelligence and Technology

InfoSys 2019
June 02, 2019 to June 06, 2019 - Athens, Greece

  • ICNS 2019, The Fifteenth International Conference on Networking and Services
  • ICAS 2019, The Fifteenth International Conference on Autonomic and Autonomous Systems
  • ENERGY 2019, The Ninth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies
  • WEB 2019, The Seventh International Conference on Building and Exploring Web Based Environments
  • DBKDA 2019, The Eleventh International Conference on Advances in Databases, Knowledge, and Data Applications
  • SIGNAL 2019, The Fourth International Conference on Advances in Signal, Image and Video Processing
  • BIOTECHNO 2019, The Eleventh International Conference on Bioinformatics, Biocomputational Systems and Biotechnologies

InfoWare 2019
June 30, 2019 to July 04, 2019 - Rome, Italy

  • ICCGI 2019, The Fourteenth International Multi-Conference on Computing in the Global Information Technology
  • ICWMC 2019, The Fifteenth International Conference on Wireless and Mobile Communications
  • VEHICULAR 2019, The Eighth International Conference on Advances in Vehicular Systems, Technologies and Applications
  • INTERNET 2019, The Eleventh International Conference on Evolving Internet
  • COLLA 2019, The Ninth International Conference on Advanced Collaborative Networks, Systems and Applications
  • INTELLI 2019, The Eighth International Conference on Intelligent Systems and Applications
  • VISUAL 2019, The Fourth International Conference on Applications and Systems of Visual Paradigms
  • HUSO 2019, The Fifth International Conference on Human and Social Analytics
  • BRAININFO 2019, The Fourth International Conference on Neuroscience and Cognitive Brain Information

DataSys 2019
July 28, 2019 to August 01, 2019 - Nice, France

  • AICT 2019, The Fifteenth Advanced International Conference on Telecommunications
  • ICIW 2019, The Fourteenth International Conference on Internet and Web Applications and Services
  • ICIMP 2019, The Fourteenth International Conference on Internet Monitoring and Protection
  • SMART 2019, The Eighth International Conference on Smart Cities, Systems, Devices and Technologies
  • IMMM 2019, The Ninth International Conference on Advances in Information Mining and Management
  • INFOCOMP 2019, The Ninth International Conference on Advanced Communications and Computation
  • MOBILITY 2019, The Ninth International Conference on Mobile Services, Resources, and Users
  • SPWID 2019, The Fifth International Conference on Smart Portable, Wearable, Implantable and Disability-oriented Devices and Systems
  • ACCSE 2019, The Fourth International Conference on Advances in Computation, Communications and Services

NexTech 2019
September 22, 2019 to September 26, 2019 - Porto, Portugal

  • UBICOMM 2019, The Thirteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2019, The Thirteenth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2019, The Thirteenth International Conference on Advances in Semantic Processing
  • AMBIENT 2019, The Ninth International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2019, The Eleventh International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2019, The Eighth International Conference on Data Analytics
  • GLOBAL HEALTH 2019, The Eighth International Conference on Global Health Challenges
  • CYBER 2019, The Fourth International Conference on Cyber-Technologies and Cyber-Systems

NetWare 2019
October 27, 2019 to October 31, 2019 - Nice, France

  • SENSORCOMM 2019, The Thirteenth International Conference on Sensor Technologies and Applications
  • SENSORDEVICES 2019, The Tenth International Conference on Sensor Device Technologies and Applications
  • SECURWARE 2019, The Thirteenth International Conference on Emerging Security Information, Systems and Technologies
  • AFIN 2019, The Eleventh International Conference on Advances in Future Internet
  • CENICS 2019, The Twelfth International Conference on Advances in Circuits, Electronics and Micro-electronics
  • ICQNM 2019, The Thirteenth International Conference on Quantum, Nano/Bio, and Micro Technologies
  • FASSI 2019, The Fifth International Conference on Fundamentals and Advances in Software Systems Integration
  • GREEN 2019, The Fourth International Conference on Green Communications, Computing and Technologies

SoftNet 2019
November 24, 2019 to November 28, 2019 - Valencia, Spain

  • ICSEA 2019, The Fourteenth International Conference on Software Engineering Advances
  • ICSNC 2019, The Fourteenth International Conference on Systems and Networks Communications
  • CENTRIC 2019, The Twelfth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2019, The Eleventh International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2019, The Eleventh International Conference on Advances in System Simulation
  • SOTICS 2019, The Ninth International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2019, The Eighth International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2019, The Fourth International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

 


ThinkMind // SECURWARE 2017, The Eleventh International Conference on Emerging Security Information, Systems and Technologies

Type: conference

Download: SECURWARE 2017 cover page

Download: SECURWARE 2017 foreword page

Download: SECURWARE 2017 committee page

Download: SECURWARE 2017 table of contents

Download: SECURWARE 2017 full proceedings

Notes: IARIA Conference.

Editors:
Carla Merkle Westphall, Federal University of Santa Catarina, Brazil
Hans-Joachim Hof, Technical University of Ingolstadt, Germany
Aspen Olmsted, College of Charleston, USA
Stefan Schauer, Scientist, Austrian Institute of Technology, Center of
Digital Safety and Security, Vienna, Austria
Martin Latzenhofer, Scientist, Austrian Institute of Technology, Center
of Digital Safety and Security, Vienna, Austria
Aysajan Abidin, KU Leuven, Belgium
George Yee, Carleton University & Aptusinnova Inc., Ottawa, Canada

Event editions: - there are 8 editions.

ISSN: 2162-2116

ISBN: 978-1-61208-582-1

Location: Rome, Italy

Dates: from September 10, 2017 to September 14, 2017

Articles: there are 32 articles

A Novel Central Arbiter to Mitigate Denial of Service Attacks on Duplicate Address Detection in IPv6 Networks
Shailendra Singh Tomar, Anil Rawat, Prakash D. Vyavahare, and Sanjiv Tokekar
keywords: IPv6; DAD; DoS Attack; Central Arbiter Approach; SDN; NDP

A Context-Aware Malware Detection Based on Low-Level Hardware Indicators as a Last Line of Defense
Alireza Sadighian, Jean-Marc Robert, Saeed Sarencheh, and Souradeep Basu
keywords: Malware Detection; Low-level Indicators; Context- Aware; Machine Learning; Time-Series Analysis; Ontologies

Clustering based Evolving Neural Network Intrusion Detection for MCPS Traffic Security
Nishat I Mowla, Inshil Doh, and Kijoon Chae
keywords: Intrusion Detection; Machine Intelligence; Clustering; Neural Networks; Medical Cyber Physical Systems.

An Empirical Study of Root-Cause Analysis in Information Security Management
Gaute Wangen, Niclas Hellesen, Henrik Torres, and Erlend Brækken
keywords: Information Security; Root cause analysis; Risk Management; Case study.

Library-Level Policy Enforcement
Marinos Tsantekidis and Vassilis Prevelakis
keywords: policies; library calls; argument examination; wrapper functions

Netflow Based HTTP Get Flooding Attack Analysis
Jungtae Kim, Jong-Hyun Kim, Ikkyun Kim, and Koohong Kang
keywords: HTTP Get Flooding, Netflow, DDoS Attack

Secure Software Development – Models, Tools, Architectures and Algorithms
Aspen Olmsted
keywords: Cyber-security; Software Engineering; CRM

Security Vulnerabilities in Hotpatching in Mobile Applications
Sarah Ford and Aspen Olmsted
keywords: Javascript; iOS; patching; mobile computing; open-source tools; Apple; security

Secure Development of Healthcare Medical Billing Software
Paige Peck and Aspen Olmsted
keywords: Healthcare billing software; Current Procedural Terminology; CPT codes; Healthcare Common Procedure Coding System; HCPCS codes; Salesforce Cloud development

Attack Maze for Network Vulnerability Analysis
Stanley Chow
keywords: Network security; vulnerability analysis; scalable; vulnerability; exploit; maximum incursion; cyber security; metric; security metric; mission dependency

A Survey on Open Automotive Forensics
Robert Altschaffel, Kevin Lamshöft, Stefan Kiltz, and Jana Dittmann
keywords: automotive; computer forensics; embedded systems; forensic processes; safety & security.

A Method for Preventing Slow HTTP DoS attacks
Koichi Ozaki, Astushi Kanai, and Shigeaki Tanimoto
keywords: Slow HTTP DoS Attack; session time; packet interval.

Mutual Authentication Scheme for Lightweight IoT Devices
Seungyong Yoon and Jeongnyeo Kim
keywords: IoT, security, authentication

Identifying and Managing Risks in Interconnected Utility Networks
Stefan Schauer, Sandra König, Martin Latzenhofer, and Stefan Rass
keywords: risk management; interconnected utility networks; game theory; ISO 31000

Protecting Eavesdropping over Multipath TCP Communication Based on Not-Every-Not-Any Protection
Toshihiko Kato, Shihan Cheng, Ryo Yamamoto, Satoshi Ohzahata, and Nobuo Suzuki
keywords: Multipath TCP; Eavesdropping; Data Dispersion; Data Scrambling.

Visual Risk Specification and Aggregation
Jasmin Wachter, Thomas Grafenauer, and Stefan Rass
keywords: uncertainty representation; expert elicitation; risk assessment; opinion pooling

Addressing Complex Problem Situations in Critical Infrastructures using Soft Systems Analysis: The CS-AWARE Approach
Thomas Schaberreiter, Chris Wills, Gerald Quirchmayr, and Juha Röning
keywords: Cybersecurity; Critical Infrastructures; System Analysis; Soft Systems Methodology; Socio-technological Analysis; Cyber Situational Awareness; Information Sharing.

Stochastic Dependencies Between Critical Infrastructures
Sandra König and Stefan Rass
keywords: critical infrastructure; stochastic dependencies; Markov chain; risk propagation

Assessing Security Protection for Sensitive Data
George O. M. Yee
keywords: assessment, security, protection, sensitive data, vulnerability

RMDM – A Conceptual ICT Risk-Meta-Data-Model - Applied to COBIT for Risk as underlying Risk Model
Martin Latzenhofer and Gerald Quirchmayr
keywords: information and communication technology risk management; ICT risk-meta-data-model; COBIT for Risk; metamodeling; data model; UML

Recommendations for Risk Analysis in Higher Education Institutions
Lidia Prudente Tixteco, María del Carmen Prudente Tixteco, Gabriel Sánchez Pérez, Linda Karina Toscano Medina, José de Jesús Vázquez Gómez, and Arturo De la Cruz Tellez
keywords: risk analysis; higher education institutions; information systems

Extending Vehicle Attack Surface Through Smart Devices
Rudolf Hackenberg, Nils Weiss, Sebastian Renner, and Enrico Pozzobon
keywords: On-Board-Diagnostics; Cellular Network; Automotive Security

An Analysis of Automotive Security Based on a Reference Model for Automotive Cyber Systems
Jasmin Brückmann, Tobias Braun, and Hans-Joachim Hof
keywords: Automotive Security; Automotive Cyber System; Cyber-Phyiscal System;

Policy-Aware Provisioning Plan Generation for TOSCA-based Applications
Kálmán Képes, Uwe Breitenbücher, Markus Philipp Fischer, Frank Leymann, and Michael Zimmermann
keywords: Cloud Computing, Application Provisioning, Security, Policies, Automation

Towards an Approach for Automatically Checking Compliance Rules in Deployment Models
Markus Fischer, Uwe Breitenbücher, Kálmán Képes, and Frank Leymann
keywords: Cloud Computing; Compliance; Security; Policies;

Investigating SLA Confidentiality Requirements: A Holistic Perspective for the Government Agencies
Yudhistira Nugraha and Andrew Martin
keywords: Security, Trust, Assurance, Confidentiality Requirements, Service Level Agreement (SLA), Service Provision

Large-Scale Analysis of Domain Blacklists
Tran Phuong Thao, Tokunbo Makanju, Jumpei Urakawa, Akira Yamada, Kosuke Murakami, and Ayumu Kubota
keywords: Web Security; Large-Scale Analysis; Empirical Analysis; Blacklist; Malicious Domain

Hugin: A Scalable Hybrid Android Malware Detection System
Dominik Teubert, Johannes Krude, Samuel Schueppen, and Ulrike Meyer
keywords: mobile malware detection; app vetting; machine-learning

Towards Protected Firmware Verification in Low-power Devices
Yong-Hyuk Moon and Jeong-Nyeo Kim
keywords: firmware verification, memory protection, device security

A System to Save the Internet from the Malicious Internet of Things at Home
Lukas Braun and Hans-Joachim Hof
keywords: secure smart home; Internet of Things security; IoT security; network security; smart home; IoT

Frictionless Authentication System: Security & Privacy Analysis and Potential Solutions
Mustafa Mustafa, Aysajan Abidin, and Enrique Argones Rúa
keywords: Frictionless authentication; Threat analysis; Security and privacy requirements; Threshold signature; Fuzzy extractors.

Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities
Tim Van hamme, Vera Rimmer, Davy Preuveneers, Wouter Joosen, Mustafa Mustafa, Aysajan Abidin, and Enrique Argones Rúa
keywords: Frictionless authentication; Behaviometrics; Security; Privacy; Usability.

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.